HOME >> IT Security >> IT Security Center Japanese TOP >> IT Security Center English TOP >> CRYPTREC

CRYPTREC

last modified on July  4, 2008

Evaluation of Cryptographic Techniques in FY 2003

Evaluation of Cryptographic Techniques in FY 2002

Evaluation of Cryptographic Techniques in FY 2001

Evaluation of Cryptographic Techniques in FY 2000

Call for attack to evaluate the Cryptographic Techniques
(Provisional Translation)

November 29, 2000 updated
October 23, 2000
IPA (Information-technology Promotion Agency, Japan)

Information technology Promotion Agency(IPA), sponsored by the Ministry of International Trade and Industry has been conducting the evaluation of cryptographic techniques. The purpose of this project is to list valid cryptographic techniques for the use of an electronic government whose infrastructure will be created by 2003.

The following group of cryptographic techniques, which have been submitted to the formal call of "Call for Cryptographic Techniques" dated by June 13, 2000, will be received the further detailed evaluation by designated evaluator.
Simultaneously, IPA is soliciting public analysis and comments on the the followings. Comments and analysis on any aspect of the cryptographic techniques will be actively used by IPA to make the technical report. IPA creates the following table with a link to the Web page prepared by the submitter to publicize the information. Comments and attacks regarding the following cryptographic techniques have been publicized in academic journals,magazines, papers, or other publications which are generally available to the public would be very useful for us. IPA would like to thank the organizations who contributed to provide us with public information and analysis (attacks) on the cryptographic techniques.

Deadline
January 12, 2001
Contact
Cryptography Technology Office, IPA  E-mail?FPlease feel free to call at +81-3-5978-7517.

[Cryptographic Techniques for Detailed Evaluation]

Category Cryptographic Techniques
Asymmetric Cryptogrphic techniques (Confidentiality) ACE Encrypt
ECAES(BElliptic Curve Augmented Encryption Scheme) in SEC1
EPOC
HIME-2
PSEC
Asymmetric Cryptogrphic techniques(Authentication) ESIGN-identification
Asymmetric Cryptogrphic techniques (Signature) ACE Sign
ECDSA(BElliptic Curve Digital Signature Algorithm) in SEC1
ESIGN-signatures
MY-ELLTY ECMR-h
Asymmetric Cryptogrphic techniques (Key-sharing) ECDHS(BElliptic Curve Deffie-Hellman Scheme) in SEC1
ECMQVS(Elliptic Curve MQV Scheme) in SEC1
HDEF-ECDH
HIME-1
Symmetric Ciphers (Stream ciphers) MULTI-S01
TOYOCRYPT-HS1
Symmetric Ciphers (64-bit block ciphers) CIPHERUNICORN-E
FEAL-NX
Hierocrypt-L1
MISTY1
Symmetric Ciphers (128-bit block ciphers) Camellia
CIPHERUNICORN-A
Hierocrypt-3
MARS
RC6
SC2000
Pseudo-Random Number Generators TOYOCRYPT-HR1

[Other Important Cryptographic Techniques to be Evaluated]

Category Cryptographic Techniques
Asymmetric Cryptogrphic techniques(Confidentiality) RSA OAEP
Asymmetric Cryptogrphic techniques (Signature) DSA
RSA PSS
Asymmetric Cryptogrphic techniques(Key-sharing) DH Key Exchange
Symmetric Ciphers (64-bit block ciphers) Triple DES
Symmetric Ciphers (128-bit block ciphers) Rijndael
Hush Functions MD5
RIPEMD-160
SHA-1
Pseudo-Random Number Generators Pseudo-Random Number Generator based on SHA-1(BFIPS186:DIGITAL SIGNATURE STANDARD APPENDIX C)

Call for Cryptographic Techniques (Provisional Translation)
Call for Cryptographic Techniques has been ended.

June 13, 2000
IPA (Information-technology Promotion Agency, Japan)

The background

Creating the common security basis is one of the most important tasks for the Japanese electronic government of which the infrastructure and primary systems will be constructed by FY 2003.
Cryptographic techniques are particularly important and indispensable components of the electronic government because these not only provide information confidentiality and prevent information falsification, but also assure electronic authentication.
Because of the importance of cryptogrphic techniques, it has been pointed out domestically that the Japanese national government should adopt a cryptography usage policy in order to ensure that cryptography is integrated properly into the electronic government. Internationally the ISO/IEC JTC1 have begun efforts aimed at standardizing cryptographic algorithms.

This call is an essential part of the MITI Action Plan for a Secure E-Government - announced by the Ministry of International Trade and Industry (MITI) in April 2000. MITI has entrusted the IPA with the implementation of this project.

The purpose

The purpose of this call is to make a technical report. The report is to include a list of characteristics on cryptographic techniques that will be proposed through a call for submission applicable to the Japanese electronic government. To make such list, IPA investigate and evaluate the proposed cryptographic techniques in terms of security, implementation and other characteristics from the viewpoints of various objective specialists.

IPA has organized a committee (Cryptography Research and Evaluation Committee) to perform evaluation of Cryptographic Techniques. The committee is composed of most prominent cryptography specialists in Japan and will evaluate the cryptographic techniques that are submitted

Outline of Call for Cryptographic Techniques

(1)Type of Cryptographic Techniques

(a) asymmetric cryptographic schemes
(b) symmetric ciphers
(c) hash functions
(d) pseudorandom number generators

(2)Collecting schedule

Start of collecting submissions June 13, 2000
Deadline of collecting submissions July 14, 2000

(3)Application guidelines

PDF file (Plaese Read this PDF file using AcrobatReader Ver4.0.) Microsoft Word97 file (Windows)

(4)Q&A about call for Cryptographic Techniques

(5)Inquiry and address

IT Security Center, Information-technology Promotion Agency, Japan
Bunkyo Green Coat Center Office,
2-28-8, Honkomagome, Bunkyo-ku, Tokyo 113-6591, Japan
E-mail Please feel free to call at +81-3-5978-7517.
FAX +81-3-5978-7518

When sending requests or making questions, use e-mail or facsimile (do not telephone).

Evaluation of Cryptographic Techniques Project (Provisional Translation)

June 13, 2000
IPA (Information-technology Promotion Agency, Japan)

The background and objectives of the project

Creating the common security basis is one of the most important tasks for the Japanese electronic government of which the infrastructure and primary systems shall be constructed by FY 2003.
Cryptographic techniques are particularly important and indispensable components of the electronic government because these not only provide information confidentiality and prevent information falsification, but also assure electronic authentication.
Because of the importance of cryptographic techniques, it has been pointed out domestically that the Japanese national government should adopt a cryptography usage policy in order to ensure that cryptography is integrated properly into the electronic government and internationally the ISO/IEC JTC1 have begun efforts aimed at standardizing cryptographic algorithms.
The purpose of this project is to create a technical report. The report is to include a list of characteristics on cryptographic techniques that will be proposed through a call for submission applicable to the Japanese electronic government. To make such list, IPA will investigate and evaluate the proposed cryptographic techniques in terms of security, implementation and other characteristics from the viewpoints of various objective specialists.
This project is an essential part of the MITI Action Plan for a Secure E-Government - announced by the Ministry of International Trade and Industry (MITI) in April 2000. MITI has entrusted the IPA with the implementation of this project.

Abstract of the project implementation

IPA organizes a committee (Cryptography Research and Evaluation Committee) for implementing this project.
The committee is composed of most prominent cryptography specialists in Japan and will evaluate the cryptographic techniques that are submitted.
  Cryptographic Techniques that will be evaluated are asymmetric cryptographic schemes, symmetric ciphers, hash functions and pseudorandom number generators - the four types of techniques considered indispensable in the electronic government.
  The evaluation will be conducted in two phases: the screening test phase and the detailed evaluation phase. Detailed evaluations will be conducted on proposals that have passed screening tests. The evaluation guidelines are to be established by the committee.
  Reports, including the evaluation results, will be compiled by the committee following due and proper consideration on fairness and transparency, and will be announced on web pages hosted by the IPA.

Evaluation schedule (plan)

Year 2000
June 13 : Start of collecting proposals
Early July : Announcement of the evaluation guidelines
July 14 : Deadline for proposal arrival
August-September : Screening evaluation results
Early October : Announcement of screening evaluation
October-December : Detailed evaluation results
Year 2001
February or later : Announcement of detailed evaluation

Members of Cryptography Research and Evaluation Committee

Committee chair Hideki Imai : University of Tokyo
Naoyuki Iwashita : Bank of Japan
Eiji Okamoto : Toho University
Tatsuaki Okamoto : NTT Laboratories
Toshinobu Kaneko : Science University of Tokyo
Kouichi Sakurai : Kyushu University
Ryoichi Sasaki : Hitachi, Ltd.
Shigeo Tsujii : Chuo University
Kenji Naemura : Keio University
Mitsuru Matsui : Mitsubishi Electric Corporation
Tsutomu Matsumoto : Yokohama National University
(Observers)
Kuniomi Takamori : Management and Coordination Agency
Akihiko Nakajima : Japan Defense Agency
Masaaki Kimura : Ministry of International Trade and Industry
Yoshitaka Toi : Ministry of International Trade and Industry
Isao Hatta : Ministry of International Trade and Industry
Kazuhito Ohmaki : Ministry of International Trade and Industry
Kaoru Suzuki : Ministry Posts and Telecommunications
Shingo Ohmori : Ministry Posts and Telecommunications
(Secretariat)
Cryptography Technology Office, IT Security Center,
Information-technology Promotion Agency, Japan