last modified on July 4, 2008
November 29, 2000 updated
October 23, 2000
IPA (Information-technology Promotion Agency, Japan)
Information technology Promotion Agency(IPA), sponsored by the Ministry of International Trade and Industry has been conducting the evaluation of cryptographic techniques. The purpose of this project is to list valid cryptographic techniques for the use of an electronic government whose infrastructure will be created by 2003.
The following group of cryptographic techniques, which have been submitted to the formal call of "Call for Cryptographic Techniques" dated by June 13, 2000, will be received the further detailed evaluation by designated evaluator.
Simultaneously, IPA is soliciting public analysis and comments on the the followings. Comments and analysis on any aspect of the cryptographic techniques will be actively used by IPA to make the technical report.
IPA creates the following table with a link to the Web page prepared by the submitter to publicize the information. Comments and attacks regarding the following cryptographic techniques have been publicized in academic journals,magazines, papers, or other publications which are generally available to the public would be very useful for us.
IPA would like to thank the organizations who contributed to provide us with public information and analysis (attacks) on the cryptographic techniques.
| Category | Cryptographic Techniques |
|---|---|
| Asymmetric Cryptogrphic techniques (Confidentiality) | ACE Encrypt |
| ECAES(BElliptic Curve Augmented Encryption Scheme) in SEC1 | |
| EPOC | |
| HIME-2 | |
| PSEC | |
| Asymmetric Cryptogrphic techniques(Authentication) | ESIGN-identification |
| Asymmetric Cryptogrphic techniques (Signature) | ACE Sign |
| ECDSA(BElliptic Curve Digital Signature Algorithm) in SEC1 | |
| ESIGN-signatures | |
| MY-ELLTY ECMR-h | |
| Asymmetric Cryptogrphic techniques (Key-sharing) | ECDHS(BElliptic Curve Deffie-Hellman Scheme) in SEC1 |
| ECMQVS(Elliptic Curve MQV Scheme) in SEC1 | |
| HDEF-ECDH | |
| HIME-1 | |
| Symmetric Ciphers (Stream ciphers) | MULTI-S01 |
| TOYOCRYPT-HS1 | |
| Symmetric Ciphers (64-bit block ciphers) | CIPHERUNICORN-E |
| FEAL-NX | |
| Hierocrypt-L1 | |
| MISTY1 | |
| Symmetric Ciphers (128-bit block ciphers) | Camellia |
| CIPHERUNICORN-A | |
| Hierocrypt-3 | |
| MARS | |
| RC6 | |
| SC2000 | |
| Pseudo-Random Number Generators | TOYOCRYPT-HR1 |
| Category | Cryptographic Techniques |
|---|---|
| Asymmetric Cryptogrphic techniques(Confidentiality) | RSA OAEP |
| Asymmetric Cryptogrphic techniques (Signature) | DSA |
| RSA PSS | |
| Asymmetric Cryptogrphic techniques(Key-sharing) | DH Key Exchange |
| Symmetric Ciphers (64-bit block ciphers) | Triple DES |
| Symmetric Ciphers (128-bit block ciphers) | Rijndael |
| Hush Functions | MD5 |
| RIPEMD-160 | |
| SHA-1 | |
| Pseudo-Random Number Generators | Pseudo-Random Number Generator based on SHA-1(BFIPS186:DIGITAL SIGNATURE STANDARD APPENDIX C) |
June 13, 2000
IPA (Information-technology Promotion Agency, Japan)
Creating the common security basis is one of the most important tasks for the Japanese electronic government of which the infrastructure and primary systems will be constructed by FY 2003.
Cryptographic techniques are particularly important and indispensable components of the electronic government because these not only provide information confidentiality and prevent information falsification, but also assure electronic authentication.
Because of the importance of cryptogrphic techniques, it has been pointed out domestically that the Japanese national government should adopt a cryptography usage policy in order to ensure that cryptography is integrated properly into the electronic government. Internationally the ISO/IEC JTC1 have begun efforts aimed at standardizing cryptographic algorithms.
This call is an essential part of the MITI Action Plan for a Secure E-Government - announced by the Ministry of International Trade and Industry (MITI) in April 2000. MITI has entrusted the IPA with the implementation of this project.
The purpose of this call is to make a technical report. The report is to include a list of characteristics on cryptographic techniques that will be proposed through a call for submission applicable to the Japanese electronic government. To make such list, IPA investigate and evaluate the proposed cryptographic techniques in terms of security, implementation and other characteristics from the viewpoints of various objective specialists.
IPA has organized a committee (Cryptography Research and Evaluation Committee) to perform evaluation of Cryptographic Techniques. The committee is composed of most prominent cryptography specialists in Japan and will evaluate the cryptographic techniques that are submitted
(a) asymmetric cryptographic schemes
(b) symmetric ciphers
(c) hash functions
(d) pseudorandom number generators
Start of collecting submissions June 13, 2000
Deadline of collecting submissions July 14, 2000
IT Security Center, Information-technology Promotion Agency, Japan
Bunkyo Green Coat Center Office,
2-28-8, Honkomagome, Bunkyo-ku, Tokyo 113-6591, Japan
E-mail
FAX +81-3-5978-7518
When sending requests or making questions, use e-mail or facsimile (do not telephone).
June 13, 2000
IPA (Information-technology Promotion Agency, Japan)
Creating the common security basis is one of the most important tasks for the Japanese electronic government of which the infrastructure and primary systems shall be constructed by FY 2003.
Cryptographic techniques are particularly important and indispensable components of the electronic government because these not only provide information confidentiality and prevent information falsification, but also assure electronic authentication.
Because of the importance of cryptographic techniques, it has been pointed out domestically that the Japanese national government should adopt a cryptography usage policy in order to ensure that cryptography is integrated properly into the electronic government and internationally the ISO/IEC JTC1 have begun efforts aimed at standardizing cryptographic algorithms.
The purpose of this project is to create a technical report. The report is to include a list of characteristics on cryptographic techniques that will be proposed through a call for submission applicable to the Japanese electronic government. To make such list, IPA will investigate and evaluate the proposed cryptographic techniques in terms of security, implementation and other characteristics from the viewpoints of various objective specialists.
This project is an essential part of the MITI Action Plan for a Secure E-Government - announced by the Ministry of International Trade and Industry (MITI) in April 2000. MITI has entrusted the IPA with the implementation of this project.
IPA organizes a committee (Cryptography Research and Evaluation Committee) for implementing this project.
The committee is composed of most prominent cryptography specialists in Japan and will evaluate the cryptographic techniques that are submitted.
Cryptographic Techniques that will be evaluated are asymmetric cryptographic schemes, symmetric ciphers, hash functions and pseudorandom number generators - the four types of techniques considered indispensable in the electronic government.
The evaluation will be conducted in two phases: the screening test phase and the detailed evaluation phase. Detailed evaluations will be conducted on proposals that have passed screening tests.
The evaluation guidelines are to be established by the committee.
Reports, including the evaluation results, will be compiled by the committee following due and proper consideration on fairness and transparency, and will be announced on web pages hosted by the IPA.
Year 2000
June 13 : Start of collecting proposals
Early July : Announcement of the evaluation guidelines
July 14 : Deadline for proposal arrival
August-September : Screening evaluation results
Early October : Announcement of screening evaluation
October-December : Detailed evaluation results
Year 2001
February or later : Announcement of detailed evaluation
Committee chair Hideki Imai : University of Tokyo
Naoyuki Iwashita : Bank of Japan
Eiji Okamoto : Toho University
Tatsuaki Okamoto : NTT Laboratories
Toshinobu Kaneko : Science University of Tokyo
Kouichi Sakurai : Kyushu University
Ryoichi Sasaki : Hitachi, Ltd.
Shigeo Tsujii : Chuo University
Kenji Naemura : Keio University
Mitsuru Matsui : Mitsubishi Electric Corporation
Tsutomu Matsumoto : Yokohama National University
(Observers)
Kuniomi Takamori : Management and Coordination Agency
Akihiko Nakajima : Japan Defense Agency
Masaaki Kimura : Ministry of International Trade and Industry
Yoshitaka Toi : Ministry of International Trade and Industry
Isao Hatta : Ministry of International Trade and Industry
Kazuhito Ohmaki : Ministry of International Trade and Industry
Kaoru Suzuki : Ministry Posts and Telecommunications
Shingo Ohmori : Ministry Posts and Telecommunications
(Secretariat)
Cryptography Technology Office, IT Security Center,
Information-technology Promotion Agency, Japan