japanese cryptrec.png (6153 bytes)

Cryptographic Techniques Evaluation Project 2001 (Provisional Translation)

June 29, 2001
Information-technology Promotion Agency, Japan (IPA)
Telecommunications Advancement Organization of Japan (TAO)

 The background and objectives of the project are to make lists of cryptographic techniques for the common security basis to the Japanese e-Government of which the infrastructure and primary systems shall be implemented by FY 2003. The project was started in 2000 by IPA, and it was advanced to a joint project between IPA and TAO this spring.

 The evaluation will be done by "Cryptography Research & Evaluation Committees," which consist of the preeminent specialists of cryptography in Japan.

 The area of the evaluation of cryptographic techniques is asymmetric cryptographic schemes, symmetric ciphers cryptosystem, hash function, and pseudo-random number generator, which are the important security basis for the Japanese e-Government. The project evaluates the submitted techniques which corresponded to the open call and these techniques which the committees consider as necessary to be evaluated.

The Outline of CRYPTREC's Total Activity in FY 2001

1. Action Plan of this committees

In e-Japan Priority Policy Program, which IT Strategic Headquarters in the cabinet established on March in 2001 based on the Basic Law on the Formation of an Advanced Information and Telecommunication Network Society, the Japanese government implements various policies to maintain securities and reliabilities on their advanced information and telecommunications networks as one of the world's most advanced IT nations, for example, to minimize the service failure caused by threats for the advanced information and telecommunications networks.

Especially, toward the promotion of electronic signatures and certification services and realization of an electronic government, the security evaluations and the standardization of cryptographic algorithms as key technologies today are increasingly important in order to ensure security and reliabilities on the advanced information and telecommunications networks.

So, the purpose of this project is to evaluate submitted cryptographic techniques in an objective manner and to recommend the techniques of high grade through the Ministry of Economy, Trade and Industry and the Ministry of Public Management, Home Affairs, Posts and Telecommunications to other ministries, to contribute realization of an electronic government supported with advanced reliabilities and securities.

To achieve the goals above, CRYPTREC Advisory Committee entrusts research and evaluation for cryptographic techniques to this CRYPTREC committees.

2. Framework of this committees

(1) Cryptography Research & Evaluation Committees are organized in association with IPA and TAO.
(2) In addition to subcommittees for asymmetric cryptographic schemes and symmetric key cryptography, it is considered to form working groups discussing requirements for cryptographic techniques and guidelines concerning to the Japanese e-Government.
Organization of CRYPTRECpdficonsmall.gif (153 bytes)

Attached Paper #1: Member Lists of Cryptography Research & Evaluation Committees

3. Activities

(1) General evaluation (Continual call)
(i) We continually evaluate the cryptographic techniques that are submitted to CRYPTREC project and the techniques which CRYPTREC committees consider indispensable for the Japanese e-Government.
Attached Paper #2: Call for Cryptographic Techniques (tentative)
(ii) In 2001 we evaluate the cryptographic techniques that are newly submitted and the techniques that were evaluated and concluded to be further evaluated in 2000.
* Evaluation classification in general evaluation
o Screening evaluation --- Examine trivial weaknesses
o Full evaluation --- Inspect weaknesses in detail and performance
o Continual evaluation --- Evaluate the techniques that were evaluated and concluded to be further evaluated in 2000. Furthermore, techniques that were evaluated in 2000 may be evaluated due to a recent trend.
(2)Specific evaluation

We evaluate the cryptographic techniques requested by another organization and the techniques that the CRYPTREC committees consider more detailed evaluation is necessary for a specific use.

We may list the evaluated techniques as "cryptographic techniques for specific area" depending on the evaluation process.

In 2001 we plan to evaluate the cryptographic techniques (block ciphers) requested to be evaluated by Japanese national committee of ISO/IEC JTC1/SC27, and the techniques (digital signatures) about Law concerning Electronic Signatures and Certification.

*In order to carry out general evaluation and specific evaluation, we survey important factors concerning the Japanese e-Government.
oSurvey the systems that are incorporated with the cryptographic techniques and necessary factors
oSurvey security, efficiency, performance (speed, memory size, gate counts, software, hardware), intellectual property.
oSurvey specific factors under particular conditions.

Image of Activitiespdficonsmall.gif (153 bytes)

Classification of Cryptographic Techniques for Evaluationpdficonsmall.gif (153 bytes)

(3) Guideline for usage
(i) Survey the selection policy for the cryptographic techniques used in the Japanese e-Government.
(ii) Survey tips in implementing security systems
(iii) Survey the trend of cryptographic techniques (instance in system and trends of standardization)
(iv) Other issues (Patents and export restrictions etc.)

4. Schedule

The rough activity schedule of this year is made into the next table.pdficonsmall.gif (153 bytes)

Attached Paper #1: Member Lists of Cryptography Research & Evaluation Committees

Members of CRYPTREC Evaluation Committee

Committee Chair Hideki Imai The University of Tokyo
Adviser Shigeo Tsujii Chuo University
Member Eiji Okamoto Toho University
Member Tatsuaki Okamoto Nippon Telegraph and Telephone Corporation
Member Toshinobu Kaneko Science University of Tokyo
Member Mitsuru Matsui Mitsubishi Electric Corporation
Member Tsutomu Matsumoto Yokohama National University

Members of Public-Key Cryptography Subcommittee

Subcommittee Chair Tsutomu Matsumoto Yokohama National University
Member Seigo Arita NEC Corporation
Member Kazuo Ohta The University of Electro-Communications
Member Jun Kogure Fujitsu Laboratories Ltd.
Member Yasuyuki Sakai Mitsubishi Electric Corporation
Member Hiroki Shizuya Tohoku University
Member Atsushi Shimbo Toshiba Corporation
Member Seiichi Susaki Hitachi, Ltd.
Member Natsume Matsuzaki Matsushita Electric Industrial Co.,Ltd.
Member Hajime Watanabe National Institute of Advanced Industrial Science and Technology

Members of Symmetric-Key Cryptography Subcommittee

Subcommittee Chair Toshinobu Kaneko Science University of Tokyo
Member Kiyomichi Araki Tokyo Institute of Technology
Member Shinichi Kawamura Toshiba Corporation
Member Masayuki Kanda Nippon Telegraph and Telephone Corporation
Member Tohru Kohda Kyushu University
Member Kazukuni Kobara The University of Tokyo
Member Kouichi Sakurai Kyushu University
Member Takeshi Shimoyama Fujitsu Laboratories Ltd.
Member Kazuo Takaragi Hitachi, Ltd.
Member Makoto Tatebayashi Matsushita Electric Industrial Co.,Ltd.
Member Yukiyasu Tsunoo NEC Corporation
Member Toshio Tokita Mitsubishi Electric Corporation
Member Masakatu Morii The University of Tokushima

Attached Paper #2: Call for Cryptographic Techniques (tentative)

We will be public the submission procedure of cryptographic techniques for this year, 2001. We plan the call for cryptographic techniques based on the procedure for the year 2000. The outline of the procedure is as follows.

1. Purpose

The purpose of this project is to list valid cryptographic techniques, together with their of their security and implementation by open call and evaluation.

2. Call for Cryptographic Techniques

We assume that submitted cryptographic techniques can be supplied for the Japanese e-Government. Our evaluation program is an open process.

(1) Newly submitted cryptographic techniques
We require its all algorithm and technical information are open to the public, or the date of open is determined at the dead line of submission.
The specification of the technique must be open, that is, the technique can be implemented and evaluated by domestic and foreign persons.
We want that newly cryptographic techniques have some advantages than the detail-evaluated cryptographic techniques in CRYPTREC 2000.
The proposer can submit only one cryptographic technique which is based on the same basis in our technical categories (see Section 3. Categories of Cryptographic Techniques).
Newly submitted techniques will be applied screening evaluation in 2001, and full evaluation in 2002.
(2) Continually evaluated cryptographic techniques (prepare the same submission for newly submitted techniques)
We consider the cryptographic techniques which hold the following conditions as continually evaluated cryptographic techniques
  1. It is classified to detail-evaluated cryptographic techniques by CRYPTREC committees.
  2. Vendors will be able to supply it for the Japanese e-Government.

We request the information about recent its status of security, availability and etc. If it has something changes in its cryptographic technique, CRYPTREC committees consider it as newly submitted cryptographic technique.

3. Categories of Cryptographic Techniques

A cryptographic technique, which has a function and is realized by the known algorithm, should be submitted to the base category.
For example, the hash function, which is based on a block cipher and constructed by ISO10118-2 (part2), should be submitted to the block cipher category, and the key sharing, which is based on a confidential technique, should be submitted to the confidentiality category, not to the key-sharing category.

(1) Asymmetric Cryptographic Schemes
The target of the call for asymmetric cryptographic schemes is the following 4 categories.
[classification based on uses]
(i) Confidentiality
(ii) Authentication
(iii) Signature
(iv) Key-Sharing
(2) Symmetric Ciphers
The target of the call for symmetric key cryptography is the following 3 categories.
(i) 64 bit block ciphers
(ii) 128 bit block ciphers
(iii) Stream ciphers
(3) Hash Functions
(4) Pseudo-Random Number Generators

4. Outline of the Submission Document

The necessary information in the document is based on the call for cryptographic techniques in 2000. The document should be prepared in both Japanese and English.

(1) Cryptographic Techniques Application Form
(2) Cryptographic Techniques Specifications
(3) Self-Evaluation Report
(4) Test vectors
(5) Reference program
(6) Information regarding the public availability status
(i) Show clearly the date and the meeting or the reference in which the technique was publicly available. Publish the submission document on web page(s) in both Japanese and English before the submission deadline.
(ii) Declare that the submission is legally exportable from Japan, and show its evidence.
(iii) Intellectual property rights and license
o Show clearly that the evaluation which is performed by the committees can be done without any special license and/or fee.
o Show clearly the license policy when the technique is used by the government and the communication between the government and other entities and etc. (The policy is expected to be looser than "non-exclusive.")

5. Evaluation Criteria

See "procedure for submitting cryptographic techniques" which will be available in early August.

6. Meeting for Submission Techniques Introduction (will be hold in early October)

A public meeting regarding to the submitted techniques will be hold after the deadline of the submission. The applicant should present its technique.

7. Cryptographic Techniques Evaluation Workshop (around January 2002)

Before finishing writing the annual report, we hold a public workshop, on which the participants discuss the evaluations. We consider that the evaluation reports, which are written by outer-evaluators and the committees members, are presented.

8. Outline of Schedule

June Announcement of the outline of the committees activities including the outline of the submission procedure
early August Announcement of the detailed procedure for submitting cryptographic techniques
August to September Call for Cryptographic Techniques
early October Meeting for Submission Techniques Introduction
August to January 2002 Periods of Screening evaluation and Continual Evaluation
January 2002 Cryptographic Techniques Evaluation Workshop
after March 2002 Plan to announce of CRYPTREC Report 2001

toiawase.gif (960 バイト)

For further information, contact to:

IT Security Center, Information-technology Promotion Agency, Japan
Bunkyo Green Court Center Office,
2-28-8, Honkomagome, Bunkyo-ku, Tokyo 113-6591, Japan
E-mail cryptrec-call@ipa.go.jp
FAX +81-3-5978-7518

When sending requests or making questions, use e-mail or facsimile (do not telephone).

Copyright (c) 2001 Information-technology Promotion Agency, Japan. All rights reserved.