The CRYPTREC Cryptographic Submissions Briefing was held on Oct. 9 (Tue.) and 10 (Wed.) under the joint sponsorship of the Information-technology Promotion Agency (IPA) and the Telecommunications Advancement Organization of Japan (TAO). We extend our warmest thanks to the many people who attended the briefing.
BRIEFING DETAILS
DATE AND TIME:Oct. 9 (Tue.), 2001 10:30 to 19:00、Oct. 10 (Wed.), 2001 10:30 to 18:00
PLACE:Yamaha Hall (7-9-14 Ginza, Chuo-ku, Tokyo, JAPAN. Phone: +81(0)3-3572-3139)
ATTENDANCE:220 Participants
PROGRAM
Oct. 9 (Tue.)
10:00 Program begins
10:30 Welcoming Address
Taku Kiyasu Director, Standardization Division, Information Communications Policy Bureau, Ministry of Public Management, Home Affairs, Posts and Telecommunications
Mr. Kiyasu talked about the importance of CRYPTREC in the establishment of the Japanese e-Government.
11:30 Session 1: Presentation of Symmetric-Key Cryptographic Techniques (64-bit block ciphers)
Moderator:
Makoto Tatebayashi (Member, CRYPTREC Symmetric-Key Subcommittee)
Candidates submitting the following three cryptographic techniques provided technical explanations of their proposals.
CIPHERUNICORN-E
Hierocrypt-L1
MISTY1
12:30 - 14:00 Lunch Break
14:00 Session 2: Presentation of Symmetric-Key Cryptographic Techniques (128-bit block ciphers)
Moderator:
Kazuo Takaragi (Member, CRYPTREC Symmetric-Key Subcommittee)
Candidates submitting the following three cryptographic techniques provided technical explanations of their proposals.
Camellia
CIPHERUNICORN-A
RC6 Block Cipher
SC2000
15:40 - 16:00 Break
16:00 Session 3: Presentation of Symmetric-Key Cryptographic Techniques (Stream ciphers)
Moderator:
Masakatsu Morii (Member, CRYPTREC Symmetric-Key Subcommittee)
Candidates submitting the following three cryptographic techniques provided technical explanations of their proposals.
C4-1
FSAngo
MUGI
MULTI-S01
17:20 - 17:40 Break
17:40 Session 4: Presentation of Symmetric-Key Cryptographic Techniques (Pseudo-random number generators)
Moderator:
Shinichi Kawamura (Member, CRYPTREC Symmetric-Key Subcommittee)
Candidates submitting the following three cryptographic techniques provided technical explanations of their proposals.
Creation of intrinsic numbers with Clutter Box
FSRansu
High security ultra mini random number generator
TAO TIME Cognition Algorithm
19:00 Program concludes
Oct. 10 (Tue.)
10:00 Program begins
10:30 Advisory speech:
Trends in Cryptographic Techniques
Shigeo Tsujii Professor, Chuo University (Adviser, CRYPTREC Evaluation Committee)
In addition to introducing the latest trends in cryptographic techniques, Prof. Tsujii emphasized the need to promote CRYPTREC activities.
11:20 Session 1: Presentation of Public-Key Cryptographic Techniques
Moderator:
Atsushi Shimbo (Member, CRYPTREC Public-Key Subcommittee)
Candidates submitting the following three cryptographic techniques provided technical explanations of their proposals.
EPOC-2
High Performance Modular Squaring Based Public Key Encryption (Revised version) (HIME(R))
NTRU public key cryptosystem
RSA Public-Key Cryptosystem with Optimal Asymmetric Encryption Padding (RSA-OAEP)
12:40 - 14:00 Lunch Break
14:00 Session 2: Presentation of Public-Key Cryptographic Techniques
Moderator:
Hajime Watanabe (Member, CRYPTREC Public-Key Subcommittee)
Candidates submitting the following three cryptographic techniques provided technical explanations of their proposals.
ESIGN
RSA Public-Key Cryptosystem with Probabilistic Signature Scheme (RSA-PSS)
Complex Open Cipher Key System
The Security System for Information Telecommunication using the unconditional secrecy technology
Security-up for Kana Kanji System Applied Mathematics Using Magic Squares
15:40 - 16:00 Break
16:00 Session 3: Presentation of Public-Key Cryptographic Techniques
Moderator:
Kazuo Ohta (Member, CRYPTREC Public-Key Subcommittee)
Candidates submitting the following three cryptographic techniques provided technical explanations of their proposals.
ECDSA (Elliptic Curve Digital Signature Algorithm) in SEC1
ECIES (Elliptic Curve Integrated Encryption Scheme) in SEC1
ECDH (Elliptic Curve Diffie-Hellman Scheme) in SEC1
OK-ECDSA
OK-ECDH
PSEC-KEM Key agreement
18:00 Program concludes
Note These PDF files use Japanese fonts. If you want to see the PDF files, We recommend you to download the font pack of Asia for the Adobe Acrobat Reader from the Adobe web page.