ISO/IEC 9798プロトコルの安全性評価

Size: px
Start display at page:

Download "ISO/IEC 9798プロトコルの安全性評価"

Transcription

1 ISO/IEC ISO/IEC (Mechanisms using symmetric encipherment algorithms), ISO/IEC (Mechanisms using digital signature techniques), ISO/IEC (Mechanisms using a cryptographic check function) 1 ISO/IEC , , ISO/IEC , ,

2 3 3.1 forward security 3.2 IOTP DSA, ECDSA, RSASSA-PKCS1-v1 5, RSA-PSS, RSA-OAEP, RSAES-PKCS1-v1 5 [15, 16, 14] IOTP 3.3 Abadi, Needham M.Abadi R.Needham [1] 11 Abadi Needham 2

3 Nonce (Number used once) nonce IOTP 1, 2, 3, 4, 10, 11 4 ISO/IEC , , ISO/IEC , , Time variant parameter ISO/IEC , , Time variant parameter 3

4 ISO/IEC ISO/IEC , , A, B e K K I U I K UV U V N U U P R U U T N U U Time variant parameter T oken UV U V T U U T V P U U Time variant parameter X Y X Y ss(y 1 Y j ) Y 1 Y j f K (X) K f 4.2 ISO/IEC ISO/IEC Time variant parameter ISO/IEC Coordinate Universal Clock (UTC) ISO/IEC ISO/IEC Time variant parameter Time variant parameter Time variant parameter Time variant parameter Mechanism 1-One-pass authentication Mechanism 1-One-pass authentication 1. A = B : T oken AB T oken AB = T ext 2 e KAB (T N A I B T ext 1 ) 1: Mechanism 1-One-pass authentication 4

5 4.2.2 Mechanism 2-Two-pass authentication Mechanism 2-Two-pass authentication 1. B = A : R B T ext 1 2. A = B : T oken AB T oken AB = T ext 3 e KAB (R B I B T ext 2 ) 2: Mechanism 2-Two-pass authentication Mechanism 3-Two-pass authentication Mechanism 3-Two-pass authentication 1. A = B : T oken AB 2. B = A : T oken BA T oken AB = T ext 2 e KAB (T N A I B T ext 1 ) T oken BA = T ext 4 e KAB (T N B I B T ext 3 ) 3: Mechanism 3-Two-pass authentication Mechanism 4-Three-pass authentication Mechanism 4-Three-pass authentication 1. B = A : R B T ext 1 2. A = B : T oken AB 3. B = A : T oken BA T oken AB = T ext 3 e KAB (R A R B I B T ext 2 ) T oken BA = T ext 5 e KAB (R B R A T ext 4 ) 4: Mechanism 4-Three-pass authentication 5

6 4.2.5 Mechanism 5-Four-pass authentication Mechanism 5-Four-pass authentication 1. A = P : T V P A I B T ext 1 2. P = A : T oken P A 3. A = B : T oken AB 4. B = A : T oken BA T oken P A = T ext 4 e KAP (T V P A K AB I B T ext 3 ) e KBP (T N P K AB I A T ext 2 ) T oken AB = T ext 6 e KBP (T N P K AB I A T ext 2 ) e KBP (T N A I B T ext 5 ) T oken BA = T ext 8 e KAB (T N B I A T ext 7 ) 5: Mechanism 5-Four-pass authentication Mechanism 6-Five-pass authentication Mechanism 6-Five-pass authentication 1. B = A : R B T ext 1 2. A = P : R A R B I B T ext 2 3. P = A : T oken P A 4. A = B : T oken AB 5. B = A : T oken BA 6. T oken P A = T ext 5 e KAP (R A K AB I B T ext 4 ) e KBP (R B K AB I A T ext 3 ) T oken AB = T ext 7 e KBP (R B K AB I A T ext 3 ) e KAB (R A R B T ext 6 ) T oken BA = T ext 9 e KAB (R B R A T ext 8) 6: Mechanism 6-Five-pass authentication 4.3 ISO/IEC ISO/IEC

7 Time variant parameter ISO/IEC Coordinate Universal Clock (UTC) ISO/IEC ISO/IEC Time variant parameter Time variant parameter Time variant parameter Time variant parameter Mechanism 1-One-pass authentication Mechanism 1-One-pass authentication 1. A = B : Cert A T oken AB T oken AB = T A B T ext2 ss A ( T A B T ext1) N A N A 7: Mechanism 1-One-pass authentication Mechanism 2-Two-pass authentication Mechanism 2-Two-pass authentication 1. B = A : R B T ext1 2. A = B : Cert A T oken AB T oken AB = R A R B B T ext3 ss A (R A R B B T ext2) 8: Mechanism 2-Two-pass authentication Mechanism 3-Two-pass authentication Mechanism 3-Two-pass authentication 7

8 1. A = B : Cert A T oken AB 2. B = A : Cert B T oken BA T oken AB = T A B T ext2 ss A ( T A B T ext1) N A N A T oken BA = T B N B A T ext4 ss B ( T B N B A T ext3) 9: Mechanism 3-Two-pass authentication Mechanism 4-Three-pass authentication Mechanism 4-Three-pass authentication 1. B = A : R B T ext1 2. A = B : Cert A T oken AB 3. B = A : Cert B T oken BA T oken AB = R A R B B T ext3 ss A (R A R B B T ext2) T oken BA = R B R A A T ext5 ss B (R B R A A T ext4) 10: Mechanism 4-Three-pass authentication Mechanism -Two-pass parallel authentication Mechanism 5-Two-pass parallel authentication 1. A = B : Cert A R A T ext1 1. B = A : Cert B R B T ext2 2. B = A : T oken BA 2. A = B : T oken AB T oken AB = R A R B B T ext4 ss A (R A R B B T ext3) T oken BA = R B R A A T ext6 ss B (R B R A A T ext5) 11: Mechanism 5-Two-pass parallel authentication 8

9 4.3.6 Five pass authentication (initiated by A) Five pass authentication (initiated by A) 1. A = B : R A I A T ext 1 2. B = A : I B T oken BA 3. A = P : R A R B I A I B T ext4 4. P = A : T ext7 T okent A 5. A = B : T oken AB Option 1 T oken AB = T ext 9 ResA ss T (R B ResA T ext5) ss A (R B R A B A T ext8) T oken BA = R A R B T ext3 ss B (B R A R B A T ext2) T oken T A = ResA ResB ss T (R A ResB T ext6) ss T (R B ResA T ext5) Option 2 T oken AB = R A T ext 9 T okent A ss A (R B R A B A T ext8) T oken BA = R A R B T ext3 ss B (B R A R B A T ext2) T oken T A = ResA ResB ss T (R A R B ResA ResB T ext5) I A = A or CertA I B = B or CertB ResA = (CertA Status), (A P A ) or F ailure ResB = (CertB Status), (B P B ) or F ailure 12: Five pass authentication (initiated by A) Five pass authentication (initiated by B) Five pass authentication (initiated by B) 9

10 1. B = A : R B I B T ext 1 2. A = T P : R A R A I A I B T ext2 3. T P = A : T ext5 T okent A 4. A = B : I A T okenab 5. B = A : T oken BA Option 1 T oken AB = T ext 7 R A ResA ss T (R B ResA T ext3) ss A (R B R A B A T ext6) T oken BA = R A R B T ext9 ss B (A R A R B B T ext8) T oken T A = ResA ResB ss T (R A ResB T ext4) ss T (R B ResA T ext3) Option 2 T oken AB = R A T ext 7 T okent A ss A (R B R A B A T ext6) T oken BA = R A R B T ext9 ss B (R A R B A B T ext8) T oken T A = ResA ResB ss T (R A R B ResA ResB T ext3) I A = A or CertA I B = B or CertB ResA = (CertA Status), (A P A ) or F ailure ResB = (CertB Status), (B P B ) or F ailure 13: Five pass authentication (initiated by B) 4.4 ISO/IEC ISO/IEC CCF Time variant parameter ISO/IEC Coordinate Universal Clock (UTC) ISO/IEC ISO/IEC Time variant parameter Time variant parameter Time variant parameter Time variant parameter 10

11 4.4.1 Mechanism 1-One-pass authentication Mechanism 1-One-pass parallel authentication 1. A = B : T oken AB T oken AB = T A T ext2 f KAB ( T A B T ext1) N A N A 14: Mechanism 1-One-pass authentication Mechanism 2-Two-pass authentication Mechanism 2-Two-pass parallel authentication 1. B = A : R B T ext1 2. A = B : T oken AB T oken AB = T ext3 f KAB (R B B T ext2) 15: Mechanism 2-Two-pass authentication Mechanism 3-Two-pass authentication Mechanism 3-Two-pass parallel authentication 11

12 T oken AB = T oken BA = 1. A = B : T oken AB 2. B = A : T oken BA T A T ext2 f KAB ( T A B T ext1) N A N A T B T ext4 f KAB ( T B A T ext3) N B N B 16: Mechanism 3-Two-pass authentication Mechanism 4-Three-pass authentication Mechanism 4-Three-pass authentication 1. B = A : R B T ext1 2. A = B : T oken AB 3. B = A : T oken BA T oken AB = R A T ext3 f KAB (R A R B B T ext2) T oken BA = T ext5 f KAB (R B R A T ext4) 17: Mechanism 4-Three-pass authentication 5 ISO/IEC , , ISO/IEC , , Three-pass mutual authentication [4] Three-pass mutual authentication ISO/IEC , , ISO/IEC 2. 12

13 3. ISO/IEC , , Time variant parameter ISO/IEC , , [1] M.Abadi and R.Needham, Prudent engineering practice for cryptographic protocols, DEC SRC Technical Report 125, Digital Equipment Corporation (1995) [2] R.Anderson, Security Engineering : A Guide to Buiding Dependable Distributed Systems, John & Wiley Sons (2001) [3] M.Burrows, M.Abadi, and R.Needham, A logic for authentication, SRC Technical Report 39, Digital Equipment Corporation (1989) [4] W.Diffie, P.C.van Oorschot and M.Wiener, Authentication and authenticated key exchanges, Designs, Codes and Cryptography, 2 (1992) [5] ISO/IEC Information Technology - Security Technology - Entity Authentication Part 1: General, ISO/IEC JTC 1/SC 27 DIS : (1996) [6] ISO/IEC Information Technology - Security Technology - Entity Authentication Part 2: Entity authentication using symmetric techniques, ISO/IEC JTC 1/SC 27 N489 CD : (1992) [7] ISO/IEC Information Technology - Security Technology - Entity Authentication Part 2: Entity authentication using symmetric techniques, ISO/IEC JTC 1/SC 27 N739 DIS : (1993) 13

14 [8] ISO/IEC Information Technology - Security Technology - Entity Authentication Part 2: Mechanisms using symmetric encipherment algorithms, ISO/IEC JTC 1/SC 27 N2145 FDIS : (1998) [9] ISO/IEC Information Technology - Security Technology - Entity Authentication Part 3: Mechanisms using digital signature techniques, BS ISO/IEC : (1998) [10] ISO/IEC Information Technology - Security Technology - Entity Authentication Part 4: Mechanisms using a cryptographic check function, ISO/IEC JTC 1/SC 27 N2289 FDIS : (1999) [11] J.Katz and Y.Lindell, Introduction to Modern Cryptography, Chapman & Hall (2008) [12] W.Mao, Modern Cryptography, Prentice Hall (2004) [13] A.J.Menezes, P.C.van Oorschot and S.A.Vanstone, Handbook of Applied Cryptography, CRC Press (1997) [14] DSA NIST FIPS (+Change Notice 1) [15] RSA PKCS #1 v2.1: RSA Cryptography Standard [16] ECDSA SEC 1: Elliptic Curve Cryptography(September 20, 2000 Version 1.0) 14

橡セキュリティポリシー雛形策定に関する調査報告書

橡セキュリティポリシー雛形策定に関する調査報告書 13 2 KM 12 7 10 ISO/IEC TR 13335 Techniques for the Management of IT Security ISO/IEC 15408 Evaluation Criteria for IT Security BS7799 A Code of Practice for Information Security Management RFC2196 Site

More information

ASF-01

ASF-01 暗号モジュール試験及び認証制度 (JCMVP) 承認されたセキュリティ機能に関する仕様 平成 26 年 4 月 1 日独立行政法人情報処理推進機構 ASF-01 A p p r o v e d S e c u r i t y F u n c t i o n s 目次 1. 目的... 1 2. 承認されたセキュリティ機能... 1 公開鍵... 1 共通鍵... 3 ハッシュ... 4 メッセージ認証...

More information

21 Key Exchange method for portable terminal with direct input by user

21 Key Exchange method for portable terminal with direct input by user 21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with

More information

Information Security Management System ISMS Copyright JIPDEC ISMS,

Information Security Management System ISMS Copyright JIPDEC ISMS, ISMS Copyright JIPDEC ISMS, 2005 1 Copyright JIPDEC ISMS, 2005 2 Copyright JIPDEC ISMS, 2005 3 Copyright JIPDEC ISMS, 2005 4 ISO JIS JIS ISO JIS JIS JIS ISO JIS JIS 22 23 ISO SC27 ISO SC27 ISO/IEC 17799

More information

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63> 2008 年度版リストガイド ( メッセージ認証コード ) 平成 21 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 1 1 1.1............................. 1 1.1.1............................ 1 1.1.2....................... 1 1.1.3...........................

More information

<4D F736F F D F81798E518D6C8E9197BF33817A88C38D868B5A8F70834B D31292E646F63>

<4D F736F F D F81798E518D6C8E9197BF33817A88C38D868B5A8F70834B D31292E646F63> 参考資料 3 CRYPTREC 暗号技術ガイドライン (SHA-1) 2014 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 目次 1. 本書の位置付け... 1 1.1. 本書の目的... 1 1.2. 本書の構成... 1 1.3. 注意事項... 1 2. ハッシュ関数 SHA-1 の利用について... 2 2.1. 推奨されない利用範囲... 2 2.2. 許容される利用範囲...

More information

活用ガイド(ハードウェア編)

活用ガイド(ハードウェア編) 4 5 6 1 2 3 7 8 MITSUBISHI ELECTRIC INFORMATION TECHNOLOGY CORPORATION 2010 9 PART 1 10 11 PART 2 PART 3 12 PART 4 PART 5 13 P A R T 1 16 1 17 18 1 19 20 1 21 22 1 1 2 23 1 2 3 4 24 1 25 26 1 27 1 2 3

More information

http://www.ipa.go.jp/security/ Contents 1. NIST 2010 2. NISC 3. CRYPTREC 2008 10 28 Copyrignt 2008, IPA all right reserved. 2 1977 MAC) PKI PKI PKI: (Public Key Infrastructure) 2008 10 28 Copyrignt 2008,

More information

「暗号/情報セキュリティ」

「暗号/情報セキュリティ」 atsuhiro@iss.isl.melco.co.jp 2002-10-21 PKI PKI: (Public Key Infrastructure) 1976 DES 1978 Privacy Money ()DES, RIJNDAEL, MISTY, KASUMI () RSA, DSA, I Love You ( ) A 55 m m 8 & $ ( ) I Love You A B

More information

B's Recorderマニュアル_B's Recorderマニュアル

B's Recorderマニュアル_B's Recorderマニュアル 5 Part 6 - 8 9 - 0 5 A C B AB A B A B C 7-6 - 8 9-5 0 5 7 A D B C E F A B C D F E 6 9 8 0 Part - - 5 5 7 6 9-7 6 8 0 5 5-6 7 9 8 5-5 50 5 5 5 -6 5 55 5 57-7 56 59 8 7 6 58 0 8 9 6 6 7 6 5 60 7 5 6 6-8

More information

B's Recorderマニュアル

B's Recorderマニュアル 2 3 4 5 Part 1 6 1-1 8 9 1-2 10 11 12 13 A B C A C B AB A B 14 15 17 1-4 2 1 16 1-3 18 19 1-5 2 1 20 21 22 23 24 25 A B C D E F A B C D E F 26 27 28 29 30 31 Part 2 32 2-1 2-2 1 2 34 35 5 37 4 3 36 6 2-3

More information

untitled

untitled 22 2 ii 20 10 iii iv 1...1 1.1....1 1.2....2 1.3....3 2...10 2.1....10 2.1.1....10 2.1.1.1.... 11 2.1.1.2....13 2.1.2....16 2.1.3....18 2.1.3.1....18 2.1.3.2....21 2.1.3.3....22 2.2....25 3...29 3.1....29

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1

(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding Theory) (safely) (ryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

( ) () 67 ( ) () 69 ( ) ( ) 7 () 7 () 73 ( ) 74 ( ) 75 () 76 () 77 () 78 ( ) 79 ( ) ( ) 8 ( ) 4 8 ( )

( ) () 67 ( ) () 69 ( ) ( ) 7 () 7 () 73 ( ) 74 ( ) 75 () 76 () 77 () 78 ( ) 79 ( ) ( ) 8 ( ) 4 8 ( ) ( ) 7 7 9 3 ( ) ( ) 3 ( ) 4 ( ) 5 ( ) 6 ( ) 3 7 ( ) 8 () 4 9 ( ) () 5 3 () ( ) 3 ( ) 4 ( ) 5 ( ) 6 ( ) 7 ( ) 8 ( ) 3 6 3 7 8 9 4 9 ( ) ( ) ( ) () 5 3 ( ) 4 ( ) 5 ( ) 6 ( ) 7 ( ) 8 ( ) 9 ( ) 3 ( ) 6 33

More information

17 18 2

17 18 2 17 18 2 18 2 8 17 4 1 8 1 2 16 16 4 1 17 3 31 16 2 1 2 3 17 6 16 18 1 11 4 1 5 21 26 2 6 37 43 11 58 69 5 252 28 3 1 1 3 1 3 2 3 3 4 4 4 5 5 6 5 2 6 1 6 2 16 28 3 29 3 30 30 1 30 2 32 3 36 4 38 5 43 6

More information

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F E718F9096BC816A5F E646F63>

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F E718F9096BC816A5F E646F63> 2008 年度版リストガイド ( 電子署名 ) 平成 21 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 1 1 1.1............................. 1 1.1.1............................ 1 1.1.2....................... 1 1.1.3...........................

More information

リテール・バンキング・システムのICカード対応に関する現状とその課題

リテール・バンキング・システムのICカード対応に関する現状とその課題 IC IC IC ATM IC IC ATM IC IC IC IC E-mail: yuuko.tamura@boj.or.jp E-mail: hirokawa@imes.boj.or.jp IC IC MS IC IC IC IC IC IC IC MS IC IC IC IC IC ICIC ICATM ATMIC IC IC ATMMS IC MS IC IC IC IC ATM IC ICIC

More information

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR for Web SR Certificate Policy Version 2.50 2017 5 23 1.00 2008/02/25 1.10 2008/09/19 1.20 2009/05/13 5 1.30 2012/02/15 5.6 CA 1.40 2012/11/09 OCSP SubjectAltName 2.00 2013/12/02 SECOM Passport for Web

More information

/07/ /10/12 I

/07/ /10/12 I Certificate Policy Version 1.10 2018 10 12 1.00 2018/07/24 1.10 2018/10/12 I 1.... 1 1.1... 1 1.2... 1 1.3 PKI... 2 1.3.1 CA... 2 1.3.2 RA... 2 1.3.3... 2 1.3.3.1... 2 1.3.3.2... 3 1.3.4... 3 1.3.5...

More information

ISMSクラウドセキュリティ認証の概要

ISMSクラウドセキュリティ認証の概要 Copyright JIPDEC ISMS, 2016 1 ISMS ISO/IEC 27017:2015 Copyright JIPDEC ISMS, 2016 2 JIS Q 27001(ISO/IEC 27001) ISO/IEC 27017 ISMS ISO/IEC 27017 ISO/IEC 27002 Copyright JIPDEC ISMS, 2016 3 ISO/IEC 27017:2015

More information

暗号方式委員会報告(CRYPTRECシンポジウム2012)

暗号方式委員会報告(CRYPTRECシンポジウム2012) 暗号方式委員会活動報告 安全性 実装性能評価リスト入りまでの基本的な流れ 事務局選出暗号 公募暗号技術 現リスト掲載暗号 次期リスト 電子政府推奨暗号リスト 推奨候補暗号リスト 運用監視暗号リスト 現リストのカテゴリ 技術分類公開鍵暗号共通鍵暗号その他 署名守秘鍵共有 64ビットブロック暗号 128 ビットブロック暗号 ストリーム暗号 ハッシュ関数 擬似乱数生成系 現リスト : 公開鍵暗号 技術分類

More information

2

2 m.uehata@sii.co.jp 2 SII 1881 1892 1937 1959 3 SEIKO 1881 1955 1964 1974 1984 1992 1994 1998 1998 2002 2002 4 SII 1960 1970 1980 1990 CMOS IC LCD LCM 2000 COF 1937 VLSI FIB 5 < > SA EOA CAE < > 6 Network

More information

#2 (IISEC)

#2 (IISEC) #2 (IISEC) 2007 10 6 E Y 2 = F (X) E(F p ) E : Y 2 = F (X) = X 3 + AX + B, A, B F p E(F p ) = {(x, y) F 2 p y2 = F (x)} {P } P : E(F p ) E F p - Given: E/F p : EC, P E(F p ), Q P Find: x Z/NZ s.t. Q =

More information

スライド 1

スライド 1 IPA 2010 3 25 1 1 / / 2 (DRBG) DRBG NIST SP800-90 2 1 3 JCMVP 2009 1 JCATT AES 15 4 5 OK/NG OK ( ) ( ) 6 JCMVP JCATT JCATT http://www.ipa.go.jp/security/jcmvp/open_documents.html 7 332 (DES, Triple-DES,

More information

楕円曲線暗号の整備動向 +楕円暗号の実装状況

楕円曲線暗号の整備動向  +楕円暗号の実装状況 楕円曲線暗号の整備動向 + 楕円暗号の実装状況 2011 年 2 23 筑波 学 岡晃 2011/2/23 JNSA PKI 相互運用 WG 1 IPA 情報セキュリティ技術動向調査 TG ( タスク グループ ) 広範な情報セキュリティ分野において 継続的に かつ 質の い技術情報を収集し続けるため 半期毎に発表会形式の会合を開催し 討議をふまえて調査報告書を作成します http://www.ipa.go.jp/security/outline/comm

More information

untitled

untitled () 1 / 11 2 / 11 ( ) X X X 3 / 11 26 ()2 1 (d)5 (f)6 芦 4 / 11 5 / 11 6 / 11 (a) (b) 7 / 11 (c) 8 / 11 9 / 11 2011 1 2 1 30 20 20 Y A B Y B A Y B Y Y A B Y BA B A Y A A Y Y 4 X A B2 Y X A B 2/3 3 A B X

More information

1 2 1.1............................................ 3 1.2.................................... 7 1.3........................................... 9 1.4..

1 2 1.1............................................ 3 1.2.................................... 7 1.3........................................... 9 1.4.. 2010 8 3 ( ) 1 2 1.1............................................ 3 1.2.................................... 7 1.3........................................... 9 1.4........................................

More information

TLS 1.2 TLS TLS iijlab-seminar pd

TLS 1.2 TLS   TLS iijlab-seminar pd TLS 1.3 2018.2.14 @kazu_yamamoto 1 TLS 1.2 TLS https://www.iij.ad.jp/dev/report/iir/031/03_01.html TLS 1.3 http://seminar-materials.iijlab.net/iijlab-seminar/ iijlab-seminar-20170110.pdf HTTPS SEO https://employment.en-japan.com/engineerhub/

More information

特集_03-07.Q3C

特集_03-07.Q3C 3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution

More information

SEJulyMs更新V7

SEJulyMs更新V7 1 2 ( ) Quantitative Characteristics of Software Process (Is There any Myth, Mystery or Anomaly? No Silver Bullet?) Zenya Koono and Hui Chen A process creates a product. This paper reviews various samples

More information

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking RSA Group Name RSA C

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking RSA Group Name RSA C 2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name RSA Group Name RSA Code Elliptic Curve Cryptograrhy Group /Project No. 13-B /Project Leader 1009087 Takahiro

More information

第3 章 電子認証技術に関する国際動向

第3 章 電子認証技術に関する国際動向 3 IETF PKI TAM Trust Anchor Management 3. IETF Internet Engineering Task Force PKIX WG 3.1. IETF PKIX WG 1 2006 PKI Public-Key Infrastructure IETF PKIX WG 2007 69 IETF 70 IETF WG PKIX WG 2006 3 2 3.2.

More information

JJ-90

JJ-90 Table 1 Message types added to ITU-T Recommendation Q.763 Message type Abbreviation Reference Code Comments Charge information CHG 4-30/JT-Q763 11111110 The description of a Charge information message

More information

YMS-VPN1_User_Manual

YMS-VPN1_User_Manual YAMAHA VPN YMS-VPN1 2007 12 YAMAHA VPN YMS-VPN1 YMS-VPN1 RT Windows PC IPsec VPN 2000-2002 SSH Communications Security Corp 2004-2007 SafeNet Inc. 2004-2007 dit Co., Ltd. 2006-2007 YAMAHA CORPORATION MicrosoftWindows

More information

°Å¹æ¥Ï¥Ã¥·¥å´Ø¿ô

°Å¹æ¥Ï¥Ã¥·¥å´Ø¿ô 1 / 37 (Cryptographic Hash Functions) H : {0, 1} {0, 1} l (Unkeyed hash function) (MDC: Manipulation Detection Code) (Keyed hash function) (MAC: Message Authentication Code) 2 / 37 OAEP (One-wayness) (Preimage

More information

001†`032 (Page 1)

001†`032 (Page 1) ISO の国際標準化専門委員会 2 International Organization for Standardization (ISO) CASCO COPOLCO DEVCO INFCO General Assembly Member Bodies Correspondent Members Subscriber Members Council Technical Management

More information

ESIGN-TSH 1.0 NTT

ESIGN-TSH 1.0 NTT ESIGN-TSH 10 NTT 2002 5 23 1 3 2 4 3 4 31 (I2BSP) 4 32 (BS2IP) 6 33 (BS2OSP) 6 34 (OS2BSP) 7 35 (I2OSP) 7 36 (OS2IP) 8 4 8 41 ESIGN 8 42 ESIGN 9 5 9 51 KGP-ESIGN-TSH 9 52 SP-ESIGN-TSH 9 53 VP-ESIGN-TSH

More information

楕円曲線暗号と RSA 暗号の安全性比較

楕円曲線暗号と RSA 暗号の安全性比較 RSA, RSA RSA 7 NIST SP-7 Neal Koblitz Victor Miller ECDLP (Elliptic Curve Discrete Logarithm Problem) RSA Blu-ray AACS (Advanced Access Control System) DTCP (Digital Transmission Content Protection) RSA

More information

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati 2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Group Name Implemation Group /Project No. 13-C /Project Leader 1009087 Takahiro Okubo /Group Leader 1009087

More information

untitled

untitled 351 351 351 351 13.0 0.0 25.8 1.0 0.0 6.3 92.9 0.0 80.5 0.0 1.5 15.9 0.0 3.5 13.1 0.0 30.0 54.8 18.0 0.0 27.5 1.0 0.0 2.5 94.7 0.0 91.7 0.0 1.3 14.7 0.0 3.8 14.4 0.0 25.0 50.5 16.0 0.0 27.5 2.0 0.0 2.5

More information

1 + 1 + 1 + 1 + 1 + 1 + 1 = 0? 1 2003 10 8 1 10 8, 2004 1, 2003 10 2003 10 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ( )?, 1, 8, 15, 22, 29?, 1 7, 1, 8, 15, 22,

More information

Block cipher

Block cipher 18 12 9 1 2 1.1............................... 2 1.2.................. 2 1.3................................. 4 1.4 Block cipher............................. 4 1.5 Stream cipher............................

More information

情報分野のアクセシビリティ標準について

情報分野のアクセシビリティ標準について 情報分野のアクセシビリティ標準について 経済産業省国際電気標準課 小出啓介 Agenda 1. 障害者白書 2. JTC 1/SC 35 で開発しているアクセシビリティ関連規格の紹介 3. 映像字幕事業 (ISO/IEC 20071-23) の取り組みの紹介 4. JIS X 8341-3 の改正について 5. Web Accessibility, BSI Code of Practice 規格の開発と国内対応について

More information

1 TSUCHIYA HOME TSUCHIYA HOME 2

1 TSUCHIYA HOME TSUCHIYA HOME 2 Web Information http://www.tsuchiya.co.jp/ 32 TSUCHIYA IR REPORT Cert no. SGS-COC-2499 1 TSUCHIYA HOME TSUCHIYA HOME 2 TSUCHIYA HOME TSUCHIYA HOME 3 4 19131 7,364 14,242 21,66 18131 7,88 14,241 22,122

More information

Ł½’¬24flNfix+3mm-‡½‡¹724

Ł½’¬24flNfix+3mm-‡½‡¹724 571 0.0 31,583 2.0 139,335 8.9 310,727 19.7 1,576,352 100.0 820 0.1 160,247 10.2 38,5012.4 5,7830.4 9,5020.6 41,7592.7 77,8174.9 46,425 2.9 381,410 24.2 1,576,352 100.0 219,332 13.9 132,444 8.4 173,450

More information

untitled

untitled 1 Report 3 4 8 10 14 16 Topics 18 18 19 19 20 20 21 21 22 23 Information 25 25 2013.9 No.80 1 2 2013.9 No.80 Report 2013.9 No.80 3 4 2013.9 No.80 2013.9 No.80 5 6 2013.9 No.80 2013.9 No.80 7 8 2013.9 No.80

More information

untitled

untitled Report 1 2 2 3 5 7 10 12 14 Topics 16 17 18 19 20 21 Information 25 25 Report 2015.9 No.86 1 2 2015.9 No.86 2015.9 No.86 3 4 2015.9 No.86 2015.9 No.86 5 6 2015.9 No.86 2015.9 No.86 7 8 2015.9 No.86 2015.9

More information

ICカードに利用される暗号アルゴリズムの安全性について:ENV仕様の実装上の問題点を中心に

ICカードに利用される暗号アルゴリズムの安全性について:ENV仕様の実装上の問題点を中心に IC IC IC ICIC EMVEMV IC EMVIC EMV ICEMVRSAkey TDES TDES-MAC E-mail: masataka.suzuki@boj.or.jp NTTE-mail: kanda.masayuki@lab.ntt.co.jp IC IC IC IC EMV JCCA ICJCCA ICEMV EMVIC EMV EMV EMVEMVCo EMV EMV EMVICIC

More information

1 2 3 4 5 1 1 136 2 137 2 1 1 138 2 1 2 139 140 141 142 3 143 3 144 145 4 1 2 146 3 4 147 5 1 2 3 148 1 2 149 3 5 1 2 150 3 151 1 152 2 153 6 1 2 154 3 155 4 1 156 2 3 4 5 157 7 1 2 3 4 158 5 159 6 8 1

More information

暗号プロトコル評価結果 独立行政法人情報通信研究機構 1. プロトコル名 :PKM 2. 関連する標準 IEEE Std e 使用したツール :S

暗号プロトコル評価結果 独立行政法人情報通信研究機構 1. プロトコル名 :PKM 2. 関連する標準 IEEE Std e 使用したツール :S 暗号プロトコル評価結果 独立行政法人情報通信研究機構 1. プロトコル名 :PKM 2. 関連する標準 IEEE Std 802.16e-2005 http://standards.ieee.org/getieee802/download/802.16e-2005.pdf 3. 使用したツール :Scyther 4. 評価の概要 :Scyther による評価では weak agreement への攻撃の可能性が指摘されているが

More information

Copyright 2002-2003 SATO International All rights reserved. http://www.satoworldwide.com/ This software is based in part on the work of the Independen

Copyright 2002-2003 SATO International All rights reserved. http://www.satoworldwide.com/ This software is based in part on the work of the Independen SATO Label Gallery SATO International Pte Ltd Version : BSI-021227-01 Copyright 2002-2003 SATO International All rights reserved. http://www.satoworldwide.com/ This software is based in part on the work

More information

untitled

untitled 2001 9 11 5 () IC ICAO(ICAO-TR) (GSC-IS) / ISO/IEC CD 19794-5 5 8 ICAO-NTWG SC17/WG3 16 3 31 Personal ID Documents 1 ------------------------------------------------------------------ 3 2 ---------------------------------------------------------------------

More information

光学

光学 Received January 8, 010; Revised August 4, 010; Accepted September 30, 010 39, 1 010 598 604 808 0135 1 1 815 8540 4 9 1 The Effects of Stimulus Size and Retinal Position on Depth Perception from Binocular

More information

ネットショップ・オーナー2 ユーザーマニュアル

ネットショップ・オーナー2  ユーザーマニュアル 1 1-1 1-2 1-3 1-4 1 1-5 2 2-1 A C 2-2 A 2 C D E F G H I 2-3 2-4 2 C D E E A 3 3-1 A 3 A A 3 3 3 3-2 3-3 3-4 3 C 4 4-1 A A 4 B B C D C D E F G 4 H I J K L 4-2 4 C D E B D C A C B D 4 E F B E C 4-3 4

More information

EPSON エプソンプリンタ共通 取扱説明書 ネットワーク編

EPSON エプソンプリンタ共通 取扱説明書 ネットワーク編 K L N K N N N N N N N N N N N N L A B C N N N A AB B C L D N N N N N L N N N A L B N N A B C N L N N N N L N A B C D N N A L N A L B C D N L N A L N B C N N D E F N K G H N A B C A L N N N N D D

More information

ありがとうございました

ありがとうございました - 1 - - 2 - - 3 - - 4 - - 5 - 1 2 AB C A B C - 6 - - 7 - - 8 - 10 1 3 1 10 400 8 9-9 - 2600 1 119 26.44 63 50 15 325.37 131.99 457.36-10 - 5 977 1688 1805 200 7 80-11 - - 12 - - 13 - - 14 - 2-1 - 15 -

More information

EPSON エプソンプリンタ共通 取扱説明書 ネットワーク編

EPSON エプソンプリンタ共通 取扱説明書 ネットワーク編 K L N K N N N N N N N N N N N N L A B C N N N A AB B C L D N N N N N L N N N A L B N N A B C N L N N N N L N A B C D N N A L N A L B C D N L N A L N B C N N D E F N K G H N A B C A L N N N N D D

More information

公務員人件費のシミュレーション分析

公務員人件費のシミュレーション分析 47 50 (a) (b) (c) (7) 11 10 2018 20 2028 16 17 18 19 20 21 22 20 90.1 9.9 20 87.2 12.8 2018 10 17 6.916.0 7.87.4 40.511.6 23 0.0% 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2.0% 4.0% 6.0% 8.0%

More information

Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 A B (A/B) 1 1,185 17,801 6.66% 2 943 26,598 3.55% 3 3,779 112,231 3.37% 4 8,174 246,350 3.32% 5 671 22,775 2.95% 6 2,606 89,705 2.91% 7 738 25,700 2.87% 8 1,134

More information

橡hashik-f.PDF

橡hashik-f.PDF 1 1 1 11 12 13 2 2 21 22 3 3 3 4 4 8 22 10 23 10 11 11 24 12 12 13 25 14 15 16 18 19 20 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 144 142 140 140 29.7 70.0 0.7 22.1 16.4 13.6 9.3 5.0 2.9 0.0

More information

198

198 197 198 199 200 201 202 A B C D E F G H I J K L 203 204 205 A B 206 A B C D E F 207 208 209 210 211 212 213 214 215 A B 216 217 218 219 220 221 222 223 224 225 226 227 228 229 A B C D 230 231 232 233 A

More information

1

1 1 2 3 4 5 (2,433 ) 4,026 2710 243.3 2728 402.6 6 402.6 402.6 243.3 7 8 20.5 11.5 1.51 0.50.5 1.5 9 10 11 12 13 100 99 4 97 14 A AB A 12 14.615/100 1.096/1000 B B 1.096/1000 300 A1.5 B1.25 24 4,182,500

More information

05[ ]戸田(責)村.indd

05[ ]戸田(責)村.indd 147 2 62 4 3.2.1.16 3.2.1.17 148 63 1 3.2.1.F 3.2.1.H 3.1.1.77 1.5.13 1 3.1.1.05 2 3 4 3.2.1.20 3.2.1.22 3.2.1.24 3.2.1.D 3.2.1.E 3.2.1.18 3.2.1.19 2 149 3.2.1.23 3.2.1.G 3.1.1.77 3.2.1.16 570 565 1 2

More information

/9/ ) 1) 1 2 2) 4) ) ) 2x + y 42x + y + 1) 4) : 6 = x 5) : x 2) x ) x 2 8x + 10 = 0

/9/ ) 1) 1 2 2) 4) ) ) 2x + y 42x + y + 1) 4) : 6 = x 5) : x 2) x ) x 2 8x + 10 = 0 1. 2018/9/ ) 1) 8 9) 2) 6 14) + 14 ) 1 4 8a 8b) 2 a + b) 4) 2 : 7 = x 8) : x ) x ) + 1 2 ) + 2 6) x + 1)x + ) 15 2. 2018/9/ ) 1) 1 2 2) 4) 2 + 6 5) ) 2x + y 42x + y + 1) 4) : 6 = x 5) : x 2) x 2 15 12

More information

XMLを基盤とするビジネスプロトコルの動向

XMLを基盤とするビジネスプロトコルの動向 XML Trends of XML-Based Business Protocols ebxml Web XML ebxml UN/CEFACT EDIFACTOASIS XML Web W3C World Wide Web Consortium Abstract XML-based technologies such as the Electronic Business XML Initiative

More information

PKIの標準化動向と リソースPKI

PKIの標準化動向と リソースPKI PKI Day 2009 2009 6 24 PKI PKI JPNIC RFC5280 PKI RFC5280 PKI RPKI IP RPKI RFC5280 RFC5280 RFC3280 PKI RFC5280 RFC5280 1/4 RFC5280 X.509-based PKI X.509CRL 2008 5published RFC5280 2/4 1988 1995 1997 1999

More information

Proposal of addition of new cipher suites to TLS to support Camellia, EPOC, and PSEC Shiho Moriai NTT Laboratories th

Proposal of addition of new cipher suites to TLS to support Camellia, EPOC, and PSEC Shiho Moriai NTT Laboratories th Proposal of addition of new cipher suites to TLS to support Camellia, EPOC, and PSEC Shiho Moriai shiho@isl.ntt.co.jp NTT Laboratories 128-bit Block Cipher Camellia Kazumaro Aoki * Tetsuya Ichikawa Masayuki

More information

..0.._0807...e.qxp

..0.._0807...e.qxp 4 6 0 4 6 0 4 6 8 30 34 36 38 40 4 44 46 8 8 3 3 5 4 6 7 3 4 6 7 5 9 8 3 4 0 3 3 4 3 5 3 4 4 3 4 7 6 3 9 8 Check 3 4 6 5 3 4 0 3 5 3 3 4 4 7 3 3 4 6 9 3 3 4 8 3 3 3 4 30 33 3 Check Check Check Check 35

More information

h01

h01 P03 P05 P10 P13 P18 P21 1 2 Q A Q A Q A Q A Q A 3 1 check 2 1 2-1 2-2 2-3 2-4 2-5 2-5-1 2-6 2-6-1 2-6-2 2-6-3 3 3-1 3-2 3-3 3-4 3 check 4 5 3-5 3-6 3-7 3-8 3-9 4-1 4-1-1 4-2 4-3 4-4 4-5 4-6 5-1 5-2 4

More information

1 2 3 4 1 2 1 2 3 4 5 6 7 8 9 10 11 27 29 32 33 1 2 3 7 9 11 13 15 17 19 21 23 26 CHECK! 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

More information

CompuSec SW Ver.5.2 アプリケーションガイド(一部抜粋)

CompuSec SW Ver.5.2 アプリケーションガイド(一部抜粋) 64 PART 9 65 66 PART10 67 1 2 3 68 PART 10 4 5 69 1 2 3 4 5 70 PART 10 6 7 8 6 9 71 PART11 72 PART 11 1 2 3 73 4 5 6 74 PART 11 7 8 9 75 PART12 76 PART 12 1 2 3 4 1 2 3 4 77 1 2 3 4 5 6 7 8 78 PART13 79

More information

65歳雇用時代の賃金制度のつくり方

65歳雇用時代の賃金制度のつくり方 1 65 2005 2 65 18 65 2 PART 165 6 7 8 11 14 16 60 17 25 PART 2 28 35 () 10 35 () 35 () 36 () 39 () 39 () 41 () 42 () 42 () 44 (10) 44 (11) 47 1 15 2007 2 35 3 10 10 2.5 2.5 1.5 0.5 2.5 2.5 1.5 0.5 10

More information

Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1

Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1 Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1 ISO/IEC 15408 ISO/IEC 15408 Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved.

More information

RE-S26A(第1版)

RE-S26A(第1版) RE-S6A 44 44 45 40 37 37 38 38 38 39 37 36 40 40 4 4 43 43 43 43 34 35 35 35 34 44 4 9 9 9 8 8 45 45 45 45 45 45 3 3 3 33 33 33 3 3 3 30 30 30 30 30 3 47 89 0 3 45 3 67 5 46 47 4849 50 5 9 8 0 4 6 6 7

More information

1

1 1 2 3 4 5 0% 20% 40% 60% 80% 100% 6 7 8 0% 20% 40% 60% 80% 100% 9 0% 20% 40% 60% 80% 100% 10 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% 2529 (n=17) 3034 35 (n=21) (n=17) 2529 (n=19) 3034 35 (n=34) (n=64)

More information