ESIGN-TSH 1.0 NTT

Size: px
Start display at page:

Download "ESIGN-TSH 1.0 NTT"

Transcription

1 ESIGN-TSH 10 NTT

2 (I2BSP) 4 32 (BS2IP) 6 33 (BS2OSP) 6 34 (OS2BSP) 7 35 (I2OSP) 7 36 (OS2IP) ESIGN 8 42 ESIGN KGP-ESIGN-TSH 9 52 SP-ESIGN-TSH 9 53 VP-ESIGN-TSH SSA-ESIGN-TSH EMSA-ESIGN-TSH SHA MGF1 14 A 16 B 16 C 16 2

3 1,, ESIGN-TSH, IEEE P1363a / D10 [1] IFSP-ESIGN, IFVP-ESIGN, EMSA5, ESIGN-TSH, SSA-ESIGN-TSH-Sign SSA-ESIGN-TSH-Verify, KGP-ESIGN-TSH SP-ESIGN-TSH VP-ESIGN-TSH EMSA-ESIGN-TSH 3

4 R Z N a = b b a, a b (B 0, B 1,, B i 1 ) 2 i N, i, (0, 1, 0, 0) 2 (M 0, M 1,, M i 1 ) 256 i N, i, (170, 255, 00) 256 {0, 1} i i N, i i = 0, {0, 1} {0, 1} i i=0 {0, 1,, 255} i i N, i i = 0, {0, 1,, 255} {0, 1,, 255} i y y [X] y GCD(a, b) a b a mod m a 1 mod m i=0, (0, 1, 0, 0) 2 (1, 1, 0) 2 = (0, 1, 0, 0, 1, 1, 0) 2, (170, 255) 256 (0, 20) 256 = (170, 255, 0, 20) 256, y R, y y R, y y N, X y a N, b N, a b a Z, b Z, a b a Z, m N, m (b a) b a Z, m N, ab mod m = 1 b 3, 1 31 (I2BSP), 2 I2BSP(x, l) x, l, 4

5 n =, M i {0, 1,, 255} 8 M = M 0 M 1 M n 1 I2OSP(x, l) OS2IP(M, l) x B = B 0 B 1 B l 1 B i {0, 1} BS2IP(B, l) I2BSP(x, l) BS2OSP(B, l) OS2BSP(M, l) 1 B l INVALID 1 l = 0, 2 x 2 l, INVALID 3 0 i l 1 i x 2 x i {0, 1} x = x l 1 2 l 1 + x l 2 2 l x x i l 1 i B i = x l 1 i 5 B B = B 0 B 1 B l 1 5

6 32 (BS2IP), 2 BS2IP(B, l) B l B, x B = B 0 B 1 B l 1 x 1 l = 0, 0 2 B i 0 1, 0 i l 1 i x i = B i l 1 x = 2 (l 1 i) x i 3 x i=0 33 (BS2OSP), 8 0, 8 BS2OSP(B, l) B l B, M n = 8 B = B 0 B 1 B l 1 M = M 0 M 1 M n 1 1 l = 0, 2 0 < i n 1 i M i = B l 8 8(n 1 i) B l 7 8(n 1 i) B l 1 8(n 1 i) 3 M 0 { B0 B 1 B 7 (8n l = 0) M 0 = ZB 0 B 1 B l+7 8n (8n l 0),, Z 8n l, 0 (Z = (0, 0,, 0) 2 ) 6

7 4 M 34 (OS2BSP), OS2BSP(M, l) M n = 8 l, B l M = M 0 M 1 M n 1 B = B 0 B 1 B l 1 1 l = 0, 2 0 < i n 1 i B l 8 8(n 1 i) B l 7 8(n 1 i) B l 1 8(n 1 i) = M i 3 0 j l+7 8n i, B j = Z j+8n l, Z 0 Z 1 Z 7 = M 0 4 B 35 (I2OSP), 256 I2OSP(x, l) x, l x, M n = 8 INVALID 1 l = 0, 2 x 2 l, INVALID 7

8 3 0 i n 1 i x 256 x i {0,, 255} x = x n 1 2 8(n 1) + x n 2 2 8(n 2) + + x x i n 1 i M i = x n 1 i 5 M M = M 0 M 1 M n 1 36 (OS2IP), 256 OS2IP(M, l) M n = 8 l x, x M = M 0 M 1 M n 1 x 1 l = 0, 0 2 M i 0 255, 0 i l 1 i x i = M i 3 x x = n 1 i=0 2 8(n 1 i) x i mod 2 l 4, ESIGN ESIGN 2 41 ESIGN ESIGN 5 p q n, plen, e, 8

9 ESIGN 2 plen 1 < p < 2 plen, 2 plen 1 < q < 2 plen, n = p 2 q, 2 3pLen 1 < n < 2 3pLen 42 ESIGN ESIGN 3 n, plen, e, ESIGN 2 3pLen 1 < n < 2 3pLen 5, 3 51 KGP-ESIGN-TSH KGP-ESIGN-TSH(k, e) k, e, P K ESIGN (n, plen, e) SK ESIGN (p, q, n, plen, e) INVALID 1 e e < 8, INVALID 2 2 k 1 < p < 2 k, 2 k 1 < q < 2 k, p q, 2 3k 1 < p 2 q < 2 3k p, q, n = p 2 q 3 plen = k 4 P K = (n, plen, e), SK = (p, q, n, plen, e) 52 SP-ESIGN-TSH SP-ESIGN-TSH(SK, f), 9

10 SK ESIGN (p, q, n, plen, e) f, 0 f < 2 plen 1 s, 0 s < n INVALID SK 1 f 0 f < 2 plen 1, INVALID 2 z = f 2 2pLen 3 GCD(r, n) = 1 r {1, 2,, pq 1} 4 α = (z r e ) mod n 5 (w 0, w 1 ) α w 0 =, pq w 1 = w 0 pq α 6 w 1 w 1 2 2pLen 1, 3 7 t = w 0 (er e 1 ) 1 mod p, s = r + tpq 8 s, 53 VP-ESIGN-TSH VP-ESIGN-TSH(P K, s), P K ESIGN (n, plen, e) s, 0 s < n f, 0 f < 2 plen 1 INVALID P K 1 s 0 s < n, INVALID 2 T = s e mod n T 3 f = 2 2pLen 4 f 0 f < 2 plen 1, INVALID 5 f 10

11 , 6, 1 61 SSA-ESIGN-TSH SSA-ESIGN-TSH, SP-ESIGN-TSH, VP-ESIGN-TSH EMSA-ESIGN-TSH 611 SSA-ESIGN-TSH-Sign(SK, M), SK ESIGN M, s, 0 s < n INVALID 1 EMSA-ESIGN-TSH-Encode (711 ), M f f = EMSA-ESIGN-TSH-Encode(M, plen 1), INVALID, INVALID 2 SP-ESIGN-TSH (52 ), SK f s s = SP-ESIGN-TSH(SK, f) 3 s 612 SSA-ESIGN-TSH-Verify(P K, M, s), P K ESIGN M,, s, 0 s < n VALID SIGNATURE INVALID SIGNATURE 11

12 1 VP-ESIGN-TSH (53 ), P K s f f = VP-ESIGN-TSH(P K, s), INVALID, INVALID SIGNATURE 2 EMSA-ESIGN-TSH-Verify (712 ), f M Result = EMSA-ESIGN-TSH-Verify(M, f, plen 1), Result CONSISTENT, VALID SIGNATURE, INVALID SIGNATURE 7, 1 71 EMSA-ESIGN-TSH, IEEE P1363a / D10 [1] EMSA5 711 EMSA-ESIGN-TSH-Encode(M, l), Hash hlen, MGF M, l, f, INVALID 1, M, INVALID hlen 2 M, H 8 H = Hash(M) 3 H, T 8 T = MGF (H, l) 12

13 4 T f 5 f f = OS2IP(T, l) 712 EMSA-ESIGN-TSH-Verify(M, f, l), Hash hlen, MGF M, f, l f, CONSISTENT INVALID 1 f, T T = I2BSP(f, l), I2BSP INVALID, INVALID 2, M, INVALID hlen 3 M, H 8 H = Hash(M) 4 H, T 8 T = MGF (H, l) 5 T T T = OS2BSP(T, l) 6, T T, CONSISTENT, INVALID 8, 13

14 81, SHA SHA-1 SHA-1 FIPS PUB [2] SHA-1 160, , MGF1 [3] 821 MGF1 MGF1 MGF1(M, l) Hash hashlen, M, l, mask, 8 INVALID 1 l 0 M, l , INVALID 2 cthreshold = l hashlen 3 M 4 counter = 0 (a) counter 32 C C = I2OSP(counter, 32) hashlen (b) M C, 8 H H = Hash(M C) (c) M H, M M = M H 14

15 (d) counter 1 counter < cthreshold, 4a 5 M mask 8 mask = M 0M 1 M l/8 1 6 mask [1] IEEE P1363a / D10 (Draft Version 10), Standard Specifications for Public Key Cryptography Additional Techniques,, IEEE, to be appeared [2] FIPS PUB 180-1, Secure Hash Standard (SHS), US Department of Commerce / National Institute of Standards and Technology, April 17, 1995 [3] RSA Laboratories, PKCS #1 v21 RSA Encryption Standard, draft 2, January 5,

16 A ESIGN-TSH k 342 (n 1024 ) e 8 B ESIGN-TSH k = 384 (n 1152) e = 1024 Hash = SHA-1 hlen = 160 MGF = MGF1(SHA-1, hashlen = 160) C ESIGN-TSH, M 1 ESIGN-TSH CMA OM-CMA ( ESIGN Theorem 23 ), M 0,,,, 1 OT, M = M 0 OT (OT 1 ) OT 20 OT = I2OSP(c, 160) c, 0 c < OT = I2OSP(ps, 160) ps UTC ( ), 0 ps <

17 20 OT = I2OSP(r, 160) r, 0 r <

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F E718F9096BC816A5F E646F63>

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F E718F9096BC816A5F E646F63> 2008 年度版リストガイド ( 電子署名 ) 平成 21 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 1 1 1.1............................. 1 1.1.1............................ 1 1.1.2....................... 1 1.1.3...........................

More information

21 Key Exchange method for portable terminal with direct input by user

21 Key Exchange method for portable terminal with direct input by user 21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

ASF-01

ASF-01 暗号モジュール試験及び認証制度 (JCMVP) 承認されたセキュリティ機能に関する仕様 平成 26 年 4 月 1 日独立行政法人情報処理推進機構 ASF-01 A p p r o v e d S e c u r i t y F u n c t i o n s 目次 1. 目的... 1 2. 承認されたセキュリティ機能... 1 公開鍵... 1 共通鍵... 3 ハッシュ... 4 メッセージ認証...

More information

YMS-VPN1_User_Manual

YMS-VPN1_User_Manual YAMAHA VPN YMS-VPN1 2007 12 YAMAHA VPN YMS-VPN1 YMS-VPN1 RT Windows PC IPsec VPN 2000-2002 SSH Communications Security Corp 2004-2007 SafeNet Inc. 2004-2007 dit Co., Ltd. 2006-2007 YAMAHA CORPORATION MicrosoftWindows

More information

特集_03-07.Q3C

特集_03-07.Q3C 3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution

More information

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63> 2008 年度版リストガイド ( メッセージ認証コード ) 平成 21 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 1 1 1.1............................. 1 1.1.1............................ 1 1.1.2....................... 1 1.1.3...........................

More information

2008 (2008/09/30) 1 ISBN 7 1.1 ISBN................................ 7 1.2.......................... 8 1.3................................ 9 1.4 ISBN.............................. 12 2 13 2.1.....................

More information

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR for Web SR Certificate Policy Version 2.50 2017 5 23 1.00 2008/02/25 1.10 2008/09/19 1.20 2009/05/13 5 1.30 2012/02/15 5.6 CA 1.40 2012/11/09 OCSP SubjectAltName 2.00 2013/12/02 SECOM Passport for Web

More information

/07/ /10/12 I

/07/ /10/12 I Certificate Policy Version 1.10 2018 10 12 1.00 2018/07/24 1.10 2018/10/12 I 1.... 1 1.1... 1 1.2... 1 1.3 PKI... 2 1.3.1 CA... 2 1.3.2 RA... 2 1.3.3... 2 1.3.3.1... 2 1.3.3.2... 3 1.3.4... 3 1.3.5...

More information

°Å¹æ¥Ï¥Ã¥·¥å´Ø¿ô

°Å¹æ¥Ï¥Ã¥·¥å´Ø¿ô 1 / 37 (Cryptographic Hash Functions) H : {0, 1} {0, 1} l (Unkeyed hash function) (MDC: Manipulation Detection Code) (Keyed hash function) (MAC: Message Authentication Code) 2 / 37 OAEP (One-wayness) (Preimage

More information

Block cipher

Block cipher 18 12 9 1 2 1.1............................... 2 1.2.................. 2 1.3................................. 4 1.4 Block cipher............................. 4 1.5 Stream cipher............................

More information

ISO/IEC 9798プロトコルの安全性評価

ISO/IEC 9798プロトコルの安全性評価 ISO/IEC 9798 2011 2 4 ISO/IEC 9798-2 (Mechanisms using symmetric encipherment algorithms), ISO/IEC 9798-3 (Mechanisms using digital signature techniques), ISO/IEC 9798-4 (Mechanisms using a cryptographic

More information

Microsoft Word - ランチョンプレゼンテーション詳細.doc

Microsoft Word - ランチョンプレゼンテーション詳細.doc PS1-1-1 PS1-1-2 PS1-1-3 PS1-1-4 PS1-1-5 PS1-1-6 PS1-1-7 PS1-1-8 PS1-1-9 1 25 12:4514:18 25 12:4513:15 B PS1-1-10 PS1-2-1 PS1-2-2 PS1-2-3 PS1-2-4 PS1-2-5 PS1-2-6 25 13:1513:36 B PS1-2-7 PS1-3-1 PS1-3-2

More information

ATR-01-D

ATR-01-D (JCMVP) 24 2 29 ATR-01-D Cryptographic Algorithm Implementation Testing Requirements 1 1 1.1....................... 1 1.2....................................... 2 2 3 2.1.....................................

More information

V-SHIKA CATALOGUE vol.62

V-SHIKA CATALOGUE vol.62 17 ST.200 A20,000 18,000 16,000 14,000 E 12,000 F 10,000 18 ST.201 A25,000 22,000 18,000 ST.205 20,000 19 ST.210 A16,000 12,000 10,000 9,000 E 8,000 ST.202 A27,000 24,000 21,000 20 ST.204 A20,000 17,000

More information

Version C 1 2 3 4 5 1 2 3 4 5 6 7 8 9 0 A 1 2 1 3 4 5 1 1 2 1 1 1 2 4 5 6 7 8 3 1 2 C a b c d e f g A A B C B a b c d e f g 3 4 4 5 6 7 8 1 2 a b 1 2 a b 1 2 1 2 5 4 1 23 5 6 6 a b 1 2 e c d 3

More information

<4D F736F F D F81798E518D6C8E9197BF33817A88C38D868B5A8F70834B D31292E646F63>

<4D F736F F D F81798E518D6C8E9197BF33817A88C38D868B5A8F70834B D31292E646F63> 参考資料 3 CRYPTREC 暗号技術ガイドライン (SHA-1) 2014 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 目次 1. 本書の位置付け... 1 1.1. 本書の目的... 1 1.2. 本書の構成... 1 1.3. 注意事項... 1 2. ハッシュ関数 SHA-1 の利用について... 2 2.1. 推奨されない利用範囲... 2 2.2. 許容される利用範囲...

More information

EPSON エプソンプリンタ共通 取扱説明書 ネットワーク編

EPSON エプソンプリンタ共通 取扱説明書 ネットワーク編 K L N K N N N N N N N N N N N N L A B C N N N A AB B C L D N N N N N L N N N A L B N N A B C N L N N N N L N A B C D N N A L N A L B C D N L N A L N B C N N D E F N K G H N A B C A L N N N N D D

More information

ありがとうございました

ありがとうございました - 1 - - 2 - - 3 - - 4 - - 5 - 1 2 AB C A B C - 6 - - 7 - - 8 - 10 1 3 1 10 400 8 9-9 - 2600 1 119 26.44 63 50 15 325.37 131.99 457.36-10 - 5 977 1688 1805 200 7 80-11 - - 12 - - 13 - - 14 - 2-1 - 15 -

More information

EPSON エプソンプリンタ共通 取扱説明書 ネットワーク編

EPSON エプソンプリンタ共通 取扱説明書 ネットワーク編 K L N K N N N N N N N N N N N N L A B C N N N A AB B C L D N N N N N L N N N A L B N N A B C N L N N N N L N A B C D N N A L N A L B C D N L N A L N B C N N D E F N K G H N A B C A L N N N N D D

More information

公務員人件費のシミュレーション分析

公務員人件費のシミュレーション分析 47 50 (a) (b) (c) (7) 11 10 2018 20 2028 16 17 18 19 20 21 22 20 90.1 9.9 20 87.2 12.8 2018 10 17 6.916.0 7.87.4 40.511.6 23 0.0% 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2.0% 4.0% 6.0% 8.0%

More information

Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 A B (A/B) 1 1,185 17,801 6.66% 2 943 26,598 3.55% 3 3,779 112,231 3.37% 4 8,174 246,350 3.32% 5 671 22,775 2.95% 6 2,606 89,705 2.91% 7 738 25,700 2.87% 8 1,134

More information

橡hashik-f.PDF

橡hashik-f.PDF 1 1 1 11 12 13 2 2 21 22 3 3 3 4 4 8 22 10 23 10 11 11 24 12 12 13 25 14 15 16 18 19 20 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 144 142 140 140 29.7 70.0 0.7 22.1 16.4 13.6 9.3 5.0 2.9 0.0

More information

198

198 197 198 199 200 201 202 A B C D E F G H I J K L 203 204 205 A B 206 A B C D E F 207 208 209 210 211 212 213 214 215 A B 216 217 218 219 220 221 222 223 224 225 226 227 228 229 A B C D 230 231 232 233 A

More information

ネットショップ・オーナー2 ユーザーマニュアル

ネットショップ・オーナー2  ユーザーマニュアル 1 1-1 1-2 1-3 1-4 1 1-5 2 2-1 A C 2-2 A 2 C D E F G H I 2-3 2-4 2 C D E E A 3 3-1 A 3 A A 3 3 3 3-2 3-3 3-4 3 C 4 4-1 A A 4 B B C D C D E F G 4 H I J K L 4-2 4 C D E B D C A C B D 4 E F B E C 4-3 4

More information

1

1 1 2 3 4 5 (2,433 ) 4,026 2710 243.3 2728 402.6 6 402.6 402.6 243.3 7 8 20.5 11.5 1.51 0.50.5 1.5 9 10 11 12 13 100 99 4 97 14 A AB A 12 14.615/100 1.096/1000 B B 1.096/1000 300 A1.5 B1.25 24 4,182,500

More information

05[ ]戸田(責)村.indd

05[ ]戸田(責)村.indd 147 2 62 4 3.2.1.16 3.2.1.17 148 63 1 3.2.1.F 3.2.1.H 3.1.1.77 1.5.13 1 3.1.1.05 2 3 4 3.2.1.20 3.2.1.22 3.2.1.24 3.2.1.D 3.2.1.E 3.2.1.18 3.2.1.19 2 149 3.2.1.23 3.2.1.G 3.1.1.77 3.2.1.16 570 565 1 2

More information

/9/ ) 1) 1 2 2) 4) ) ) 2x + y 42x + y + 1) 4) : 6 = x 5) : x 2) x ) x 2 8x + 10 = 0

/9/ ) 1) 1 2 2) 4) ) ) 2x + y 42x + y + 1) 4) : 6 = x 5) : x 2) x ) x 2 8x + 10 = 0 1. 2018/9/ ) 1) 8 9) 2) 6 14) + 14 ) 1 4 8a 8b) 2 a + b) 4) 2 : 7 = x 8) : x ) x ) + 1 2 ) + 2 6) x + 1)x + ) 15 2. 2018/9/ ) 1) 1 2 2) 4) 2 + 6 5) ) 2x + y 42x + y + 1) 4) : 6 = x 5) : x 2) x 2 15 12

More information

18 (1) US (2) US US US 90 (3) 2 8 1 18 108 2 2,000 3 6,000 4 33 2 17 5 2 3 1 2 8 6 7 7 2 2,000 8 1 8 19 9 10 2 2 7 11 2 12 28 1 2 11 7 1 1 1 1 1 1 3 2 3 33 2 1 3 2 3 2 16 2 8 3 28 8 3 5 13 1 14 15 1 2

More information

( 9 1 ) 1 2 1.1................................... 2 1.2................................................. 3 1.3............................................... 4 1.4...........................................

More information

(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1

(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding Theory) (safely) (ryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding

More information

署名ツール検証報告書

署名ツール検証報告書 2010 01 27 XML 1.... 3 2.... 5 3.... 15 4.... 18 5.... 22 6.... 22 Copyright (c) XML 2010 All rights reserved. Page-1/23 Copyright (c) XML 2010 All rights reserved. Copyright (c) XML 2010 All rights reserved.

More information

セアラの暗号

セアラの暗号 1 Cayley-Purser 1 Sarah Flannery 16 1 [1] [1] [1]314 www.cayley-purser.ie http://cryptome.org/flannery-cp.htm [2] Cryptography: An Investigation of a New Algorithm vs. the RSA(1999 RSA 1999 9 11 2 (17

More information

「暗号/情報セキュリティ」

「暗号/情報セキュリティ」 atsuhiro@iss.isl.melco.co.jp 2002-10-21 PKI PKI: (Public Key Infrastructure) 1976 DES 1978 Privacy Money ()DES, RIJNDAEL, MISTY, KASUMI () RSA, DSA, I Love You ( ) A 55 m m 8 & $ ( ) I Love You A B

More information

/ ( ) 1 1.1 323 206 23 ( 23 529 529 323 206 ) 23 1.2 33 1.3 323 61 61 3721 3721 323 168 168 323 23 61 61 23 1403 323 111 111 168 206 323 47 111 323 47 2 23 2 2.1 34 2 2.2 2 a, b N a b N a b (mod N) mod

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

<4D F736F F D B B BB2D834A836F815B82D082C88C60202D B2E646F63>

<4D F736F F D B B BB2D834A836F815B82D082C88C60202D B2E646F63> 情報セキュリティの理論と技術 サンプルページ この本の定価 判型などは, 以下の URL からご覧いただけます. http://www.morikita.co.jp/books/mid/082951 このサンプルページの内容は, 初版 1 刷発行当時のものです. i 2002 2003 2004 IC IC IC IC 5 IC IC IC IC 2 5 6 IC IC ii. IC... 2005

More information

untitled

untitled 22 2 ii 20 10 iii iv 1...1 1.1....1 1.2....2 1.3....3 2...10 2.1....10 2.1.1....10 2.1.1.1.... 11 2.1.1.2....13 2.1.2....16 2.1.3....18 2.1.3.1....18 2.1.3.2....21 2.1.3.3....22 2.2....25 3...29 3.1....29

More information

Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i

Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i 26 A Study on Secure Remote Control Methods 1175078 2015 2 27 Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i Abstract A Study on Secure Remote Control Methods SHINGAI, Tatsuro In recent years, communication

More information

1

1 VM Secure Processor for Protecting VM and its Application to Authentication 26 2 6 48-126444 1 OS OS TPM Trusted Boot TPM Trusted Boot OS TPM Trusted Boot OS OS OS OS OS OS VM VM 2 1 1 2 3 2.1 DRM...................................

More information

Proposal of addition of new cipher suites to TLS to support Camellia, EPOC, and PSEC Shiho Moriai NTT Laboratories th

Proposal of addition of new cipher suites to TLS to support Camellia, EPOC, and PSEC Shiho Moriai NTT Laboratories th Proposal of addition of new cipher suites to TLS to support Camellia, EPOC, and PSEC Shiho Moriai shiho@isl.ntt.co.jp NTT Laboratories 128-bit Block Cipher Camellia Kazumaro Aoki * Tetsuya Ichikawa Masayuki

More information

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A Vol. 45 No. 8 Aug. 2004, 1999 11 (1) (2) (3) 2003 7 Digital Evidence Enhancement for the Japanese Official Gazette Data Providing Services Atsuko Umezawa,, Hiroyuki Ueno, Yukio Miyata, Yasuharu Saikawa,

More information

untitled

untitled API API Part 1 10API 25 10API Part2 Copyright (c) 2004 NPO Page 2 Copyright (C) 2004 NPO JNSA 1 API API Wassenaar API Copyright (c) 2004 NPO Page 4 Copyright (C) 2004 NPO JNSA 2 56 512512 112 IC 1 I II

More information

2

2 m.uehata@sii.co.jp 2 SII 1881 1892 1937 1959 3 SEIKO 1881 1955 1964 1974 1984 1992 1994 1998 1998 2002 2002 4 SII 1960 1970 1980 1990 CMOS IC LCD LCM 2000 COF 1937 VLSI FIB 5 < > SA EOA CAE < > 6 Network

More information

untitled

untitled Java JCE JAVA API 1 2 java.seceurity.* javax.crypto.* / MAC (Message Authentication Code) ( ) java.security () javax.crypto 2004/8/26 Java JCE 3 getinstance() Provider Provider

More information

セミナー構成 1 部概要 (13:30~14:20) 暗号アルゴリズム実装試験の概要 暗号アルゴリズム及び試験内容の説明 AES 2 部 RSA(14:30~15:30) 暗号アルゴリズム及び試験内容の説明 RSA-OAEP RSA-PSS 3 部擬似乱数生成器 (15:40~16:30) 暗号アル

セミナー構成 1 部概要 (13:30~14:20) 暗号アルゴリズム実装試験の概要 暗号アルゴリズム及び試験内容の説明 AES 2 部 RSA(14:30~15:30) 暗号アルゴリズム及び試験内容の説明 RSA-OAEP RSA-PSS 3 部擬似乱数生成器 (15:40~16:30) 暗号アル 暗号モジュールの 暗号アルゴリズム実装試験セミナー 2008 年 2 月 20 日独立行政法人情報処理推進機構セキュリティセンタ - 情報セキュリティ認証室 1 セミナー構成 1 部概要 (13:30~14:20) 暗号アルゴリズム実装試験の概要 暗号アルゴリズム及び試験内容の説明 AES 2 部 RSA(14:30~15:30) 暗号アルゴリズム及び試験内容の説明 RSA-OAEP RSA-PSS

More information

03.›F“ª/‚SŒÊŁÏ“X*

03.›F“ª/‚SŒÊŁÏ“X* RSA RSA RSA GemplusCoron Naccache Stern Coron-Naccache-SternRSA ISO/IEC IC RSA Coron RSA ISO/IEC Coron-Naccache-Stern ISO/IEC JTC1/SC RSA RSARSA RSA IC GemplusCoron Naccache Stern RSA Coron-Naccache-SternCNS

More information

電子メールのセキュリティ

電子メールのセキュリティ S/MIME 1...1 1.1... 1 1.2... 2 1.3... 2 2...3 2.1... 3 2.2... 4 2.3... 4 3...5 3.1... 5 3.2... 6 3.3... 8 3.4... 10 4...12 4.1 PGP... 12 4.2 (CA)... 13 5 CRL...15 5.1 ( ID )... 15 5.2 CRL(Certificate Revocation

More information

4 4 θ X θ P θ 4. 0, 405 P 0 X 405 X P 4. () 60 () 45 () 40 (4) 765 (5) 40 B 60 0 P = 90, = ( ) = X

4 4 θ X θ P θ 4. 0, 405 P 0 X 405 X P 4. () 60 () 45 () 40 (4) 765 (5) 40 B 60 0 P = 90, = ( ) = X 4 4. 4.. 5 5 0 A P P P X X X X +45 45 0 45 60 70 X 60 X 0 P P 4 4 θ X θ P θ 4. 0, 405 P 0 X 405 X P 4. () 60 () 45 () 40 (4) 765 (5) 40 B 60 0 P 0 0 + 60 = 90, 0 + 60 = 750 0 + 60 ( ) = 0 90 750 0 90 0

More information

April 2016 / No.101

April 2016 / No.101 April 2016 / No.101NIHON UNIVERSITY College of Science and Technology Department of Oceanic Architecture and Engineering 101 April 2016 / No.101 Teaching Staff Teaching Staff Teaching Staff Teaching Staff

More information

linearal1.dvi

linearal1.dvi 19 4 30 I 1 1 11 1 12 2 13 3 131 3 132 4 133 5 134 6 14 7 2 9 21 9 211 9 212 10 213 13 214 14 22 15 221 15 222 16 223 17 224 20 3 21 31 21 32 21 33 22 34 23 341 23 342 24 343 27 344 29 35 31 351 31 352

More information

繝励Μ繝ウ繝

繝励Μ繝ウ繝 2012. January vol.609 2 3 2012. January vol.609 4 5 2012. January vol.609 6 7 2012. January vol.609 8 9 2012. January vol.609 10 11 2012. January vol.609 12 13 2012. January vol.609 14 15 2012. January

More information

·¬ÝÊß½14.4.ec6

·¬ÝÊß½14.4.ec6 DAIDO INSTITUTE OF TECHNOLOGY No.40 CONTENTS TOPICS INFORMATION 4 2002 APRIL 1 2 3 4 ,,,,,,,, QQQQQQQQ,,,,,,,, QQQQQQQQ,,,,,,,,,,,,,, QQQQQQQQQQQQQQ,,,,,,,,,,,,,, QQQQQQQQQQQQQQ ã INFORMATION

More information

特許侵害訴訟における無効の主張を認めた判決─半導体装置事件−

特許侵害訴訟における無効の主張を認めた判決─半導体装置事件− [*1847] 12 4 11 10 364 54 4 1368 1710 68 1032 120 X Y 6.8.31 29 3 875 X Y 9.9.10 29 3 819 Y 320275 391468 46 12 21 35 2 6 3513745 39 1 30 320249 1) 1 39 1 [*1848] 2) 3) Y 10 51 2 4 39 5 39 1 3 139 7 2

More information

TLS 1.2 TLS TLS iijlab-seminar pd

TLS 1.2 TLS   TLS iijlab-seminar pd TLS 1.3 2018.2.14 @kazu_yamamoto 1 TLS 1.2 TLS https://www.iij.ad.jp/dev/report/iir/031/03_01.html TLS 1.3 http://seminar-materials.iijlab.net/iijlab-seminar/ iijlab-seminar-20170110.pdf HTTPS SEO https://employment.en-japan.com/engineerhub/

More information

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking RSA Group Name RSA C

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking RSA Group Name RSA C 2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name RSA Group Name RSA Code Elliptic Curve Cryptograrhy Group /Project No. 13-B /Project Leader 1009087 Takahiro

More information

λ(t) (t) t ( ) (Mean Time to Failure) MTTF = 0 R(t)dt = /λ 00 (MTTF) MTTF λ = 00 MTTF= /λ MTTF= 0 2 (0 9 ) =0 7 () MTTF=

λ(t) (t) t ( ) (Mean Time to Failure) MTTF = 0 R(t)dt = /λ 00 (MTTF) MTTF λ = 00 MTTF= /λ MTTF= 0 2 (0 9 ) =0 7 () MTTF= 2003 7..2 R(t) t R(0) =, R( ) =0 λ(t) t R(t) λ(t) = R(t) dr(t) t, R(t) = exp ( λ(t)dt) dt 0 λ(t) (t) t ( ) 0 9 0 0 300 (Mean Time to Failure) MTTF = 0 R(t)dt = /λ 00 (MTTF) 00 000 MTTF λ = 00 MTTF= /λ

More information

LCM,GCD LCM GCD..,.. 1 LCM GCD a b a b. a divides b. a b. a, b :, CD(a, b) = {d a, b }, CM(a, b) = {m a, b }... CM(a, b). q > 0, m 1, m 2 CM

LCM,GCD LCM GCD..,.. 1 LCM GCD a b a b. a divides b. a b. a, b :, CD(a, b) = {d a, b }, CM(a, b) = {m a, b }... CM(a, b). q > 0, m 1, m 2 CM LCM,GCD 2017 4 21 LCM GCD..,.. 1 LCM GCD a b a b. a divides b. a b. a, b :, CD(a, b) = {d a, b }, CM(a, b) = {m a, b }... CM(a, b). q > 0, m 1, m 2 CM(a, b) = m 1 + m 2 CM(a, b), qm 1 CM(a, b) m 1, m 2

More information

( ) FAS87 FAS FAS87 v = 1 i 1 + i

( ) FAS87 FAS FAS87 v = 1 i 1 + i ( ) ( 7 6 ) ( ) 1 6 1 18 FAS87 FAS87 7 1 FAS87 v = 1 i 1 + i 10 14 6 6-1 - 7 73 2 N (m) N L m a N (m) L m a N m a (m) N 73 9 99 18 4-2 - 4 143 2 145 3 37 4 37 4 40 6 40 6 41 10 41 10 13 10 14 4 24 3 145

More information

目次 1. 本書の位置付け 本書の目的 本書の適用範囲 CRYPTREC 暗号リスト CRYPTREC 暗号の仕様書 注意事項 謝辞 CRYPTREC 暗号

目次 1. 本書の位置付け 本書の目的 本書の適用範囲 CRYPTREC 暗号リスト CRYPTREC 暗号の仕様書 注意事項 謝辞 CRYPTREC 暗号 CRYPTREC 暗号技術ガイドライン (SHA-1) 改定版 2018 年 4 月 国立研究開発法人情報通信研究機構独立行政法人情報処理推進機構 目次 1. 本書の位置付け... 1 1.1. 本書の目的... 1 1.2. 本書の適用範囲... 1 1.2.1. CRYPTREC 暗号リスト... 1 1.2.2. CRYPTREC 暗号の仕様書... 1 1.3. 注意事項... 2 1.4.

More information

資料9 表紙.doc

資料9 表紙.doc 2003 (%) (%) 1 2 3 4 5 6 1997 1998 1999 2000 2001 2002 ( ) 1,155 1,694 2,706 4,708 5,593 6,942 (%) 68.2 80.0 88.6 95.8 97.6 98.4 (%) 12.3 19.2 31.8 44.8 68.0 79.1 (%) 6.4 11.0 19.1 34.0 60.5 81.4 5 300

More information

将来の暗号技術に関する安全性要件調査報告書

将来の暗号技術に関する安全性要件調査報告書 i ... 1... 3... 4 DES... 4 DES Cracker (1998 )... 4... 6 3.3.1 Lenstra & Verheul1999... 6 3.3.2 2000... 10 3.3.3 Silverman2000... 12... 12... 13... 13... 14... 17... 18... 18 5.1.1... 18 5.1.2... 18 5.1.3...

More information

30 2018.4.25 30 1 nuida@mist.i.u-tokyo.ac.jp 2018 4 11 2018 4 25 30 2018.4.25 1 1 2 8 3 21 4 28 5 37 6 43 7 47 8 52 30 2018.4.25 1 1 Z Z 0 Z >0 Q, R, C a, b a b a = bc c 0 a b b a b a a, b, c a b b c a

More information