次世代暗号に向けたセキュリティ危殆化回避数理モデリング

Research Objectives:
Construction and Security Evaluation of
Next-Generation High-Performance Cryptography

Member List
Tsuyoshi Takagi Professor, Graduate School of Information Science and Technology, University of Tokyo HP
Katsuki Fujisawa Professor, Institute of Mathematics for Industry,
Kyushu University
HP
Masaya Yasuda Associate Professor, College of Science, Rikkyo University HP
Hayato Waki Associate Professor, Institute of Mathematics for Industry,
Kyushu University
HP
Yasufumi Hashimoto Associate Professor, Department of Mathematical Sciences,
University of the Ryukyus
HP
Koji Nuida Professor, Institute of Mathematics for Industry,
Kyushu University
HP
Atsushi Takayasu Lecturer, Graduate School of Information Science and Technology, University of Tokyo HP
Yasuhiko Ikematsu Assistant Professor, Institute of Mathematics for Industry,
Kyushu University
HP
Yuntao Wang Assistant Professor, Japan Advanced Institute of Science and Technology HP
Momonari Kudo Research Associate, Graduate School of Information Science and Technology, University of Tokyo
Hiroshi Onuki Project Research Associate, Graduate School of Information Science and Technology, University of Tokyo HP
Kosuke Sakata Project Researcher, Graduate School of Information Science and Technology, University of Tokyo
Maxim Jourenko Project Researcher, Graduate School of Information Science and Technology, University of Tokyo

Outline of Research

We aim at development and security evaluation of the next-generation cryptographic systems, which will be resistant against attacks using quantum computers. In particular, we will study algorithms for solving the mathematical problems underlying such the systems, including the shortest vector problem on lattices (SVP), solving the systems of multivariate quadratic equations over a finite field (MQ problem) and others. Moreover, we will study the impact of attackers possessing massive computational resources by running the corresponding cryptanalytic experiments with major mathematical problems underlying the above mentioned cryptographic systems. Finally, we will check the possibility of using the next-generation high-performance cryptographic systems in the real-world environment by building their software implementation and evaluating its performance.