Professional Documents
Culture Documents
Procedure For Submitting Cryptographic Techniques
Procedure For Submitting Cryptographic Techniques
Procedure For Submitting Cryptographic Techniques
techniques
(Provisional Translation)
Information-technology Promotion Agency, Japan
June 13, 2000
Final Version July 5, 2000
1. Purpose of this Project
With the goal of improving administrative efficiency and reducing
paperwork costs for the private sector, the Japanese government aims
to create, by FY 2003, the infrastructure of an electronic government
that will computerize administrative procedures.
When created, this electronic government will be a model in a
digital economy/society. A set of IT security measures that will be
implemented in the electronic government is also expected to
become a model for the private sector, thereby enhancing the
security and reliability of the nationwide information network which
are a core element of information security in the electronic
government.
The purpose of this project is to list valid cryptographic techniques,
together with their profile of their security and implementation
aspects safety and ease of implementation. People are encouraged to
present various proposals for cryptographic techniques, which will be
evaluated in a professional and objective manner. The results of this
project will be submitted to the government, and used in various ways
as references for using cryptographic techniques in the electronic
government.
2. Overview and Schedule of this Project
2000
Detailed evaluation:
October - December, 2000
Announcement of detailed evaluation results:
February, 2001 or
later
3. The Categories of Solicited Cryptographic Techniques
We are soliciting proposals regarding cryptographic techniques
that may be useful for building systems in the electronic government
and that belong to one of the following categories, (1), (2), (3) and
(4).
We will limit the scope of proposals to cryptographic techniques
whose specifications and other information have been disclosed to
the public. The purpose of this limitation is to ensure we receive
evaluations from a wide range of specialists as well as to allow many
implementers (vendors) to use the results in various applications.
Category (1) Asymmetric Cryptographic Schemes
We are soliciting Asymmetric Cryptographic Schemes that are
designed for the following security functions: confidentiality,
authentication, signature, and key-sharing. They must be submitted
with at least one design example. If your asymmetric cryptographic
scheme can implement more than one security function, select one
function as the primary. If you believe that your asymmetric
cryptographic scheme is capable of handling more than one primary
function, submit your proposals respectively for each function.
An Asymmetric Cryptographic Scheme referred to here refers to
an algorithm that provides one or more security function by using
Cryptographic Primitive(s) and some Auxiliary Function(s), and
consists of a description of the algorithm, requirements for
cryptographic primitives and auxiliary functions.
A Cryptographic Primitive is an elementary cryptographic algorithm
that provides security based on integer factoring problems, discrete
logarithm problems, elliptic curves discrete logarithms problems, or
Item to be submitted
Language
Format
medium
(1)
Cryptographic
Techniques Application
Japanese or English
Document and electronic medium
Form
(2)
Cryptographic
Techniques Overview
(3)
Cryptographic
Cryptographic
Techniques
Application Form
Cryptographic
Techniques Overview
No specific format
Techniques
Specifications
(4)
No specific format
(5)
Test vector
No specific format
Electronic medium only
(text format)
(6)
Sample code
(7)
Information regarding
the public availability
status of the
No specific format
Japanese
No specific format
"specifications"
(8)
Information regarding
intellectual property
rights
(9)
Company profile
Japanese
No specific format
Company Profile
Japanese and English versions are required for items (2) to (4).
However, at the time of submission (on or before July 14, 2000), a
Japanese or English version may be submitted independently. The
other version must be submitted by the end of September, 2000.
During the evaluation process, the Japanese version will be treated
as the formal document and the English version will be treated as an
auxiliary document.
Since detailed evaluation may be conducted overseas, items (2) to
(4) need to be submitted in both English and Japanese. The Japanese
version will be treated as the formal document and the English
version will be treated as an auxiliary document. If a conflict is found
between the two versions, the Japanese version will be considered
correct. However, such conflicts should be eliminated as far as
possible. If a conflict of this type hinders the execution of evaluation,
(ii) Categories
Select one from asymmetric cryptographic schemes, symmetric
ciphers, hash functions and random number generators.
(iii) Security Functions / Subcategories
Choose one out of confidentiality, authentication, signature and
key- sharing in the case of asymmetric cryptographic scheme.
Choose one out of the stream ciphers, 64-bit block ciphers and
128-bit block ciphers in the case of the symmetric cipher.
(iv) Design policy
Write what you consider to be most beneficial about your
submission in terms of design clarity, structural simplicity, and
flexibility.
(v) Intended applications
Write the kind of applications you propose to apply the
cryptography to.
(vi) Basic theory and techniques
Write the theory and techniques on which the cryptography is
based.
(vii) References of submission
Write principal references of the cryptography and underlying
techniques (paper titles, authors, magazine names, and publication
dates).
(viii) Previous use
Write previous use of the cryptographic techniques.
(3) Cryptographic Techniques Specifications
(i) Design policy and design criteria
(ii) Cryptographic techniques (all information needed for
implementation)
The information provided needs to contain information sufficient
to allow any third party to evaluate and implement the submitted
cryptographic techniques. If this information is insufficient, the
proposal could be made ineligible for evaluation. Follow the Criteria
below.
a) Write a complete specification for the cryptographic technique.
The specification needs to include all information needed to
10
11
12
13
14
15
16
17
18
19
(2) Items
Enclose all items listed in Section 4.2, " Submission of
Information Needed for Evaluation,"
The electronic version of the supporting documents should be
provided on magneto-optical disk, CD-R, CD-RW, which shall be
labeled with the submitters name and the name of cryptographic
techniques.
20
FAX +81-3-5978-7518
E-mail crypto-kobo@ipa.go.jp:
21