Guidance for Submissions(104
Total Page:16
File Type:pdf, Size:1020Kb
Guidance for Submissions in 2001 (Provisional Translation) Information-technology Promotion Agency, Japan Telecommunications Advancement Organization of Japan August 1, 2001 Contents 1. Objective ............................................................................................................ 1 2. Outline and schedule ........................................................................................ 2 2.1 Outline of the project ................................................................................ 2 2.2 Schedule .................................................................................................... 2 3. The Categories of Solicited Cryptographic Technique .................................... 3 3.1 Follow-up evaluation candidate and newly submitted technique ......... 3 3.2 Classification of cryptographic technologies ........................................... 4 4. Evaluation Items .............................................................................................. 6 4.1 Asymmetric Cryptographic Schemes ....................................................... 6 4.2 Symmetric Ciphers ................................................................................... 7 4.3 Hash Functions ......................................................................................... 8 4.4 Pseudo-Random Number Generators ...................................................... 8 5. Documents for Submission .............................................................................. 9 6. Remarks .......................................................................................................... 18 7. How to make the submission .......................................................................... 19 Reference ............................................................................................................. 20 Appendix A Application Form ......................................................................... 24 Appendix B Information on the public availability status of specification .... 25 Appendix C Self checklist ................................................................................ 26 Guidance for Submissions (Provisional translation) August 1, 2001 Information-technology Promotion Agency, Japan(IPA) Telecommunications Advancement Organization of Japan(TAO) 1. Objective The Japanese government aims at joining in the most advanced IT nations in the world within the next 5 years as a consequence of executing e-Japan Strategy. We have to ensure the security and reliability of the advanced info-communications networks in Japan for realization of our target. In particular, unbiased evaluation and standardization of cryptographic techniques are required as a basic item for the spread of digital authentication schemes like digital signatures and consequently for the construction of the electronic government, which is the governmental execution of e-Japan Strategy. For this reason, following the last year project, we call for submitting cryptographic techniques, scrutinize the submitted cryptographic techniques, evaluate their security and performance and publicize the results as the CRYPTREC report 2001. The CRYPTREC report 2001 is supposed to be employed by Japanese government in many ways for their selection of cryptographic techniques used for constructing the electronic government. 1/27 2. Outline and schedule 2.1 Outline of the project (1) Requested by the CRYPTREC Advisory Committee, which is held by the ministry of public management, home affairs, posts and telecommunications and the ministry of economy, trade and industry, the secretariat of the CRYPTREC project consisting of TAO and IPA organizes the CRYPTREC Evaluation Committee consisting of experts in cryptology and evaluate the submitted cryptographic techniques. (2) Some of the cryptographic techniques that were evaluated last year and judged to deserve further evaluation will be advanced to the full evaluation phase this year. Newly submitted cryptographic techniques in 2001 will be a subject of the screening evaluation. Only cryptographic techniques that pass the screening evaluation will advance to the full evaluation phase executed after April of 2002. (3) We evaluate security and software and hardware implementation of the submitted cryptographic techniques referring the existing academic literature in cryptology and investigation carried out by the experts nominated by the CRYPTREC Evaluation Committee. The results will be publicized even though these may disadvantage some applicants. (4) Besides evaluation of the submitted cryptographic techniques, the activity of CRYPTREC in this year contains the investigation of the cryptographic techniques that are judged to deserve evaluation by the CRYPTREC evaluation committee. No public submission is solicited for this special evaluation. 2.2 Schedule The tentative schedule is set as follows. - Deadline for submissions: September 27, 2001 17:00 (Japan Standard Time) *A submission should be received by the CRYPTREC secretariat before September 27, 17:00 (JST). Only a postal mail or parcel delivery will be accepted. - Screening evaluation and follow-up evaluation: October, 2001 ~ March, 2002 - CRYPTREC submission explanation meeting: October 9 and 10, 2001 9th of October: Symmetric key cryptographic techniques 10th of October: Asymmetric key cryptographic techniques *This will be open to the public. All applicants shall present their submissions. - CRYPTREC workshop: January 2002 - Publication of CRYPTREC Report 2001: March 2002 2/27 3. The Categories of Solicited Cryptographic Techniques 3.1 Follow-up evaluation candidate and newly submitted technique Any submitted cryptographic technique shall be supplied by the applicant or another developer not later than March 2003 for construction of the electronic government. The evaluation policy will be announced and the evaluation will be carried out based on the policy. The results will be publicized. (1) Remarks on new submissions i) The specification and other information on the submitted cryptographic techniques shall be disclosed to the public by the deadline for the submission (September/27). Please inform the secretariat of any obstacle to make the submission public by the 10th of September if any. ii) A submission shall be a cryptographic technique that can be implemented by third parties in and out of Japan. In addition, the submission should be restricted to the one whose specification and information is public and possible to be evaluated. iii) The submitted cryptographic technique should possess certain features (for security or performance) that make itself superior or equal to the existing cryptographic techniques fully evaluated for CRYPTREC project in the year 2000*. *Refer to “CRYPTREC report 2000” given in http://www.ipa.go.jp/security/enc/CRYPTREC/index.html iv) Only one cryptographic technique shall be submitted for one category. If you submit more than one technique belonging to one category, those techniques should be designed using distinct principles. Moreover, if a submission has more than one function in several categories of the classification described in Section 3.2, the applicant is asked to choose one category that is most appropriate to the submission for the submission. v) Newly submitted cryptographic techniques in 2001 will be in the screening evaluation phase this year. Only cryptographic techniques that pass screening evaluation phase will advance to the full evaluation phase executed after April of 2002. (2) Remarks on follow-up evaluation i) The subjects of the full evaluation this year will be the cryptographic techniques which were fully evaluated in 2000 and the CRYPTREC evaluation committee judged to deserve further evaluation*. Moreover, the applicant should express their will to continue follow-up evaluation process, and the status of availability should be clarified. *The CRYPTREC evaluation committee will notice to each applicant that the submission will be advanced to the follow-up evaluation. ii) The applicant of the subject of the follow-up evaluation is asked to give in the 3/27 materials described in Section 5. iii) The CRYPTREC evaluation committee may regard a submission as new if the specifications are substantially updated (change of parameters, algorithms, auxiliary functions and so on). 3.2 Classification of cryptographic technologies A submitted cryptographic technique shall belong to one of the categories. (1) Asymmetric Cryptographic Schemes We solicit asymmetric cryptographic schemes possessing one of the following objectives; confidentiality, authentication, signature, and key agreement. A scheme shall have at least one software implementation. An asymmetric cryptographic scheme here means a synthetic algorithm consisting of a cryptographic primitive and several auxiliary functions. Requirements of the cryptographic primitives, the auxiliary functions and the description of the comprehensive algorithm are required to be presented. A cryptographic primitive is a mathematical assumption that a submitted cryptographic technique is based on. For example, a primitive may be an algorithmic problem related to the integer factoring problem, the discrete logarithm problem of the multiplicative group of finite fields or the group of rational points on an elliptic curve, or another intractable problem. An auxiliary function is a necessary element to construct a scheme such as a hash function or a pseudorandom number generator. If a submission employs