CRYPTEREC Cryptography Research and Evaluation Committees
JAPANESE
About CRYPTREC
Organization of CRYPTREC
History of CRYPTREC
CRYPTREC Report
Technical Report
e-Government Recommended Ciphers List
Specifications of e-Government Recommended Ciphers
Guide to Related Organizations
e-Government Recommended Ciphers List
This web page explains the previous “e-Government Recommended Ciphers List” before the revision on March, 2013. The descriptions and web links have been kept unchanged after the revision.
For the practical use, please refer to the “CRYPTREC Ciphers List” which is the revision of the previous “e-Government Recommended Ciphers List”.



The CRYPTREC Advisory Committee, which meets jointly with the Ministry of Internal Affairs and Communication, and the Ministry of Economy, Trade and Industry, publicly invited ciphers, evaluated them objectively, decided and publicized “the list of ciphers that should be referred to in the procurement for the e-Government system” ( e-Government Recommended Ciphers List ) on February 20th, 2003.
In "Management Standards for Information Security Measures for the Central Government Computer Systems (FY 2012 Edition)"(April 26th, 2012, Information Security Policy Council), e-Government Recommended Ciphers List is referenced as below.
      
Management Standards for Information Security Measures for the Central Government Computer Systems (Extract)
The head of information security officers must specify the algorithms and operational methods for encryption and electronic signatures for their government agencies including the following items.
 (i) If possible, use the algorithm on the “e-Government Recommended Ciphers List”
 (ii) Use algorithms on the “e-Government Recommended Ciphers List” when newly implementing an information system, or introducing encryption or electronic signature at an update. If enabling a selection from multiple algorithms for encryption or electronic signatures, include at least one from the “e-Government Recommended Ciphers List.”
(iii) Examine the necessity of an emergency response plan in the case of an algorithm compromise. Define an emergency response plan if it is deemed necessary.
      
[References]
Measures on central government computer systems (National Information Security Center (NISC))
Policy for the use of ciphers to be used for information system procurement of each agency (in Japanese)
 
About this Site Privacy Policy
If you have any comment or inquiry, send it to the following mail address.
Copyright (c) 2005 CRYPTREC.ALL Rights Reserved.