CRYPTEREC Cryptography Research and Evaluation Committees
JAPANESE
About CRYPTREC
Organization of CRYPTREC
History of CRYPTREC
CRYPTREC Report
Technical Report
e-Government Recommended Ciphers List
Specifications of e-Government Recommended Ciphers
Guide to Related Organizations
TOPICS
Call for attack to evaluate the cryptographic techniques submitted in FY 2009
October 1, 2010
National Institute of Information and Communications Technology
Information-technology Promotion Agency, Japan

  Towards the revision of the e-Government Recommended Ciphers List in FY 2012, CRYPTREC is going to evaluate the cryptographic techniques submitted in FY 2009. A list of them is as shown in table 1 below.
  In addition to evaluations by the designated evaluators, we will solicit for voluntary analysis (attacks) for them. If volunteer evaluators analyze (attack) them and make the results public as academic journals, magazines, papers, or other publications, we will actively use them to make evaluation reports. we would like to thank your help in providing us with useful information on their evaluations or other analysis (attacks) for them. Any cooperation will be greatly appreciated.
  You may download necessary documents (see Table 2 below) to evaluate the submitted cryptographic techniques in table 1 below. But these documents are for evaluation use only and are prohibited to redistribute. CRYPTREC will not be liable for any incidental or consequential damages arising out of the use or inability to use them. Please note that downloading the evaluation document will be regarded as acceptance of the term of the agreement.

Prior to downloading the evaluation documents, you need to accept the term of the agreement above and check the left box.

Table 1: A list of cryptographic techniques submitted in FY 2009
Category Cryptographic Techniques Applicants
128-bit block ciphers CLEFIA Sony Corporation
HyRAL Laurel Intelligent Systems Co., Ltd.
Stream ciphers Enocoro Hitachi, Ltd.
KCipher-2 KDDI Corporation
Message Authentication Codes PC-MAC-AES NEC Corporation
Entity Authentications Infinite One-Time Password Authentication System Nihon Unisys Ltd.
Table 2: A overview of the evaluation documents to be released
Directory Files
spec specification sheet
eval evaluation document
tv test vector
ref refference source code, specification sheet of refference source code, refference hardware design description, specification sheet of refference hardware design description
tvec test vector generation source code, specification sheet of test vector generation source code
brfg briefing material for the Application of Cryptographic Techniques
errata(if minor fixes exist) errata

Related topic

Start of the Application for Cryptographic Techniques towards the Revision of the e-Government Recommended Ciphers List

CRYPTREC Symposium 2010



CRYPTREC Secretariat
E-mail :
About this Site Privacy Policy
If you have any comment or inquiry, send it to the following mail address.
Copyright (c) 2007 CRYPTREC.ALL Rights Reserved.