摘要:
A program converter (1) converts a program (P) which performs arithmetic addition processing to execute encryption, into a converted program (tP) which performs processing equivalent to the processing of the program (P). The program converter (1) includes: a key data extraction unit (10) which extracts key data from the program (P); an addition table generation unit (11) which generates an addition table from the extracted key data; a conversion table extraction unit (12) which extracts a conversion table from the program (P); a table merger unit (13) which generates a merger table by merging the generated addition table and the extracted conversion table; a random number generation unit (14) which generates a random number; a table randomization unit (15) which generates a randomized merger table by randomizing the merger table using the generated random number; and a converted-program generation unit (16) which generates the converted program (tP) according to the generated randomized merger table.
摘要:
A game system in which game software produced to be used in stationary game machines can be used in portable game machines. The game system includes a stationary game machine, a portable game machine, and a memory card connectable to both the stationary and portable game machines. Image data contained in game software produced for the stationary game machine shows an image in the form of free-form surface. The stationary game machine converts the image data to show the image in the form of a polygon according to processing performance of the portable game machine, and stores the converted image data and a game program executable by the portable game machine onto the memory card. The portable game machine executes the game program stored on the memory card, and generates and displays a display image from the image data stored on the memory card.
摘要:
The present invention aims to perform tamper detection on a protection control module without having detection modules come to know the key data and functions thereof. The detection modules of the present invention perform tamper detection by verifying whether or not the correspondence between the input and output data of the application decryption process performed by the protection control module is correct. Furthermore, the present invention offers improved security against leaks of the application output data by the detection modules by having a plurality of detection modules verify different data blocks.
摘要:
In a server, an echo-request transmitting unit transmits echo-request data to a target device, and an echo-reply receiving unit receives echo-reply data from the target device. A time measuring unit measures, as the target time, the time required between transmission of the echo-request data and reception of the echo-reply data, and compares the target time with the reference time. In this way, the server judges whether the target device connected to its network belongs to a predetermined group.
摘要:
A measurement device includes: a first measurement unit (101) measuring first biological data at least k times (k≧2) to obtain any k first measurement values; a distributed-signature generation unit (104) executing signature operations for the k first measurement values using any various k distributed-signature keys, respectively, to generate k distributed signatures, where the k distributed-signature keys can reconstruct a signature generation key only when all of them are available; a signature synthesis unit (106) synthesizing the k distributed signatures together to reconstruct a signature; and a steady state verification unit (107) verifying, using a signature verification key corresponding to the signature generation key, whether or not the signature reconstructed by the signature synthesis unit is correct, where the correctness of the signature means that the k first measurement values are same values.
摘要:
A parameter generation apparatus for generating parameters causing no decryption error for an NTRU cryptosystem so that an encrypted communication can be carried out between an encryption apparatus and a decryption apparatus in a secure and reliable manner. The parameter generation apparatus includes: a provisional parameter generation unit operable to generate a set of provisional parameters that do not cause any decryption errors, based on error condition information that is provided in advance, the error condition information indicating a condition for causing no decryption error; and an output parameter generation unit operable to generate an output parameter that does not cause any decryption errors, using the set of provisional parameters, based on a lattice constant that is calculated from the set of provisional parameters.
摘要:
A digital camera comprising: an imaging unit operable to generate an image by photographing an object; a receiving unit operable to receive information relating to image processing from one or more transmission devices; a judging unit operable to judge whether the image is to be output or not, based on the information received by the receiving unit; and an output unit operable to, in accordance with the judgment made by the judging unit, output the image to a memory, or discard the image, where the memory is readable by the digital camera or an external device.
摘要:
An encrypted communication system, capable of performing processing with the speed higher than the conventionally achieved speed, includes an encryption device and a decryption device sharing parameters that satisfy p=3 and q=2^k (k: an integer of 2 or greater). The decryption device generates a public key and a private key using the parameters, the encryption device encrypts a plain text using the public key, and then, the decryption device decrypts the encrypted text using its own private key.
摘要:
A program converter (1) converts a program (P) which performs arithmetic addition processing to execute encryption, into a converted program (tP) which performs processing equivalent to the processing of the program (P). The program converter (1) includes: a key data extraction unit (10) which extracts key data from the program (P); an addition table generation unit (11) which generates an addition table from the extracted key data; a conversion table extraction unit (12) which extracts a conversion table from the program (P); a table merger unit (13) which generates a merger table by merging the generated addition table and the extracted conversion table; a random number generation unit (14) which generates a random number; a table randomization unit (15) which generates a randomized merger table by randomizing the merger table using the generated random number; and a converted-program generation unit (16) which generates the converted program (tP) according to the generated randomized merger table.
摘要:
To aim to provide an information security device capable of reducing a period necessary for performing a power operation used for secret communication or authentication. The information security device performs secret communication or authentication by calculating an exponentiation X̂d based on target data X and a secret value d using the window method. In the process of calculating the exponentiation X̂d, immediately after square of a random value R acquired for multiplication is repeatedly performed a predetermined number of times, for example 256 times, a result of square of the random value R is cancelled using a cancellation value S (=R̂(−2̂256)). This makes it unnecessary to perform cancellation processing that has been conventionally performed.