Patents Assigned to NEC Software Hokuriku, Ltd.
  • Publication number: 20140328482
    Abstract: An encryption evaluation device 100 is a device evaluating the security of a block cipher encrypting data of a predetermined size for each block by repeatedly executing, a predetermined number of rounds, a round process using a round function converting data based on a key. The encryption evaluation device 100 includes: a structure specification information accepting part 101 configured to accept structure specification information for specifying a structure of the block cipher; and a security index value calculating part 102 configured to specify a non-use number as the number of round functions that are not used in meet-in-the-middle attack, based on the accepted structure specification information, and calculate a security index value indicating a calculation amount required to specify the key by performing the meet-in-the-middle attack, based on the specified non-use number.
    Type: Application
    Filed: September 18, 2012
    Publication date: November 6, 2014
    Applicant: NEC SOFTWARE HOKURIKU, LTD.
    Inventor: Teruo Saito
  • Patent number: 8619976
    Abstract: An encryption/decryption method comprises by using a generalized Feistel structure in which data is divided into n pieces and mixing processing with key data is performed, diffusion processing, in which data transformation via linear operation is executed, is performed at least once between rounds of the generalized Feistel structure, wherein. As the diffusion processing, linear transformation is performed in which each of n pieces of output data is operated on by two or more pieces of input data. The method is adapted for encryption or decryption.
    Type: Grant
    Filed: December 11, 2008
    Date of Patent: December 31, 2013
    Assignees: NEC Corporation, NEC Software Hokuriku, Ltd.
    Inventors: Tomoyasu Suzaki, Yukiyasu Tsunoo, Hiroyasu Kubo, Maki Shigeri, Teruo Saito, Takeshi Kawabata, Hiroki Nakashima
  • Publication number: 20100266122
    Abstract: An encryption/decryption method comprises by using a generalized Feistel structure in which data is divided into n pieces and mixing processing with key data is performed, diffusion processing, in which data transformation via linear operation is executed, is performed at least once between rounds of the generalized Feistel structure, wherein. As the diffusion processing, linear transformation is performed in which each of n pieces of output data is operated on by two or more pieces of input data. The method is adapted for encryption or decryption.
    Type: Application
    Filed: December 11, 2008
    Publication date: October 21, 2010
    Applicants: NEC CORPORATION, NEC SOFTWARE HOKURIKU, LTD.
    Inventors: Tomoyasu Suzaki, Yukiyasu Tsunoo, Hiroyasu Kubo, Maki Shigeri, Teruo Saito, Takeshi Kawabata, Hiroki Nakashima
  • Publication number: 20090208004
    Abstract: To achieve both information confidentiality management and early discovery of information leak.
    Type: Application
    Filed: December 20, 2005
    Publication date: August 20, 2009
    Applicants: Oak Information System Corportation, NEC Software Hokuriku, Ltd.
    Inventors: Masashi Kawai, Hiroyuki Nishikawa