Research
Security assurance schemes for IoT devices
The Internet of Things has become widespread, and various things have been networked. The same is true for automobiles, and control using a network called a connected car has come to be performed. On the other hand, cases have been reported in which a malicious attacker remotely controls a car. In order to respond to such social issues, it is important to ensure that security functions work.
MoreLightweight Cryptography
When ensuring the security of embedded devices, which play an important role in various IoT applications, implementation resource constraints in software and hardware are issues. Expectations for security countermeasure technology, which is a technology that can be implemented with low resources even for RFID tags and inexpensive microcontrollers, which are difficult to handle with conventional general-purpose encryption, have increased.
MoreCryptographic Authentication and Key Exchange
Entity authentication and key exchange are indispensable cryptographic technologies for all communications, including IoT/CPS. Among them, Authenticated Key Exchange (AKE) protocols allow each entity to authenticate corresponding parties through public networks such as the Internet and share session keys to establish secure channels. These protocols have already been widely used in the real world, such as HTTPS, VPN, TLS, and SSH.
More