Information Security Lab. of Okayama University, also known as Nogami Kusaka Lab. is led by Professor Yasuyuki Nogami and Senior Assistant Professor Takuya Kusaka. We are doing research in Safe and Secure communication with ICT techniques including, Cryptography, Pseudo random number, Communication protocol, Error correcting codes, Mathematical basic research, program implementation with C/C++/Java/HDL, FPGA, Microcontroller, and so on. Through the process, students are pursuing a variety of capabilities on technology and are actively taking part in the workforce.
Nogami and Kusaka Lab. deals with various research topics as follows.
- Secure Database
- Error Correction Code
- Lattice Based Cryptography
- Elliptic Curve Cryptography
- Elliptic Curve Discrete Logarithm Problem(ECDLP)
- IoT (Internet of things) / IoE (Internet of Everything) Security
- Discrete Mathematics such as Integer Theory and Finite Field Theory
NEWS & EVENTS
Advances in cybersecurity technology are important to meet the challenges of ensuring the safety and social acceptably of the proliferation of technology based cloud computing and internet of things (IoT). Researchers at Okayama University are playing a central role in the development public-key internet security systems for data transmission. cybersecurity in particularly, RSA cryptography and elliptic curve cryptography for digital authentication of users and devices.
Information security technology is necessary for the Cloud and IoT era. Particularly, public key cryptography such as RSA cryptography and elliptic curve cryptography plays an important role since it enables digital authentications for users and devices. In addition, recent innovative secure applications such as ID-based cryptography and time release encryption need much more complicated cryptographies such as pairing-based cryptography. ID-based cryptography enables the use some ID of the user as the public key.
Dr. Yasuyuki Nogami and his colleagues’ research group of Okayama University has developed a noble secure cryptoprocessor that a security level can be changed freely.In this era of crowd computing, the information security technology is essential, and its functional requirement has become more complicated and sophisticated year after year. Adding on to that, it is needed to implement the ability to handle complex cryptographic calculation because IoT (Internet of Things) is expanding rapidly.
数学が支える情報通信のセキュリティ／岡山大学 野上 保之先生
A Consideration of an efficient calculation over the extension field of degree 3 and 4 for elliptic curve pairing cryptography