NOGAMI KUSAKA LAB

Information Security Engineering Lab. of Okayama University, also known as Nogami Kusaka Lab. is led by Professor Yasuyuki Nogami and Senior Assistant Professor Takuya Kusaka. We are doing research in Safe and Secure communication with ICT techniques including, Cryptography, Pseudo random number, Communication protocol, Error correcting codes, Mathematical basic research, program implementation with C/C++/Java/HDL, FPGA, Microcontroller, and so on. Through the process, students are pursuing a variety of capabilities on technology and are actively taking part in the workforce.

RESEARCH INTERESTS

Nogami and Kusaka Lab. deals with various research topics as follows.

  • Pairing
  • Secure Database
  • Error Correction Code
  • Lattice Based Cryptography
  • Elliptic Curve Cryptography
  • Elliptic Curve Discrete Logarithm Problem(ECDLP)
  • IoT (Internet of things) / IoE (Internet of Everything) Security
  • Discrete Mathematics such as Integer Theory and Finite Field Theory

NEWS & EVENTS

Okayama University (Okadai) is Japan’s leading university in IoT security
Okayama University (Okadai) is Japan’s leading university in IoT security

Advances in cybersecurity technology are important to meet the challenges of ensuring the safety and social acceptably of the proliferation of technology based cloud computing and internet of things (IoT). Researchers at Okayama University are playing a central role in the development public-key internet security systems for data transmission. cybersecurity in particularly, RSA cryptography and elliptic curve cryptography for digital authentication of users and devices.

World’s first flexible security Secure Crypto-processor with adjustable security level
World’s first flexible security Secure Crypto-processor with adjustable security level

Information security technology is necessary for the Cloud and IoT era. Particularly, public key cryptography such as RSA cryptography and elliptic curve cryptography plays an important role since it enables digital authentications for users and devices. In addition, recent innovative secure applications such as ID-based cryptography and time release encryption need much more complicated cryptographies such as pairing-based cryptography. ID-based cryptography enables the use some ID of the user as the public key.

Development of Secure Crypto-processor that Has Various Security Level
Development of Secure Crypto-processor that Has Various Security Level

Dr. Yasuyuki Nogami and his colleagues’ research group of Okayama University has developed a noble secure cryptoprocessor that a security level can be changed freely.In this era of crowd computing, the information security technology is essential, and its functional requirement has become more complicated and sophisticated year after year. Adding on to that, it is needed to implement the ability to handle complex cryptographic calculation because IoT (Internet of Things) is expanding rapidly.

数学が支える情報通信のセキュリティ【夢ナビTALK】

数学が支える情報通信のセキュリティ/岡山大学 野上 保之先生

素朴な数学で作り上げる現代の暗号技術【夢ナビTALK】
素朴な数学で作り上げる現代の暗号技術【夢ナビTALK】

インターネットを中心とする現在の情報化社会では、暗号を土台とする情報セキュリティ技術が欠かせません。そこには、多数の計算機でも解けない数学の難問が使われている一方で、整数の四則演算や素数など、素朴な数学が活躍していることを紹介します。