成果報告書詳細
管理番号20160000000743
タイトル*平成27年度中間年報 戦略的イノベーション創造プログラム(SIP)/重要インフラ等におけるサイバーセキュリティの確保 (a4)IoT向けセキュリティ確認技術(IoT向けセキュリティ確認技術の研究開発)
公開日2016/8/23
報告書年度2015 - 2015
委託先名電子商取引安全技術研究組合 ルネサスエレクトロニクス株式会社
プロジェクト番号P15011
部署名IoT推進部
和文要約
英文要約Title:SIP/ Cyber security in important infrastructures and other fields/ (a4) Security Verification Technologies for IOT/ Development of Security Verification Technologies for IOT (FY2015-2017)FY2015 Annual Report

1. Results of R&D

1.Development of the secure crypto module for device in IoT system

1-1 Crypto module
Summery
1.Select algorithm to be implemented on the secure crypto module was started.
2.Research specification of the first proto type module was started.

1-2 Tamper resistant technology
Summery
1.Research for tamper resistant technologies to be implemented on the secure crypto module was started.
2.Research for specification of the secure crypto module implementation according to JISEC-PP-C0427 requirements was started.

1-3 Secure platform
Summery
Renesas was carried out the establishment of the implementation structure to develop a security platform to be installed in Secure Encryption Module.
And, Renesas has begun to study the technical preconditions of Secure Encryption Module for implementation at the end node is to be provided, and to clarify the detailed development issues based on it.

1-4 Marketing
Summery
1. ECSEC.TRA and co-operating research entities agreed on March 22nd, 2016 to transfer all foreground IPs to future company for IP management which will be a successor of ECSEC.TRA.
2. ECSEC.TRA general meeting was held on March 25th, 2016 and resolved that ECSEC.TRA will become a private company for IP management according to the industrial research association law of Japan after 4th period research and experiment term of the TRA.
3. Research how to use exist international standards for marketing of the R&D results of this project was started.

2. Development of the model system using secure crypto module

2-1 Development of the model system using secure crypto module
Summery
1. Selecting application for the model system was started.
2. Research how to implement the secure crypto module on embedded devices in the model system was started.

2-2 Analysis for market introduction of secure crypto module and proposal of business model
Summery
1. Research how to use the secure crypto module (public key encryption is embedded) in large field social applications was started.
2. Research possible application model system was started.

3. Development of counter technology against the Hardware Trojan
Summery
Estimation and selection of counter major technologies against Hardware Trojan from open source was started.
ダウンロード成果報告書データベース(ユーザ登録必須)から、ダウンロードしてください。

▲トップに戻る