Information Security Engineering
Fig.1 Remote visualization of screen images using EM Emanation
Fig.2 Development of countermeasure to prevent EM display stealing from tablet PCs
Fig.3 Evaluation board for physical security evaluation including post-quantum cryptography.
Fig.4 Visualization of information leakage paths based on large-scale EM field simulation techniques
Fig.5 Anechoic chamber for hardware security evaluation
Fig.6 Development of cost-effective countermeasures based on information leakage map
Electromagnetic(EM) information leakage
Research on the risk assessment of security degradation due to information leakage (Fig. 1) using electromagnetic (EM) signals generated from information terminals; we are also conducting researches on methodologies and techniques for countering this phenomenon (Fig. 2).
Intentional electromagnetic interference (IEMI)
Research on the risk assessment of security degradation associated with intentional electromagnetic disturbance in hardware and also on technologies for countering this phenomenon.
Intentional modification of internal circuits (Hardware Trojan)
Research on risk assessment of security degradation due to malware implemented by intentionally changing the internal circuits of information equipment, and also on technologies for countering this occurrence.
Implementation and evaluation of next generation cryptographic algorithm
Research on an efficient hardware implementation of next generation cryptographic algorithm such as functional cryptography and post-quantum cryptography. This research topic includes not only performance evaluation, but also physical security evaluation (Fig. 3).
Large-scale electromagnetic field simulation
Research on large-scale electromagnetic field simulation necessary for clarifying information security degradation mechanisms due to leakages or interfering electromagnetic waves, and for risk assessment at the early design stages of equipment (Fig. 4).
Reliability of information communication systems
Research on approaches for designing information communication system equipment, which has little electromagnetic signal leakage from the viewpoints of environmental electromagnetic engineering (EMC) and electromechanical devices (EMD), and which is even tolerant against electromagnetic disturbance (Figs. 5, 6).
In the Information Security Engineering Laboratory, we conduct research on methods to ensure hardware safety, which is the bedrock of system information security. We also conduct research to ensure the security of the entire system, including the upper layers.