World Library  
Flag as Inappropriate
Email this Article


Article Id: WHEBN0000549159
Reproduction Date:

Title: Cryptrec  
Author: World Heritage Encyclopedia
Language: English
Subject: Outline of cryptography, Camellia (cipher), Hierocrypt, WikiProject Cryptography, CIPHERUNICORN-A
Collection: Cryptography Standards, Government Research
Publisher: World Heritage Encyclopedia


CRYPTREC is the Cryptography Research and Evaluation Committees set up by the Japanese Government to evaluate and recommend cryptographic techniques for government and industrial use. It is comparable in many respects to the European Union's NESSIE project and to the Advanced Encryption Standard process run by NIST in the U.S..


  • Comparison with NESSIE 1
  • Background and sponsors 2
  • Responsibilities 3
  • Selection 4
  • CRYPTREC Ciphers List 5
    • e-Government Recommended Ciphers List 5.1
    • Candidate Recommended Ciphers List 5.2
    • Monitored Ciphers List 5.3
    • Notes 5.4
  • References 6
  • External links 7

Comparison with NESSIE

There is some overlap, and some conflict, between the NESSIE selections and the CRYPTREC draft recommendations. Both efforts include some of the best cryptographers in the world therefore conflicts in their selections and recommendations should be examined with care. For instance, CRYPTREC recommends several 64 bit block ciphers while NESSIE selected none, but CRYPTREC was obliged by its terms of reference to take into account existing standards and practices, while NESSIE was not. Similar differences in terms of reference account for CRYPTREC recommending at least one stream cipher, RC4, while the NESSIE report specifically said that it was notable that they had not selected any of those considered. RC4 is widely used in the SSL/TLS protocols; nevertheless, CRYPTREC recommended that it only be used with 128-bit keys. Essentially the same consideration led to CRYPTREC's inclusion of 160-bit message digest algorithms, despite their suggestion that they be avoided in new system designs. Also, CRYPTREC was unusually careful to examine variants and modifications of the techniques, or at least to discuss their care in doing so; this resulted in particularly detailed recommendations regarding them.

Background and sponsors

CRYPTREC includes members from Japanese academia, industry, and government. It was started in May 2000 by combining efforts from several agencies who were investigating methods and techniques for implementing 'e-Government' in Japan. Presently, it is sponsored by

  • the Ministry of Economy Trade and Industry,
  • the Ministry of Public Management, Home Affairs and Post and Telecommunications,
  • the Telecommunications Advancement Organization, and
  • the Information-Technology Promotion Agency.


It is also the organization providing technical evaluation and recommendations in regard to regulations implementing Japanese laws: examples include that on Electronic Signatures and Certification Services (Law 102 of FY2000, taking effect as from April 2001), the Basic Law on the Formulation of an Advanced Information and Telecommunications Network Society of 2000 (Law 144 of FY2000), and the Public Individual Certification Law of December 2002. Furthermore, CRYPTEC has responsibilities with regard to the Japanese contribution to the ISO/IEC JTC 1/SC27 standardization effort.


First release in 2003,[1] many Japanese ciphers were selected for "e-Government Recommended Ciphers List"; CIPHERUNICORN-E (NEC), Hierocrypt-L1 (Toshiba), MISTY1 (Mitsubishi Electric) as 64 bit block ciphers, Camellia (Nippon Telegraph and Telephone, Mitsubishi Electric), CIPHERUNICORN-A (NEC), Hierocrypt-3 (Toshiba), SC2000(Fujitsu) as 128 bit block ciphers, MUGI, MULTI-S01 (Hitachi) as stream ciphers.

Revised release in 2013,[2] list was divided to three, "e-Government Recommended Ciphers List", "Candidate Recommended Ciphers List", and "Monitored Ciphers List". Most of Japanese ciphers listed in previous list (except for Camellia) have moved from "Recommended Ciphers List" to "Candidate Recommended Ciphers List". There were several new proposals like CLEFIA (Sony) as 128 bit block cipher, KCipher-2 (KDDI), Enocoro-128v2 (Hitachi) as stream ciphers, however, only KCipher-2 has been listed on "e-Government Recommended Ciphers List". The reason why most of Japanese ciphers have not been selected as "Recommended Ciphers" is not that these ciphers are unsafe, but that these ciphers are not widely used in commercial products, open-source projects, governmental systems, international standards. There is possibility that ciphers listed on "Candidate Recommended Ciphers List" will be moved to "e-Government Recommended Ciphers List" when they are used in many systems.

In addition, 128 bit RC4 and SHA-1 are listed on "Monitored Ciphers List". These are unsafe and only permitted to keep compatibilities with old systems.

CRYPTREC Ciphers List

e-Government Recommended Ciphers List

  • Public key ciphers
  • Symmetric key ciphers
  • Hash functions
    • SHA-256: NIST FIPS PUB 180-4
    • SHA-384: NIST FIPS PUB 180-4
    • SHA-512: NIST FIPS PUB 180-4
  • Modes of operation
    • Encryption modes
      • CBC: NIST SP 800-38A
      • CFB: NIST SP 800-38A
      • CTR: NIST SP 800-38A
      • OFB: NIST SP 800-38A
    • Authenticated encryption modes
      • CCM: NIST SP 800-38C
      • GCM:[note 4] NIST SP 800-38D
  • Message authentication codes
    • CMAC: NIST SP 800-38B
    • HMAC: NIST FIPS PUB 198-1
  • Entity authentication
    • ISO/IEC 9798-2: ISO/IEC 9798-2:2008
    • ISO/IEC 9798-3: ISO/IEC 9798-3:1998, ISO/IEC 9798-3:1998/Amd 1:2010

Candidate Recommended Ciphers List

Monitored Ciphers List


  1. ^ a b c Use of RSA-1024 is permitted based on Japanese government guideline.
  2. ^ 128 bit block ciphers are preferable if possible
  3. ^ Permitted 'for the time being' if used as specified in FIPS Pub 46-3, and if specified as a de facto standard
  4. ^ Initial vector (IV) should be 96 bytes.
  5. ^ Only permitted as KEM (Key Encapsulating Mechanism)–DEM (Data Encapsulating Mechanism)
  6. ^ 128 bit block ciphers are preferable if possible
  7. ^ Size of the plaintext should be multiples of 64 bit.
  8. ^ a b Use of RSA-1024 and SHA-1 is permitted based on Japanese government guideline.
  9. ^ Permitted 'for the time being' based on the results in use of SSL 3.0 / TLS 1.0, 1.1, 1.2.
  10. ^ limited to SSL3.0 / TLS1.0 or higher
  11. ^ Message length should be fixed.


  1. ^ "e-Government recommended ciphers list" (PDF). CRYPTREC. Retrieved 2013-11-26. 
  2. ^ "Specifications of e-Government Recommended Ciphers". CRYPTREC. Retrieved 2013-11-26. 

External links

  • Main CRYPTREC Web page
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.