Toshihiro Ohigashi

J-GLOBAL         Last updated: Nov 22, 2018 at 14:26
 
Avatar
Name
Toshihiro Ohigashi
Affiliation
Tokai University
Section
School of Information and Telecommunication Engineering Department of Communication and Network Engineering
Job title
Associate Professor
Degree
Ph.D(Kobe University)

Research Areas

 
 

Academic & Professional Experience

 
Apr 2018
 - 
Today
Associate Professor, School of Information and Telecommunication Engineering Department of Communication and Network Engineering, Tokai University
 
Apr 2015
 - 
Today
Guest Researcher, Information Media Center, Hiroshima University
 
Apr 2015
 - 
Mar 2018
Junior Associate Professor, School of Information and Telecommunication Engineering Department of Communication and Network Engineering, Tokai University
 
Apr 2008
 - 
Mar 2015
Assistant Professor, Information Media Center, Hiroshima University
 

Awards & Honors

 
Aug 2018
Implementation Results of Privacy-Preserving and Public Verifiable Data Aggregation Protocols, Best Poster Award, IWSEC 2017
Winner: Tatsuya SUZUKI, Keita EMURA, Hayato KIMURA, and Toshihiro OHIGASHI
 
Jun 2015
Comprehensive Analysis of Initial Keystream Biases of RC4, Best Paper Award, IEICE
Winner: Takanori ISOBE, Toshihiro OHIGASHI, Yuhei WATANABE, and Masakatu MORII
 
Jan 2014
How to Recover Full Plaintext from Only Ciphertexts on Broadcast RC4, SCIS 2013 Innovation Paper Award, IEICE
Winner: Takanori ISOBE, Toshihiro OHIGASHI, Yuhei WATANABE, and Masakatu MORII
 

Published Papers

 
Sonu Jha, Subhadeep Banik, Takanori Isobe, Toshihiro Ohigashi, Santanu Sarkar
IEICE Transactions   101-A(11) 1869-1879   Nov 2018   [Refereed]
Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi
Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings   69-86   2018   [Refereed]
Tohru Kondo, Hidenobu Watanabe, Toshihiro Ohigashi
41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017, Turin, Italy, July 4-8, 2017. Volume 2   284-285   2017   [Refereed]
Yuhei Watanabe, Takanori Isobe, Toshihiro Ohigashi, Masakatu Morii
IEICE Transactions   100-A(3) 803-810   Mar 2017   [Refereed]
Sonu Jha, Subhadeep Banik, Takanori Isobe, Toshihiro Ohigashi
Progress in Cryptology - INDOCRYPT 2016 - 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings   305-321   Dec 2016   [Refereed]
Toshihiro Ohigashi, Takanori Isobe, Yuhei Watanabe, Masakatu Morii
IEICE Transactions   98-A(1) 81-91   Jan 2015   [Refereed]
田島浩一, 岸場清悟, 近堂徹, 大東俊博, 岩田則和, 西村浩二, 相原玲二
学術情報処理研究(CD-ROM)   (18) 16-23   Sep 2014   [Refereed]
大東俊博, 後藤めぐ美, 西村浩二, 相原玲二
情報処理学会論文誌ジャーナル(Web)   55(3) 1126-1139 (WEB ONLY)   Mar 2014   [Refereed]
吉田耕太, 西村浩二, 大東俊博, 相原玲二
情報処理学会論文誌ジャーナル(Web)   55(3) 1117-1125 (WEB ONLY)   Mar 2014   [Refereed]
Toshihiro Ohigashi, Kouji Nishimura, Reiji Aibara, Kouta Yoshida
IEEE 38th Annual Computer Software and Applications Conference, COMPSAC Workshops 2014, Vasteras, Sweden, July 21-25, 2014   78-83   Jul 2014   [Refereed]
Atsushi Nagao, Toshihiro Ohigashi, Takanori Isobe, Masakatu Morii
JIP   22(2) 357-365   2014   [Refereed]
Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe, Masakatu Morii
IEICE Transactions   97-A(1) 139-151   Jan 2014   [Refereed]
Toshihiro Ohigashi, Takanori Isobe, Yuhei Watanabe, Masakatu Morii
Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers   155-173   2013   [Refereed]
Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe, Masakatu Morii
Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers   179-202   2013   [Refereed]
Takanori Isobe, Toshihiro Ohigashi, Masakatu Morii
JIP   21(4) 599-606   2013   [Refereed]
Takatoshi Fujimura, Kouji Nishimura, Tohru Kondo, Toshihiro Ohigashi, Koichi Tashima, Reiji Aibara
IPSJ Journal   53(3) 958-968   Mar 2012   [Refereed]
It is quite natural for Web applications to request the user authentication from security reasons. Then users are required to authenticate themselves repeatedly when they use from one service to the other. The network authentication increases the ...
Takanori Isobe, Toshihiro Ohigashi, Masakatu Morii
Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings   138-155   2012   [Refereed]
Yosuke Todo, Yuki Ozawa, Toshihiro Ohigashi, Masakatu Morii
IEICE Transactions   95-D(2) 588-595   Feb 2012   [Refereed]
田島浩一, 近堂徹, 岸場清悟, 大東俊博, 岩田則和, 西村浩二, 相原玲二
学術情報処理研究   (15) 53-60   Sep 2011   [Refereed]
Ryoichi Teramura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E94-A(1) 10-18   Jan 2011   [Refereed]
Conventional class of weak keys on RC4 stream cipher is defined as a specific case that combinations of the first three bytes of secret key satisfy two relational equations. This paper expands and generalizes the classes of weak keys using general...
Todo Yosuke, Ozawa Yuki, Ohigashi Toshihiro, Morii Masakatu
9(4) 13-18   Aug 2010   [Refereed]
Ozawa Yuki, Todo Yosuke, Ohigashi Toshihiro, Morii Masakatu
9(4) 7-12   Aug 2010   [Refereed]
Effective Falsification Attack on WPA-TKIP by Modifying Any Packet to QoS Packet
Yosuke Todo, Toshihiro Ohigashi, Masakatu Morii
Proceedings of the Fifth Joint Workshop on Information Security (JWIS 2010)   118-132   Aug 2010   [Refereed]
A Study on Temporal Key Recovery Attack on TKIP Using RC4’s Weak Keys
Ryoichi Teramura, Toshihiro Ohigashi, Masakatu Morii
Proceedings of the Fifth Joint Workshop on Information Security (JWIS 2010)   133-147   Aug 2010   [Refereed]
WATANABE Hidenobu, OHIGASHI Toshihiro, KONDO Tohru, NISHIMURA Kouji, AIBARA Reiji
The transactions of the Institute of Electronics, Information and Communication Engineers. B   93(7) 893-901   Jul 2010   [Refereed]
A Performance Improvement Method for the Global Live Migration of Virtual Machine with IP Mobility
Hidenobu Watanabe, Toshihiro Ohigashi, Tohru Kondo, Kouji Nishimura, Reiji Aibara
Proceedings of the Fifth International Conference on Mobile Computing and Ubiquitous Networking (ICMU 2010)   194-199   Apr 2010   [Refereed]
Ryoichi Teramura, Yasuo Asakura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E93-A(1) 164-171   Jan 2010   [Refereed]
Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An...
Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii
Tenth Annual International Symposium on Applications and the Internet, SAINT 2010, Seoul, Korea, 19-23 July, 2010, Proceedings   153-156   Jul 2010   [Refereed]
A Practical Message Falsification Attack on WPA
Toshihiro Ohigashi, Masakatu Morii
Proceedings of the Fourth Joint Workshop on Information Security (JWIS 2009)   1-12   Aug 2009   [Refereed]
Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii
IEICE Transactions on Information and Systems   E92-D(1) 32-40   Jan 2009   [Refereed]
In this paper, we propose an effective key recovery attack on stream ciphers Py and Pypy with chosen IVs. Our method uses an internal-state correlation based on the vulnerability that the randomization of the internal state in the KSA is inadequat...
Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   91(1) 3-11   Jan 2008   [Refereed]
In a key scheduling algorithm (KSA) of stream ciphers, a secret key is expanded into a large initial state. An internal state reconstruction method is known as a general attack against stream ciphers; it recovers the initial state from a given pai...
How to Break Py and Pypy by a Chosen-IV Attack
Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii
Workshop Record of The State of the Art of Stream Ciphers (SASC) 2007   340-352   Jan 2007   [Refereed]
A Categorizing-Guessed-Values Approach for the Key Recovery Attack against WEP
Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii
Proceedings of International Symposium on Information Theory and its Applications (ISITA2006)   403-408   Oct 2006   [Refereed]
Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii
Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II   17-26   Dec 2005   [Refereed]
An Improved Internal-State Reconstruction Method of a Stream Cipher RC4
Yoshiaki Shiraishi, Toshihiro Ohigashi, Masakatu Morii
Proceedings of The IASTED International Conference on Communication, Network, and Information Security(CNIS 2003)   132-135   Dec 2003   [Refereed]
Yoshiaki Shiraishi, Toshihiro Ohigashi, Masakatu Morii
IEICE transactions on fundamentals of electronics, communications and computer sciences   86(10) 2636-2638   Oct 2003   [Refereed]
Knudsen et al. proposed an efficient method based on a tree-search algorithm with recursive process for reconstructing the internal state of RC4 stream cipher. However, the method becomes infeasible for word size n>5 because its time complexity to...
TAKEMORI KEISUKE, TANAKA TOSHIAKI, NAKAO KOJI, OHIGASHI TOSHIHIRO, MIYAKE TAKASHI, SHIRAISHI YOSHIAKI, MORII MASAKATU
IPSJ Journal   43(8) 2542-2551   Aug 2002   [Refereed]
As the malicious attacks to the Web servers are getting to be one of the serious problems in the electronic society, researches on detection techniques against malicious intrusions and unauthorized content manipulations are highly required. Howeve...

Misc

 
鈴木 達也, 江村 恵太, 大東 俊博
電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   118(151) 23-30   Jul 2018
柳 宏之, 木村 隼人, 近堂 徹, 渡邉 英伸, 大東 俊博
電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117(472) 91-96   Mar 2018
石橋 拓哉, 鈴木 達也, 伊藤 勝彦, 大東 俊博, 相原 玲二
電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117(472) 79-84   Mar 2018
鈴木 達也, 江村 恵太, 木村 隼人, 大東 俊博
電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117(369) 43-50   Dec 2017
棚本清也, 大東俊博
電子情報通信学会大会講演論文集(CD-ROM)   2017 ROMBUNNO.A‐7‐8   Aug 2017
城所 賢史, 五十部 孝典, 大東 俊博
電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116(505) 1-6   Mar 2017
田島浩一, 岸場清悟, 近堂徹, 大東俊博, 岩田則和, 西村浩二, 相原玲二
情報処理学会全国大会講演論文集   77th(3) 3.453-3.454   Mar 2015
近堂 徹, 田島 浩一, 岸場 清悟, 吉田 朋彦, 岩田 則和, 大東 俊博, 西村 浩二, 相原 玲二
研究報告インターネットと運用技術(IOT)   2015(33) 1-6   Feb 2015
ネットワークの利用形態が多様化・複雑化するなか,ネットワークインフラの運用管理の効率化が強く求められるようになってきている.しかしながら,管理対象となるネットワーク機器は増加し,人手では対応しきれないケースも多い.機器の設定状況が管理情報として正しく登録されてない場合,障害時の初動対応遅れやヒューマンエラーの発生等が避けられない.本研究では,組織内のネットワークデザインと管理の一元化に加え,ネットワーク機器の構成管理と設定の自動化について考察する.具体的には,広島大学で運用するキャンパス情...
近堂 徹, 田島 浩一, 岸場 清悟, 吉田 朋彦, 岩田 則和, 大東 俊博, 西村 浩二, 相原 玲二
インターネットと運用技術シンポジウム2014論文集   2014 101-108   Nov 2014
大東 俊博, 渡辺 優平, 森井 昌克
コンピュータセキュリティシンポジウム2014論文集   2014(2) 426-433   Oct 2014
KANAOKA Akira, OHIGASHI Toshihiro
IEICE technical report. Information and communication system security   114(71) 33-38   Jun 2014
Ransomware which disables data or functions in victim's computer and demand money from victim, uses cryptographic technology to disable data, therefore brings serious threat to users. In 2013, CryptoLocker which has advanced technology with public...
大東 俊博, 五十部 孝典, 渡辺 優平, 野島 良, 森井 昌克
研究報告セキュリティ心理学とトラスト(SPT)   2014(2) 1-6   Mar 2014
2013 年に SSL/TLS の RC4 において Broadcast Setting のもとで比較的少数の暗号化パケットから高確率で平文を復元できることが五十部らと AlFardan らによって独立に発見された.彼らの攻撃は,使用している脆弱性の性質から平文バイトの位置によって復元できる確率が異なるという特徴を持つ.本稿では,不正なJavaScript を利用して任意の文字列を平文の上位バイトに挿入し,攻撃な有利な位置まで攻撃対象の平文バイトの位置をスライドさせることで,対象の平文バイ...
吉田 耕太, 西村 浩二, 大東 俊博, 相原 玲二
コンピュータセキュリティシンポジウム2013論文集   2013(4) 31-38   Oct 2013
Ohigashi Toshihiro
Proceedings of the Society Conference of IEICE   2013 "SS-45"-"SS-46"   Sep 2013
王 博丞, 近堂 徹, 大東 俊博, 岸場 清悟, 相原 玲二
研究報告インターネットと運用技術(IOT)   2013(38) 1-6   Mar 2013
移動端末や3G、LTEなどの広帯域通信メディアの普及に伴い、複数のアクセス回線を選択しながら適切なネットワークを継続的に利用できることが望まれている。本研究では、移動透過通信機能を有する端末に対し、ハンドオーバ時に利用可能なネットワーク情報をリアルタイムに提供することを目的とした支援システムについて述べる。利用可能なネットワーク情報を収集するために、移動端末に無線ネットワーク情報を収集し、情報収集サーバにアップロードする機能を持たせる。情報収集サーバはそれらの情報をもとに利用可能ネットワー...
田島 浩一, 西村 浩二, 近堂 徹, 岸場 清悟, 大東 俊博, 岩田 則和, 相原 玲二
研究報告インターネットと運用技術(IOT)   2013(34) 1-4   Mar 2013
ファイアウォールやIDS,認証ネットワークの利用などネットワーク機器の利用状況や動作についての確認方法は,最新の状態はSNMP等の管理用プロトコルの利用により可能であるが,過去の動作は基本的に動作ログとして外部出力されるものを利用する事になる.過去の動作ログの利用として,たとえばIDSやファイアウォールの動作ログについて,警告の様なログの累積が一定数を超えた利用についてその確認を行うといった調査が可能である.本研究ではネットワーク機器の動作ログを参照するサービスとその試作,および,学内で運...
GOTO Megumi, OHIGASHI Toshihiro, NISHIMURA Kouji, AIBARA Reiji
IEICE technical report. Information and communication system security   112(315) 49-54   Nov 2012
Online storage services, e.g. Dropbox, have a weakness, which the storage administrator can obtain contents of user's files. We have already proposed a file sharing service based on Ciphertext-Policy Attribute-Based Encryption (CP-ABE), which encr...
Kouta Yoshida, Kouji Nishimura, Toshihiro Ohigashi, Reiji Aibara
IPSJ SIG Technical Reports   2013(15) 1-6   Jul 2013
There is a big demand in the cloud storage service to store data via network from the rapid spread of mobile devices in recent years. Because there is a need to store data in safety in these services, Secret Sharing Scheme (SSS) which can improve ...
KONDO TOHRU, TASHIMA KOICHI, KISHIBA SEIGO, YOSHIDA TOMOHIKO, IWATA NORIKAZU, OHIGASHI TOSHIHIRO, NISHIMURA KOUJI, AIBARA REIJI
IEICE technical report. Social Implications of Technology and Information Ethics   114(494) 197-202   Mar 2015
While the growing diversity and complexity of the computer network, the operational efficiency of network management has been required. However, network equipments which should be managed are increasing, and it results in a management cost increas...
長尾 篤, 大東 俊博, 五十部 孝典, 森井 昌克
コンピュータセキュリティシンポジウム2012論文集   2012(3) 169-176   Oct 2012
Kouji Nishimura, Toshihiro Ohigashi, Kazuo Iwasawa, Takahiro Sumiya, Tomohiro Inagaki, Atsushi Nakamura, Yusuke Miyauchi, Satomi Mito, Reiji Aibara
IPSJ SIG Technical Reports   2012(2) 1-6   Jun 2012
In order to respond to the security incidents increasing year by year, Hiroshima University has started the Information Security and Compliance Course for all students from FY 2011. This course consists of the freshman course for the students enro...
KONDO TOHRU, TASHIMA KOICHI, KISHIBA SEIGO, YOSHIDA TOMOHIKO, IWATA NORIKAZU, OHIGASHI TOSHIHIRO, NISHIMURA KOUJI, AIBARA REIJI
IEICE technical report. Internet Architecture   114(495) 197-202   Mar 2015
While the growing diversity and complexity of the computer network, the operational efficiency of network management has been required. However, network equipments which should be managed are increasing, and it results in a management cost increas...
Yuuhei Kumagai, Kouji Nishimura, Toshihiro Ohigashi, Tohru Kondo, Reiji Aibara
IPSJ SIG Technical Reports   2012(8) 1-6   Jun 2012
Since the East Japan Earthquake Disaster in 2011, the importance of critical information distributed management is increasing. However, one management organization can not be easy to distribute several servers to different places and guarantee dat...
Toshihiro Ohigashi, Tomohiko Yoshida, Norikazu Iwata, Kouji Nishimura, Koichi Tashima, Tohru Kondo, Seigo Kishiba, Reiji Aibara
IPSJ SIG Technical Reports   2014(7) 1-7   Jun 2014
This paper presents recent topics of HINET Wi-Fi, which is a campus-wide wireless LAN system in Hiroshima University. The first topic is to share access points for HINET Wi-Fi with several carrier Wi-Fi. The second topic is to provide portable acc...
後藤 めぐ美, 大東 俊博, 西村 浩二, 相原 玲二
研究報告インターネットと運用技術(IOT)   2012(36) 1-6   Mar 2012
近年,DropBox に代表されるオンラインストレージサービスが普及してきている.このようなサービスではストレージの管理者によりデータを覗き見られる危険性があることから,TrueCrypt のようなクライアント側で暗号化してデータを保護するシステムが注目されている.最近では,暗号文ポリシー属性ベース暗号 (CP-ABE) と呼ばれる新しい公開鍵暗号の方式を利用することで,きめ細やかなアクセス制御をクライアント主導で行う方法について活発に議論されている.しかしながら,既存の方式ではファイル名...
WATANABE Yuhei, ISOBE Takanori, OHIGASHI Toshihiro, MORII Masakatu
IEICE technical report. Information and communication system security   113(95) 19-24   Jun 2013
In FSE2013, we showed that the first 257 bytes and 1000T bytes of the plaintext could be easily recovered with high probability, from only 2^<32> and 2^<34> ciphertexts, respectively, in a broadcast setting where a content is encrypted with user d...
OHIGASHI Toshihiro, ISOBE Takanori, WATANABE Yuhei, NOJIMA Ryo, MORII Masakatu
IEICE technical report. Information and communication system security   113(502) 7-12   Mar 2014
In 2013, Isobe et al. and AlFardan et al. proposed practical plaintext recovery attacks on RC4 in SSL/TLS in the broadcast setting, independently. Their attacks have a property, in which the probability for recovering a plaintext byte is dependent...
TASHIMA Koichi, NISHIMURA Kouji, KONDO Tohru, KISHIBA Seigo, OHIGASHI Toshihiro, IWATA Norikazu, AIBARA Reiji
IEICE technical report. Internet Architecture   112(489) 193-196   Mar 2013
The way of current confirmation of such as usage or behavior of these devices (firewall, IDS, network switch authentication)are managed by the management protocol such as SNMP protocol. 0n the other hand, the way of confirmation of behavior in the...
Wang Bocheng, Kondo Tohru, Ohigashi Toshihiro, Kishiba Seigo, Aibara Reiji
IEICE technical report. Internet Architecture   112(489) 213-218   Mar 2013
Mobile users require to communicate anywhere while selecting the suitable communication media because of the spread deployment of wideband networks such as 3G, LTE and Wi-Fi network. The purpose of this paper is to propose an Information collectio...
小澤 勇騎, 大東 俊博, 森井 昌克
コンピュータセキュリティシンポジウム2009 (CSS2009) 論文集   2009 1-6   Oct 2011
寺村 亮一, 大東 俊博, 桑門 秀典, 森井 昌克
コンピュータセキュリティシンポジウム2009 (CSS2009) 論文集   2009 1-6   Oct 2011
藤村 喬寿, 田島 浩一, 大東 俊博, 西村 浩二, 相原 玲二
第3回 インターネットと運用技術シンポジウム (IOTS2010)   2010 111-118   Dec 2010
藤村 喬寿, 田島 浩一, 大東 俊博
IEICE technical report   109(438) 213-218   Mar 2010
Wang Bocheng, Kondo Tohru, Ohigashi Toshihiro, Kishiba Seigo, Aibara Reiji
IEICE technical report. Social Implications of Technology and Information Ethics   112(488) 213-218   Mar 2013
Mobile users require to communicate anywhere while selecting the suitable communication media because of the spread deployment of wideband networks such as 3G, LTE and Wi-Fi network. The purpose of this paper is to propose an Information collectio...
TASHIMA Koichi, NISHIMURA Kouji, KONDO Tohru, KISHIBA Seigo, OHIGASHI Toshihiro, IWATA Norikazu, AIBARA Reiji
IEICE technical report. Social Implications of Technology and Information Ethics   112(488) 193-196   Mar 2013
The way of current confirmation of such as usage or behavior of these devices (firewall, IDS, network switch authentication) are managed by the management protocol such as SNMP protocol. On the other hand, the way of confirmation of behavior in th...
TODO Yosuke, OZAWA Yuki, OHIGASHI Toshihiro, MORII Masakatu
Technical report of IEICE. ISEC   109(445) 225-232   Feb 2010
Beck and Tews have proposed a message falsification attack on WPA-TKIP in November 2008. Their attack (called the Beck-Tews attack) works for only a network that supports IEEE802.11e QoS features. We have proposed the man-in-the-middle attack in J...
OZAWA Yuki, TODO Yosuke, OHIGASHI Toshihiro, MORII Masakatu
Technical report of IEICE. ISEC   109(445) 233-240   Feb 2010
Recently, many message falsification attacks on WPA-TKIP have been proposed. In these research, methods for satisfying ARP packet, DNS packer, SYN packer, or DHCP ACK packet are discussed. In addition, methods for reducing execution time of the at...
Takatoshi Fujimura, Kouichi Tashima, Toshihiro Ohigashi, Kouji Nishimura, Reiji Aibara
IPSJ SIG Technical Reports   2010(37) 1-6   Feb 2010
These days, public network service is expanding of the mobile computer widely spreads. Especially network service at visited institutions is also increasing among academic research organizations. Even though network authentication provides the sec...
田島浩一, 近堂徹, 岸場清悟, 大東俊博, 岩田則和, 西村浩二, 相原玲二
情報処理学会シンポジウムシリーズ(CD−ROM)   2010(1) 1159-1165   Jun 2010
藤村喬寿, 田島浩一, 大東俊博, 西村浩二, 相原玲二
情報処理学会シンポジウム論文集   2010(14) 111-118   Nov 2010
OHIGASHI Toshihiro, OZAWA Yuki, MORII Masakatu
Technical report of IEICE. ISEC   109(271) 107-112   Nov 2009
In 2008, Beck and Tews have proposed a message falsification attack on WPA-TKIP. Their attack (called the Beck-Tews attack) works for only wireless LAN products that support IEEE802.11e QoS features. The Beck-Tews attack can recover a MIC key and ...
OZAWA Yuki, OHIGASHI Toshihiro, MORII Masakatu
IEICE technical report. Life intelligence and office information systems   109(205) 113-118   Sep 2009
In November 2008, Beck and Tews have proposed a message falsification attack on WPA-TKIP. Their attack (called the Beck-Tews attack) works for only wireless LAN products that support IEEE802.11e QoS features. The Beck-Tews attack can recover a MIC...
TASHIMA Kouichi, KONDO Tohru, KISHIBA Seigo, OHIGASHI Toshihiro, IWATA Norikazu, NISHIMURA Kouji, AIBARA Reiji
IPSJ SIG Technical Reports   2009(21) 265-270   Feb 2009
The operation of the new campus network 'HINET2007' began in Hiroshima University since FY 2008. The network user authenticate function that synchronizes with official campus digital authentication service system is offered as a user authenticatio...
WATANABE Hidenobu, OHIGASHI Toshihiro, KONDO Tohru, NISHIMURA Kouji, AIBARA Reiji
IPSJ SIG Technical Reports   2009(21) 125-130   Feb 2009
The wearable computing uses wearable devices that can be worn to human's body. We always can use the application with such devices for daily life in state of hands-free. Generally, it requires to carry the wearable devices with a small laptop PC s...
近堂 徹, 田島 浩一, 岸場 清悟, 大東 俊博, 岩田 則和, 西村 浩二, 相原 玲二
インターネットと運用技術シンポジウム2008論文集   2008 121-128   Dec 2008
平成20年度より広島大学で運用を開始した新キャンパスネットワークは,全学電子認証システムとも連動するネットワーク利用者認証機能を提供している。この利用者認証は,全学で約450台整備したエッジスイッチにて実現しており,一時利用者のみならず定常利用者を含む全利用者に対してネットワーク接続時の利用者認証を行うことで,セキュリティの保証された安全な利用環境を実現している。全学的なネットワークインフラとして利用者認証機能を提供するためには安定かつ強固なシステム構築が必要となる。本稿では、認証機能を提...
Teramura Ryoichi, Asakura Yasuo, Ohigashi Toshihiro, Kuwakado Hidenori, Morii Masakatu
IPSJ SIG Notes   2008(122) 49-54   Nov 2008
Most attacks on the WEP protocol proposed in the past recover the key using ARP packets and can be detected by an IDS. In this paper, we proposed the key recovery attack on the WEP protocol using IP packets. Our attack recovers the 104-bit key wit...
OHIGASHI Toshihiro, KONDO Tohru, KISHIBA Seigo, TASHIMA Koichi, IWATA Norikazu, NISHIMURA Kouji, AIBARA Reiji
IPSJ SIG Technical Reports   2008(87) 31-36   Sep 2008
A new campus network system opening at FY2008 in Hiroshima University has adopted the uniform management of the network. In the new campus network system, about 2,000 VLANs are assigned to users, and a processing that sets the VLANs to each port i...
OHIGASHI Toshihiro, KUWAKADO Hidenori, MORII Masakatu
Technical report of IEICE. ISEC   107(346) 61-68   Nov 2007
E. Tews, R. Weinmann, and A. Pyshkin have recently shown a key recovery attack on WEP (called the PTW attack). The PTW attack recovers a 104-bit secret key from the first 15 bytes of a keystream, which is obtained from the output of WEP. It recove...
ISOBE Takanori, OHIGASHI Toshihiro, KUWAKADO Hidenori, MORII Masakatu
Technical report of IEICE. ISEC   107(346) 69-74   Nov 2007
If the ciphertexts generated from defferent keys are equivalent, these keys are called equivalent keys. In a stream cipher, since a ciphertext is generated by XORing a plaintext to a keystream, the key which generates a phase shifted keystream can...
TERAMURA Ryoichi, OHIGASHI Toshihiro, KUWAKADO Hidenori, MORII Masakatu
Technical report of IEICE. ISEC   107(346) 75-80   Nov 2007
This paper discusses the keys on RC4 which parts of them can be recovered from their outputs with high probability. We show parts of initial states can be recovered from their outputs with high probability than the probability that parts of intern...
TERAMURA Ryoichi, OHIGASHI Toshihiro, KUWAKADO Hidenori, MORII Masakatu
IEICE technical report. Office Information Systems   107(230) 71-76   Sep 2007
This paper discusses the correlation on the initial states-keystream of RC4, and gives the key recovery attack exploiting it. What we found is the correlation between 4bytes (from 2nd byte to 5th byte) of the keystream and 5bytes (from 2nd byte to...
FUJIKAWA Yoshiaki, OHIGASHI Toshihiro, KUWAKADO Hidenori, MORII Masakatu
Technical report of IEICE. ISEC   107(141) 9-16   Jul 2007
MICKEY and MICKEY-128, which are stream ciphers submitted to the ECRYPT Stream Cipher Project(eSTREAM), use a 80-bit secret key and a 128-bit one, respectively. MICKEY and MICKEY-128 are candidates on Phase 3 of eSTREAM. However, no critical attac...
OZASA Yuko, FUJIKAWA Yoshiaki, OHIGASHI Toshihiro, KUWAKADO Hidenori, MORII Masakatu
Technical report of IEICE. ISEC   107(141) 17-21   Jul 2007
Tews, Weinmann, and Phshkin have shown a key recovery attack against WEP (the TWP attack), which is the modification of Klein's key recovery attack against RC4. The TWP attack allows an attacker to recover a 104-bit secret key from 40,000 captured...
FUJIKAWA Yoshiaki, OHIGASHI Toshihiro, KUWAKADO Hidenori, MORII Masakatu
Technical report of IEICE. ISEC   107(44) 93-99   May 2007
In the stream cipher, the initial state is generated from a secret key and an initialization vector (IV) in key-scheduling algorithm (KSA). In order to provide hight-level security, onewayness of the KSA is requested. The ECRYPT Stream Cipher Proj...
TERAMURA Ryoichi, ISOBE Takanori, OHIGASHI Toshihiro, KUWAKADO Hidenori, MORII Masakatu
Technical report of IEICE. ISEC   107(44) 101-108   May 2007
When different keys are used in encryption, we call these keys equivalent keys if ciphertexts generated from these keys have equivalence. In general, the equivalent keys are the keys that generate same ciphertexts. In the stream ciphers, the keys ...
FUJIKAWA Yoshiaki, OHIGASHI Toshihiro, KUWAKDO Hidenori, MORII Masakatu
Technical report of IEICE. ISEC   106(411) 73-79   Dec 2006
Key recovery attacks against WEP based on weak IVs, which leak information of a private key, have been shown. Since each previous key recovery attacks use a specific set of weak IVs, existing WEP usually uses IVs except for such weak IVs. Notice t...
ISOBE Takanori, OHIGASHI Toshihiro, KUWAKADO Hidenori, MORII Masakatu
Technical report of IEICE. ISEC   106(175) 141-148   Jul 2006
Biham and Seberry have submitted the stream cipher Py to the ECRYPT Stream Cipher Project (eSTREAM). In this paper, we present two useful methods for the key recovery attack against Py. First, we show the method for finding a secret key from a par...
ISOBE Takanori, OHIGASHI Toshihiro, KUWAKADO Hidenori, MORII Masakatu
Technical report of IEICE. ISEC   106(411) 81-87   Dec 2006
Biham and Seberry have submitted the stream cipher Py to the ECRYPT Stream Cipher Project (eSTREAM). A key recovery attack against Py was proposed by Wu and Preneel. In that attack, (IV sizeb-9) bytes of the key can be recovered from (IV sizeb-4)×...
UO Kenji, OHIGASHI Toshihiro, SHIRAISHI Yoshiaki, MORII Masakatu
IEICE technical report. Office Information Systems   105(283) 29-34   Sep 2005
One-Time Password (OTP) method is a secure password-based authentication method by changing password in each session. We have already proposed a single OTP method usable by multi-authentication agents. In this paper, we evaluate the security of th...
OHIGASHI Toshihiro, SHIRAISHI Yoshiaki, MORII Masakatu
Technical report of IEICE. ISEC   104(731) 43-48   Mar 2005
WEP protocol is a security protocol to protect privacy of the wireless LAN communication. Original WEP was broken by the FMS attack in 2001. FMS attack-resistant WEP implementation removes weak IVs to resist the FMS attack. We have already propose...
ICHIKAWA Sachihiro, OHIGASHI Toshihiro, MOHRI Masami, MORII Masakatu
IEICE technical report. Office Information Systems   104(238) 19-24   Jul 2004
Recently, the distributed computing using personal computer is interested. The distributed computing requires a method to recovery the network troubles. The autonomous decentralized system has resistance for network troubles. However, generally pr...
OHIGASHI Toshihiro, SHIRAISHI Yoshiaki, MORII Masakatu
Technical report of IEICE. ISEC   104(200) 41-48   Jul 2004
Internal-state reconstruction method is a method for reconstructing the internal state of stream ciphers with time-variant tables. The key size and the key scheduling algorithm of stream ciphers with time-variant tables do not influence the time-c...
MOTOIE Hiromi, OHIGASHI Toshihiro, SHIRAISHI Yoshiaki, MORII Masakatu
IPSJ SIG Notes   2005(41) 41-46   May 2005
Virtual Private Network (VPN) is a technology to construct a private network over public networks. Software-based VPN products are popular, because they don't need any appliance. OpenVPN is one of the most popular software-based VPN products and h...
UGAWA Sanzo, OHIGASHI Toshihiro, SHIRAISHI Yoshiaki, MORII Masakatu
Technical report of IEICE. ISEC   104(200) 49-52   Jul 2004
A new key stream generator with time-variant tables, named SSSM, is proposed. SSSM is high-speed and secure key stream generator operated by the unit of 32-bit. This paper gives the algorithm and analytical result of SSSM.
UO Kenji, OHIGASHI Toshihiro, SHIRAISHI Yoshiaki, MORII Masakatu
IPSJ SIG Notes   2005(41) 53-58   May 2005
One-Time Password (OTP) method is a secure password-based authentication method by changing password in each session. A lot of OTP methods have been proposed, but most methods don't consider use of multi-authentication agents. The authorization mo...
OHIGASHI Toshihiro, SHIRAISHI Yoshiaki, MORII Masakatu
IEICE technical report. Office Information Systems   104(69) 1-6   May 2004
Internal-state reconstruction method is a method for reconstructing the internal state of some stream ciphers with time-variant tables. We have already proposed an efficient deterministic internal-state reconstruction method. In this paper, we imp...
UGAWA Sanzo, OHIGASHI Toshihiro, SHIRAISHI Yoshiaki, MORII Masakatu
IEICE technical report. Office Information Systems   104(69) 7-12   May 2004
Stream cipher using keystream generator with time-variant tables is suitable for software implementation. RC4 is the most widely used keystream generator with time-variant tables. There have been many security analyses of RC4. In this paper, we pr...
MOTOIE Hiromi, OHIGASHI Toshihiro, SHIRAISHI Yoshiaki, MORII Masakatu
IPSJ SIG Notes   2005(41) 41-46   May 2005
Virtual Private Network (VPN) is a technology to construct a private network over public networks. Software-based VPN products are popular, because they don't need any appliance. OpenVPN is one of the most popular software-based VPN products and h...
TAKEUCHI Takahiro, HATASHIMA Kenji, ICHIKAWA Sachihiro, OHIGASHI Toshihiro, MOHRI Masami, MORII Masakatu
IEICE technical report. Office Information Systems   104(68) 19-24   May 2004
Recently, distributed computing using personal computer is interested. The distributed computing requires a method to recovery of the network troubles. The autonomous decentralized system have resistance for network troubles. However, generally pr...
UO Kenji, OHIGASHI Toshihiro, SHIRAISHI Yoshiaki, MORII Masakatu
IPSJ SIG Notes   2005(41) 53-58   May 2005
One-Time Password (OTP) method is a secure password-based authentication method by changing password in each session. A lot of OTP methods have been proposed, but most methods don't consider use of multi-authentication agents. The authorization mo...
OHIGASHI Toshihiro, SHIRAISHI Yoshiaki, MORII Masakatu
情報理論とその応用シンポジウム予稿集 = The proceedings of the Symposium on Information Theory and Its Applications   26(1) 37-40   Dec 2003
Takemori Keisuke, Miyake Yutaka, Nakao Koji, Ohigashi Toshihiro, Miyake Takashii, Shiraishi Yoshiaki, Morii Masakatsu
Proceedings of the IEICE General Conference   2002(1)    Mar 2002
OHIGASHI Toshihiro, MASUDA Shinsuke, MIYAKE Takashi, SHIRAISHI Yoshiaki, MORII Masakatu
Technical report of IEICE. OFC   101(435) 29-34   Nov 2001
With the spread of the Internet, illegal access via the Internet becomes serious problem. WWW contents are frequently altered by opponent, and the attack is a social problem recently. DNS attack for WWW is not detected by existent detection system...

Research Grants & Projects

 
Ministry of Education, Culture, Sports, Science and Technology: Grants-in-Aid for Scientific Research(若手研究(B))
Project Year: Apr 2009 - Mar 2011    Investigator(s): Toshihiro OHIGASHI
In this research, I proposed falsification methods against WPA-TKIP, which is a security protocol for wireless LAN with stream cipher, for evaluating its security. Previous method succeeds only for a network that supports IEEE802.11e QoS features....