List of Projects

The Cryptography Research Laboratory

Leading-edge research on encryption and advanced cryptographic primitives Leading-edge research in cryptography for next-generation cryptographic schemes.

Creating new business pillars based on advances in the theory of cryptography
Creating new business pillars based on advances in the theory of cryptography

With a view to making safe and secure communications possible, The Cryptography Research Laboratory conducts continued research on core security technologies that enable the safe use of networks and services. In particular, we are developing new cryptosystems and studying the foundations of cryptography, security of encryption protocols, and quantum information and communications technologies.
In order to make safe and secure communications a reality, The Cryptography Research Laboratory conducts research into the foundational security technologies that let users feel safe when using networks and services. Our research focuses in particular on the development and security evaluation of novel cryptographic schemes, on the security of cryptographic protocols and on quantum information theory.

Major research areas

Data Security Project

Research and development on data protection and application technologies centered on cryptography

This project is engaged in research and development on cryptographic basic technology, innovative security and privacy protection technologies to protect data against new threats, and their implementation and configuration methods.

Major research areas

  • Cryptographic Algorithms
  • Post-Quantum Cryptography
  • Data Privacy Protection Technology
  • Hardware Security and Trusted Platform Technology

Secure Data Sharing Project

R&D on technologies that realize safe and secure data sharing and utilization

In this project, we are engaged in research and development of security technologies that realize flexible, secure, and safe data distribution and utilization by appropriately protecting all processes of value creation, from data generation to distribution, storage, processing, analysis, and disposal. By incorporating approaches from the perspectives of social acceptability and legal compliance, we aim to establish technologies that are not only technically sophisticated but also truly useful and usable.
By reducing the risks and hurdles associated with the provision and utilization of data, we will promote the integration and joint use of data and knowledge across organizations and industries, and contribute to the creation of new value and resolution of social issues in Smart World/Society 5.0.

Vision of Secure Data Sharing Project
Vision of Secure Data Sharing Project

Major research areas

Cyber Security Project

We are engaged in research and development (R&D) on cutting-edge cybersecurity technologies. The goal of these R&D activities is to fundamentally change the security landscape that attackers always have advantages. We generate a variety of security intelligence by inventing comprehensive attack detection and analysis techniques that use the data from the network to the endpoint. Also, we focus on a shift-left approach that incorporates security from the earliest stages of the development process. Our security intelligence and knowledge obtained through these activities are used in the security businesses of NTT Group companies. We aim to provide a safe and secure ICT environment for our customers through the various services provided by NTT Group.

Overview of Cyber Security technologies
Overview of Cyber Security technologies

Major research areas

Security Operation Project

Research and development on advanced and swift security operations to realize a safe and secure SmartWorld

The mission of this project is to reduce the cost of security operations drastically by developing advanced security technologies, with the aim of achieving a safe and secure SmartWorld and Society 5.0.
In the cyber-physical systems (CPS) that support SmartWorld and Society 5.0, many and diverse OT/IoT devices connected to networks can be targets from security threats. There are concerns that once a device is compromised, security damage and impact on human life can be enormous.
In order to respond to such threats, we are working on operation technologies and security intelligence that enable swift detection of security anomalies in CPS systems, as well as for reliable and rapid identification of causes and responses.

Major research areas