NTT

NTT

Skip Navigation

NTT HOME

About NTT Group
Press Release
Group Companies
Social/environmental Initiatives
About NTT Corporation
NTT Facts
To Investors
R&D
Career Opportunities

NTT HOME  >  NTT Group CSR  >  Safe and secure communication  >  Safe and secure communications through R&D

This is the text.

Creating a Safe and Secure Environment for ICT Users

Safe and secure communications through R&D

For safe, anxiety-free use

The NTT Group is engaged in R&D in high-level encryption technologies, security, and other fields to prevent acts that compromise the security of communications networks, and create a safe user environment.

This point is about one fifth of the way down the page.

Page Top

New world record for "integer factorization" used to verify security of public key cryptography

Public key encryption, which involves the pairing of two keys for encryption and decryption of information, is a widely used encryption method for ensuring the security of confidential information exchanged over the Internet. NTT Information Sharing Platform Laboratories announced in May 2007 that through joint research with the University of Bonn, Germany, it had set a new world record for "integer factorization" used to verify security of RSA encryption, the de facto standard in public key encryption.

Under RSA encryption, the product of a large integer (composite number) is used as the key, and security is based on the difficulty in factorizing the integer. In a large-number integer factorization experiment undertaken to ascertain the security and strength of RSA, integer factorization of a special-type composite number without a small factor and exceeding 1,000 bits was achieved for the first time in the world.

Estimating how large a composite number can be factorized based on the current integer factorization technology and calculation power makes it possible to set the period for updating the RSA encryption key length and provide a safe and strong encryption system for the future.

This point is about two fifths of the way down the page.

Page Top

Development of simple authentication technology using paper

Using paper cards containing watermarked photos or logos, we have developed a platform for simple authentication when entering or leaving the office, etc. This is cheaper than using IC cards as these cards can be created on regular paper using a commercially available printer.

This is a sample of a paper card that can be used for simple authentication when entering and leaving the office etc.Paper card for authentication

This point is about three fifths of the way down the page.

Page Top

R&D on remote video monitoring

We are engaged in R&D aimed at addressing both accuracy and privacy protection issues in remote monitoring operations. We have developed technologies to ascertain the direction of people's heads and privacy protection technologies such as the ability to selectively apply mosaic to moving objects, and have showcased these at exhibitions with a view to commercialization.

This is a photograph taken at a trade show where NTT exhibited new technology for remote video monitoring.Demonstrating the technologies at an exhibition

This point is about four fifths of the way down the page.

Page Top

Firefox 3 employs homegrown Japanese Camellia encryption algorithm

Camellia (developed through collaboration with Mitsubishi Electric Corporation), an encryption algorithm featuring world-class security and performance, is the first encryption algorithm developed in Japan to have been adopted by Linux and other major open source software. Its widespread use as an international platform technology was further boosted by its adoption into the Firefox 3 web browser, released around the world in June 2008.

This is a screenshot of the website introducing Camellia, an encryption algorithm adopted by major open source software used worldwide.Communications encrypted with Camellia

Page Top

This is the end of the text.Return to the CSR main menu.

page top