- [2017-10-19] On KRACKs: Vulnerabilities on WPA and WPA2
- [2016-03-25] A summary of the F.Y. 2016 2nd Board of governors Meeting is published.
- [2016-03-11] A summary of the fiscal 2015 CELLOS annual meeting is published.
- [2016-03-03] A summary of the F.Y. 2016 1st Board of governors Meeting is published.
- [2016-03-02] On the announcement of DROWN attack and CacheBleed
- [2016-01-30] On new vulnerabilities on OpenSSL reported on January 28th, 2016
- [2015-12-17] A summary of the 5th Board of governors Meeting is published.
- [2015-12-10] CELLOS Symposium 2015
- [2015-09-25] A summary of the 4th Board of governors Meeting is published.
- [2015-09-04] The annual activity report 2014 is published
- [2015-08-11] An evaluation report on Hitachi's protocol "SK-REP"
- [2015-05-21] On prompt report on "The Logjam Attack" on TLS with export-grade ciphers
- [2015-03-20] On new vulnerabilities on OpenSSL reported on March 19th, 2015
- [2015-03-04] On the "FREAK attack" on SSL/TLS with export-grade ciphers
In recent years, the development of network technologies is opening up
new possibilities to enrich our lives such as mobile networks and cloud
computing. These new possibilities however require a higher
level of security, such as privacy. It is no longer sufficient to merely
to encrypt and authenticate the data communicated over the network.
To provide the high level security, “cryptographic protocol” is
researched and developedactively, and further 400 or more specifictions
related to cryptographic area undergoing standards organization. With a
steady stream of vulnerabilities being discovered in the wireless LAN
cryptographic protocol WEP however, protocols are not being analyzed to
a sufficient extent to cope with the advanced security needs of our
modern information and communication systems (ICT systems). In
particular, little effort has been made to bring together the latest
security information on a global scale, engage in expert discussion, and
make detailed technical security information widely available to the
We therefore decided to establish the Cryptographic protocol Evaluation
toward Long-Lived Outstanding Security (CELLOS) with the aim of
promoting secure cryptographic protocols, by bringing together and
sharing information on security of cryptographic protocols, based on the
results of previous research and development, discussing security issues
based on modern ICT systems, and publishing the resulting security
With involvement from universities, research institutions and companies
conducting research into cryptographic protocols all over the world, the
consortium will bring together, share and provide information on
security evaluation, and act as a reliable international hub for
research and development, in an effort to ensure a high level of
security for cryptographic protocols underpinned by an international
Through these activities, we determined that the consortium will make
significant contributions to improving network security, and continue to
enable people to use networks safely and securely in the future.