apacciooutlook logo

Mitsubishi Electric Introduces String-searchable Encryption Software

Friday, February 5, 2016

content-image

TOKYO, JAPAN: Mitsubishi Electric announces the development of string-searchable encryption software, which allows partial-match search of encrypted data without decryption in cloud services and access control to ensure optimum information security.

The new software encrypts each character of the registered data and searched keywords. Simultaneously, character position information showing how far the encrypted character is located from the beginning character is embedded into the corresponding ciphertext. The embedded character position can be transposed to match any encrypted text without decryption. In the existing software, character position and other information cannot be embedded in the ciphertext, limiting search results to inflexible exact matches. The new software uses embedded character position information to check if the encrypted keyword exactly matches its corresponding encrypted string of registered data. Character position information helps to facilitate partial-match searches of encrypted data.

The existing searchable encryption platform software which has also been developed by Mitsubishi only has the ability to exact-match search. This software limits the length of registered data and availability of keywords, whereas the new software does not have such restrictions and therefore can be used for many cloud services.

The new software allows access control to prevent unauthorized personnel from performing the searches allowing secure document sharing. The software also prevents inference of keywords because queries for each search-even previously entered keywords-are encrypted into another individual ciphertext.

The encryption technology maintains the cohesion of ciphertexts by preventing them from being separated into individual characters, since computer viruses or malicious administrators can infer characters in registered data and keywords by using "frequent analysis" for each separated character. The new software prevents such misuse to ensure data security as strong as that of the existing software.

Leaders Speak

Andy Nallappan, VP & CIO,

The Industry Demands Quick Upgrade into Cloud

By Andy Nallappan, VP & CIO,

Global Information Technology, Avago Technologies

Steven Weinreb, CIO & EVP, Technology & Operations, Asia, MetLife

Embracing Advanced Tech-enabled Solutions that Foster Innovation and Growth

By Steven Weinreb, CIO & EVP, Technology & Operations, Asia, MetLife

Anil Khatri,

Trends that are on Every CIO's Watch-list

By Anil Khatri,

Head IT-South Asia,

SAP

James F. Hanauer, CTO, VP Engineering and Art Saisuphaluck, Solutions Architect, R&D Lead, CTSI-Global

Simplifying Infrastructure Management with Microsoft Solutions

By James F. Hanauer, CTO, VP Engineering and Art Saisuphaluck, Solutions Architect, R&D Lead, CTSI-Global

Mickey Bradford, VP-IT/CTO, Exchange; & Jay McCartin, VP-Logistic Operations,  Army & Air Force Exchange Service

Embracing Cloud Hosting Benefits

By Mickey Bradford, VP-IT/CTO, Exchange; & Jay McCartin, VP-Logistic Operations, Army & Air Force Exchange Service

Featured Vendors