Methods for constructing system-wide parameters and keys for NTRU PRIME UKRAINE 5 – 7 stabvility levels. Product form
DOI:
https://doi.org/10.30837/rt.2018.4.195.01Keywords:
asymmetric cipher, general parameters, quantum stability, stability level, finite fields, Product FormAbstract
The research was carried out and the development of an effective practical algorithm for the construction of system-wide parameters and keys of cryptographic transformations such as asymmetric ciphers for a special form of setting the Product Form polynomial was performed. The experimental confirmation of the built-in system-wide parameters for 5 – 7 stability levels NTRU PRIME UKRAINE, taking into account a combined attack. is given.References
Neal Koblitz and Alfred J. Menezes A Riddle wrapped in an Enigma. Department of Mathematics, Box 353.350, University of Washington, Seattle, WA 98195 U.S.A. – Access mode: https://eprint.iacr.org/2015/1018.pdf.
Lily Chen Report on Post-Quatum Cryptography. NISTIR 8105 (DRAFT) / Lili Chen, Stephen Jordan, Yi-Kai-Liu, Dustin Moody, Rene Peralta, Ray Perlner, Daniel Smith-Tone – Access mode: http://csrc.nist.gov/publications/drafts/nistir-8105/nistir_8105_draft.pdf.
ETSI GR QSC 001 V.1.1.1 (2016-07). Quntum-Safe Cryptography (QSC); Quantum-safe algorithmic framework. [Electronic resource] – Access mode: https://portal.etsi.org/webapp/workProgram/Report_WorkItem.asp?wki_id=46690.
Proposed Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process. [Electronic resource] – Access mode: http://csrc.nist.gov/groups/ST/post-quantum-crypto/documents/call-for-proposals-draft-aug-2016.pdf.
Gorbenko Yu. I. Methods of construction and analysis, standardization and application of cryptographic systems: monograph / Yuri I. Gorbenko. Kharkov : Fort, 2016. – 959 p. (In Ukr.)
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, and Christine van Vredendaal. NTRU Prime [Electronic resource]. – Access mode: https://ntruprime.cr.yp.to/ntruprime-20160511.pdf.
NTRU Open Source Project [Electronic resource]. – Access mode: https://github.com/NTRUOpenSourceProject/ntru-crypto.
І. Gorbenko, O. Kachko, K. Pogrebnyak. Features of parameters calculation for NTRU algorithm // Прикладная радиоэлектроника. – 2015. – Т. 14. – № 3. – С. 272-277.
American National Standard X 9.98-2010. Lattice-Based Polynomial Public Key Encryption Algorithm Part 1: Key Establishment: Part 2: Data Encryption, 2010.
Gorbenko I.D. General Provisions and Analysis of NTRU Prime IIT Ukraine Directional Encryption Algorithm / І.D Gorbenko, O.G. Kachko MV Yesina // Radiotechnika : All-Ukr. Sc. Interdep. Mag. – Kharkov : KNURE. – 2018. – № 193. – P. 5-16. (In Russ.)
Horstein J. Choosing Parameters for NTRUEncrypt / J.Horstein, J.Pipher, J.Schanck, J.Silverman, W. Whyte, Z. Zhang // [Electronic resource]. – Access mode: https://eprint.iacr.org/2015/708.pdf.
Laarhoven Th. Sieving voe closest lattice vectors (with preprocessing). [Electronic resource]. – Access mode: https://arxiv.org/pdf/1607.04789.pdf.
Nick Howgrave Graham NTRU Cryptosystems Technical Report. Report #4, Version 2. A Meet-In-The-Middle Attack on an NTRU Private key / Nick Howgrave Graham, Joseph H. Silverman, William Whyte // [Electronic resource]. – Access mode.
Efficient Embedded Security Standards (EESS) [Electronic resource]. – Access mode: https://github.com/NTRUOpenSourceProject/ntru-crypto/blob/e5655c2a10b74b5a0256ca849dbe85e4860f2eb5/doc/EESS1-2015v3.0.pdf.
Gorbenko I.D. Improved method for generating system-wide parameters for NTRU Prime Ukraine / І.D. Gorbenko, O.G. Kachko, Yu.I. Gorbenko, M.V. Yesina // Radiotechnika: All-Ukr. Sc. Interdep. Mag. – Kharkiv : KNURE. – 2018. – № 195. – P. (In Ukr.)
Daniel J. Bernstein. Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal NTRU Prime: reducing attack surface at low cost. [Electronic resource]. – Access mode: https://eprint.iacr.org/2016/461.pdf
Gorbenko I., Kuznetsov A., Lutsenko M. and Ivanenko D. The research of modern stream ciphers // 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T). – Kharkov, 2017. – P. 207-210.
Yuanmi Chen and Phong Q. Nguyen. BKZ 2.0: Better Lattice Security Estimates. [Electronic resource]. – Access mode https://www.iacr.org/archive/asiacrypt2011/70730001/70730001.pdf
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).