Methods for constructing system-wide parameters and keys for NTRU PRIME UKRAINE 5 – 7 stabvility levels. Product form

Authors

  • I.D. Gorbenko
  • O.G. Kachko
  • Yu. I. Gorbenko
  • I.V. Stelnik
  • S.O. Kandy
  • M.V. Yesina

DOI:

https://doi.org/10.30837/rt.2018.4.195.01

Keywords:

asymmetric cipher, general parameters, quantum stability, stability level, finite fields, Product Form

Abstract

The research was carried out and the development of an effective practical algorithm for the construction of system-wide parameters and keys of cryptographic transformations such as asymmetric ciphers for a special form of setting the Product Form polynomial was performed. The experimental confirmation of the built-in system-wide parameters for 5 – 7 stability levels NTRU PRIME UKRAINE, taking into account a combined attack. is given.

References

Neal Koblitz and Alfred J. Menezes A Riddle wrapped in an Enigma. Department of Mathematics, Box 353.350, University of Washington, Seattle, WA 98195 U.S.A. – Access mode: https://eprint.iacr.org/2015/1018.pdf.

Lily Chen Report on Post-Quatum Cryptography. NISTIR 8105 (DRAFT) / Lili Chen, Stephen Jordan, Yi-Kai-Liu, Dustin Moody, Rene Peralta, Ray Perlner, Daniel Smith-Tone – Access mode: http://csrc.nist.gov/publications/drafts/nistir-8105/nistir_8105_draft.pdf.

ETSI GR QSC 001 V.1.1.1 (2016-07). Quntum-Safe Cryptography (QSC); Quantum-safe algorithmic framework. [Electronic resource] – Access mode: https://portal.etsi.org/webapp/workProgram/Report_WorkItem.asp?wki_id=46690.

Proposed Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process. [Electronic resource] – Access mode: http://csrc.nist.gov/groups/ST/post-quantum-crypto/documents/call-for-proposals-draft-aug-2016.pdf.

Gorbenko Yu. I. Methods of construction and analysis, standardization and application of cryptographic systems: monograph / Yuri I. Gorbenko. Kharkov : Fort, 2016. – 959 p. (In Ukr.)

Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, and Christine van Vredendaal. NTRU Prime [Electronic resource]. – Access mode: https://ntruprime.cr.yp.to/ntruprime-20160511.pdf.

NTRU Open Source Project [Electronic resource]. – Access mode: https://github.com/NTRUOpenSourceProject/ntru-crypto.

І. Gorbenko, O. Kachko, K. Pogrebnyak. Features of parameters calculation for NTRU algorithm // Прикладная радиоэлектроника. – 2015. – Т. 14. – № 3. – С. 272-277.

American National Standard X 9.98-2010. Lattice-Based Polynomial Public Key Encryption Algorithm Part 1: Key Establishment: Part 2: Data Encryption, 2010.

Gorbenko I.D. General Provisions and Analysis of NTRU Prime IIT Ukraine Directional Encryption Algorithm / І.D Gorbenko, O.G. Kachko MV Yesina // Radiotechnika : All-Ukr. Sc. Interdep. Mag. – Kharkov : KNURE. – 2018. – № 193. – P. 5-16. (In Russ.)

Horstein J. Choosing Parameters for NTRUEncrypt / J.Horstein, J.Pipher, J.Schanck, J.Silverman, W. Whyte, Z. Zhang // [Electronic resource]. – Access mode: https://eprint.iacr.org/2015/708.pdf.

Laarhoven Th. Sieving voe closest lattice vectors (with preprocessing). [Electronic resource]. – Access mode: https://arxiv.org/pdf/1607.04789.pdf.

Nick Howgrave Graham NTRU Cryptosystems Technical Report. Report #4, Version 2. A Meet-In-The-Middle Attack on an NTRU Private key / Nick Howgrave Graham, Joseph H. Silverman, William Whyte // [Electronic resource]. – Access mode.

Efficient Embedded Security Standards (EESS) [Electronic resource]. – Access mode: https://github.com/NTRUOpenSourceProject/ntru-crypto/blob/e5655c2a10b74b5a0256ca849dbe85e4860f2eb5/doc/EESS1-2015v3.0.pdf.

Gorbenko I.D. Improved method for generating system-wide parameters for NTRU Prime Ukraine / І.D. Gorbenko, O.G. Kachko, Yu.I. Gorbenko, M.V. Yesina // Radiotechnika: All-Ukr. Sc. Interdep. Mag. – Kharkiv : KNURE. – 2018. – № 195. – P. (In Ukr.)

Daniel J. Bernstein. Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal NTRU Prime: reducing attack surface at low cost. [Electronic resource]. – Access mode: https://eprint.iacr.org/2016/461.pdf

Gorbenko I., Kuznetsov A., Lutsenko M. and Ivanenko D. The research of modern stream ciphers // 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T). – Kharkov, 2017. – P. 207-210.

Yuanmi Chen and Phong Q. Nguyen. BKZ 2.0: Better Lattice Security Estimates. [Electronic resource]. – Access mode https://www.iacr.org/archive/asiacrypt2011/70730001/70730001.pdf

Downloads

Published

2018-12-28

How to Cite

Gorbenko, I., Kachko, O., Gorbenko, Y. I., Stelnik, I., Kandy, S., & Yesina, M. (2018). Methods for constructing system-wide parameters and keys for NTRU PRIME UKRAINE 5 – 7 stabvility levels. Product form. Radiotekhnika, 4(195), 5–16. https://doi.org/10.30837/rt.2018.4.195.01

Issue

Section

Articles