Calculation of general parameters for NTRU PRIME UKRAINE of 6-7 levels of stability
DOI:
https://doi.org/10.30837/rt.2018.4.195.02Keywords:
general parameters, quantum stability, ring of polynomials, stability level, finite fieldsAbstract
The research was carried out and the development of an effective practical algorithm for the construction of system-wide parameters and keys for cryptographic transformations such as asymmetric ciphers and the key encapsulation protocol was performed. The experimental confirmation of the built-in system-wide parameters and keys of cryptographic transformations such as asymmetric cipher and the key encapsulation protocol of 6 – 7 stability levels based on transformations in the ring of polynomials over the finite fields is presented. The types of attacks that are possible with respect to the specified cryptographic transformations are also presented in this work.References
American National Standard X 9.98-2010. Lattice-Based Polynomial Public Key Encryption Algorithm Part 1: Key Establishment: Part 2: Data Encryption, 2010.
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, and Christine van Vredendaal. NTRU Prime [Electronic resource]. – Access mode: https://ntruprime.cr.yp.to/ntruprime-20160511.pdf.
І. Gorbenko, O. Kachko, K. Pogrebnyak. Features of parameters calculation for NTRU algorithm // Прикладная радиоэлектроника. – 2015. – V. 14. – № 3. – P. 272-277.
Gorbenko I.D. General Provisions and Analysis of NTRU Prime IIT Ukraine Directional Encryption Algorithm / І.D. Gorbenko, E.G. Kachko, M.V. Yesina // Radiotekhnika: All-Ukr. Sci. Interdep. Mag. – Kharkiv : KNURE. – 2018. – № 193. – P. 5-16.
DSTU 7624: 2014. Information Technology. Cryptographic protection of information. The algorithm of symmetric block transformation. [On-line]. Internet: http://shop.uas.org.ua/ua/informacijni-tehnologii-kriptografichnij-zahist-informacii-algoritm-simetrichnogo-blokovogo-peretvorennja.html.
Gorbenko I., Kuznetsov A., Lutsenko M. and Ivanenko D. The research of modern stream ciphers // 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T). – Kharkov, 2017. – Р. 207-210.
Bernstein D.J. NTRU Prime / Bernstein D.J., Chuengsatiansup Ch., Lange T., van Vredendaal Ch. // [Electronic resource]. – Access mode: http://eprint.iacr.org/2016/461.
Howgrave-Graham N., Silverman J.H., Whyte W. A meet-in-the-midle attack on an NTRU private key. – Technical report, NTRUCryptosystems, June 2003. Report, 2003.
Wunderer Th. Revising the hibrid attack: improved analysis and refined security estimates // http://eprint.iacr.org/2016/733.
Howgrave-Graham N. NAEP: provable security in the presence of decryption failures / Howgrave-Graham N., Silverman J.H., Singer A., Whyte W. // [Electronic resource]. – Access mode: http://eprint.iacr.org/2003/172.
Choosing Parameters for NTRUEncrypt Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman , William Whyte, and Zhenfei Zhang// [Electronic resource]. – Access mode: https://eprint.iacr.org/2015/708.pdf.
Coppersmith D., Shamir A. lattice attack on NTRU // Advances in Cryptology – EUROCRYPT’97. – Proceedings. – Springer-Verlag. – 1997. – P. 52–61.
Chen Y., Nguyen P.Q. BKZ 2.0: better lattice security estimates // Advances in Cryptology – ASIACRYPT 2011. – Proceedings. – Springer-Verlag. – 2011. – P. 1–20.
Becker A., Ducas L., Gama N., Laarhoven Th. New directions in nearest neighbor searching with application to lattice sieving // SODA 2016. – Proccedings. SIAM, 2016. – P. 10 – 24.
Laarhoven Th. Sieving voe closest lattice vectors (with preprocessing). [Electronic resource]. – Access mode: https://arxiv.org/pdf/1607.04789.pdf.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).