General statements and analysis of the end-to-end encryption algorithm NTRU Prime IIT Ukraine
DOI:
https://doi.org/10.30837/rt.2018.2.193.01Keywords:
ring, end-to-end encryption, field, polinomial, quotient ringAbstract
The NTRU-like cryptosystem NTRU Prime IIT Ukraine, created on the basis of existing cryptographic transformations end-to-end encryption type, is considered. The description of this cryptosystem is given and its analysis is carried out. Also, features of its implementation, comparison of the main characteristics and indicators, as well as the definition of differences from existing NTRU-like cryptographic algorithms are presented. Conclusions are made and recommendations are given.References
American National Standard for Financial Services Lattice-Based Polynomial Public Key Establishment Algorithm for the Financial Services Industry ANSI X9.98–2010, 2010. 284 p.
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal: NTRU Prime. Access mode: https://ntruprime.cr.yp.to/ntruprime-20160511.pdf.
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal NTRU Prime: reducing attack surface at low cost. Access mode: https://eprint.iacr.org/2016/461.pdf.
Joppe Bos, Leo Ducas, Eike Kiltz, Tancrede Lepoint, Vadim Lyubashevsky, John M. Schanck CRYSTALS Kyber: a CCA-secure module-lattice-based KEM. Access mode: https://eprint.iacr.org/2017/634.pdf.
P. Barrett Communications, Authentication and Security Using Public Key Encryption A Design for Implementation. Master’s thesis, Oxford University, September 1984.
Kachko E. G. Investigation of inversion calculation methods in the NTRU algorithm / E. G. Kachko, D. S. Balagura, K. A. Pogrebniak, Yu. I. Gorbenko // Radiotekhnika. 2012. Issue 171. P. 58–63. (in Russian).
Post-Quantum Cryptography. [Electronic resource] Access mode: https://csrc.nist.gov/projects/post-quantum-cryptography.
Kachko O. G. The optimization of NTRU-like algorithm for asymmetric encryption with “inconvenient parameters” / O. G. Kachko, L. V Makutonina, O. S. Akolzina // Mathematical and computer modeling. Series: Engineering, 15 (2017), 79–85. (in Ukrainian).
Kachko O. Asymmetric encryption algorithm optimization based on using NTRU Prime mathematics / O. Kachko, Yu. Gorbenko, M. Yesina, O. Akolzina // Radiotekhnika. 2017. Issue 191. P. 5-10.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).