General statements and analysis of the end-to-end encryption algorithm NTRU Prime IIT Ukraine

Authors

  • I.D. Gorbenko
  • O.G. Kachko
  • M.V. Yesina

DOI:

https://doi.org/10.30837/rt.2018.2.193.01

Keywords:

ring, end-to-end encryption, field, polinomial, quotient ring

Abstract

The NTRU-like cryptosystem NTRU Prime IIT Ukraine, created on the basis of existing cryptographic transformations end-to-end encryption type, is considered. The description of this cryptosystem is given and its analysis is carried out. Also, features of its implementation, comparison of the main characteristics and indicators, as well as the definition of differences from existing NTRU-like cryptographic algorithms are presented. Conclusions are made and recommendations are given.

References

American National Standard for Financial Services Lattice-Based Polynomial Public Key Establishment Algorithm for the Financial Services Industry ANSI X9.98–2010, 2010. 284 p.

Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal: NTRU Prime. Access mode: https://ntruprime.cr.yp.to/ntruprime-20160511.pdf.

Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal NTRU Prime: reducing attack surface at low cost. Access mode: https://eprint.iacr.org/2016/461.pdf.

Joppe Bos, Leo Ducas, Eike Kiltz, Tancrede Lepoint, Vadim Lyubashevsky, John M. Schanck CRYSTALS Kyber: a CCA-secure module-lattice-based KEM. Access mode: https://eprint.iacr.org/2017/634.pdf.

P. Barrett Communications, Authentication and Security Using Public Key Encryption A Design for Implementation. Master’s thesis, Oxford University, September 1984.

Kachko E. G. Investigation of inversion calculation methods in the NTRU algorithm / E. G. Kachko, D. S. Balagura, K. A. Pogrebniak, Yu. I. Gorbenko // Radiotekhnika. 2012. Issue 171. P. 58–63. (in Russian).

Post-Quantum Cryptography. [Electronic resource] Access mode: https://csrc.nist.gov/projects/post-quantum-cryptography.

Kachko O. G. The optimization of NTRU-like algorithm for asymmetric encryption with “inconvenient parameters” / O. G. Kachko, L. V Makutonina, O. S. Akolzina // Mathematical and computer modeling. Series: Engineering, 15 (2017), 79–85. (in Ukrainian).

Kachko O. Asymmetric encryption algorithm optimization based on using NTRU Prime mathematics / O. Kachko, Yu. Gorbenko, M. Yesina, O. Akolzina // Radiotekhnika. 2017. Issue 191. P. 5-10.

Downloads

Published

2018-05-15

How to Cite

Gorbenko, I., Kachko, O., & Yesina, M. (2018). General statements and analysis of the end-to-end encryption algorithm NTRU Prime IIT Ukraine. Radiotekhnika, 2(193), 5–16. https://doi.org/10.30837/rt.2018.2.193.01

Issue

Section

Articles