Optimization of NTRU Prime asymmetric encryption algorithm

Authors

  • O.G. Kachko
  • Yu.I. Gorbenko
  • M.V. Esina
  • O.S. Akolzina

DOI:

https://doi.org/10.30837/rt.2017.4.191.01

Abstract

The results of algorithms optimization for the post-quantum mechanism of asymmetric encryption NTRU Prime are given. Namely: module reduction, blinding polynomial calculation, encryption and decryption algorithms. A comparative analysis of different polynomials multiplications is also given.

References

American National Standard X9.98-2010. Lattice-based polynomial public key encryption algorithm, Part 1: key establishment, Part 2: data encryption. – 2010.

Electronic resource: https://csrc.nist.gov/projects/post-quantum-cryptography.

Bernstein D.J., Chuengsatiansup Ch., Lange T., van Vredendaal Ch. NTRU Prime // Cryptology ePrint Archive: https://ntruprime.cr.yp.to/ntruprime-20160511.pdf.

Patrik Ekdahl, Thomas Johansson. A New Version of the Stream Cipher SNOW // SAC 2002: Selected Areas in Cryptography pp 47-61.

Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van redendaal. NTRU Prime: reducing attack surface at low cost // Cryptology ePrint Archive: https://eprint.iacr.org/2016/461.

Joppe Bos, Leo Ducas, Eike Kiltz. CRYSTALS – Kyber: a CCA-secure modulus-lattice-based KEM // https://eprint.iacr.org/2017/634.

Daniel J. Bernstein. Salsa20 design // https://cr.yp.to/snuffle/design.pdf

Electronic resource http://www.openmp.org/.

P D Barrett, “Communications Authentication and Security using Public Key Encryption – A Design for Implementation.” (Oxford University Programming Research Group MSc Thesis (1984).

Downloads

Published

2017-12-22

How to Cite

Kachko, O., Gorbenko, Y., Esina, M., & Akolzina, O. (2017). Optimization of NTRU Prime asymmetric encryption algorithm. Radiotekhnika, 4(191), 5–10. https://doi.org/10.30837/rt.2017.4.191.01

Issue

Section

Articles