Implementing NTRU-similar algorithm on the basis of NTRUPrime
Keywords:
ANSI X9.98–2010, NTRUPrime, Encription Speed, Decryption Speed
Abstract
The modern attacks uses special structures of the rings in the NTRU similar algorithms. The article was proposed post-quantum parameters NTRUPrime without these structures. Have investigated the possibility of using these parameters for encryption on the part of the most important characteristic which distinguish NTRU methods from the rest of algorithms, namely, speed regulation characteristics. In fact, standard ANSI X9.98 – 2010 is used for this, but with NTRUPrime mathematics. Use AVX2 commands for multiplication of polynomials and effective implementation of necessary operations yielded minimal reduction in performance.
Downloads
Download data is not yet available.
References
Report on Post-Quantum Cryptography [Electronic resource]. – Access mode: http://nvlpubs.nist.gov / nist-pubs/ir/2016/NIST.IR.8105.pdf.
American National Standard X9.98-2010. Lattice-Based Polynomial Public Key Encryption Algorithm Part 1: Key Establishment: Part 2: Data Encryption, 2010.
J. Daniel. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange and Christine van Vredendaal1. NTRUPrime [Electronic resource]. – Access mode: https://ntruprime.cr.yp.to/ntruprime-20160511.pdf.
[Electronic resource]. – Access mode: https://github.com/NTRUOpenSourceProject/ntru-crypto.
Gorbenko I.D. Features of Parameters Calculation for NTRU Algorithm / I.D. Gorbenko, O.G. Kachko, K.A. Pogrebnyak // Applied Radio Electronics: Sci. Journ. – 2015. – Vol. 14. – № 3. – P. 272-277.
Kachko O.G. Analysis, Estimates and Suggestions With Respect To System parameters Generation Method in NTRU – Similar Assymetric Systems / O.G. Kachko, K.A. Pogrebnyak, L.V. Makytonina. // Radio Eengineering: Sci. Journ. – 2016. – Vol. 186. – P. 103–110 [in Ukrainian].
Kachko E.G. Research of methods of calculating of inversion in NTRU Algorithm / E.G. Kachko, D.S. Balagura, K.A. Pogrebnyak, Yu.I. Gorbenko // Applied Radio Electronics: Sci. Journ. – 2013. – Vol. 12. – № 2. – P. 254–257 [in Russian].
American National Standard X9.98-2010. Lattice-Based Polynomial Public Key Encryption Algorithm Part 1: Key Establishment: Part 2: Data Encryption, 2010.
J. Daniel. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange and Christine van Vredendaal1. NTRUPrime [Electronic resource]. – Access mode: https://ntruprime.cr.yp.to/ntruprime-20160511.pdf.
[Electronic resource]. – Access mode: https://github.com/NTRUOpenSourceProject/ntru-crypto.
Gorbenko I.D. Features of Parameters Calculation for NTRU Algorithm / I.D. Gorbenko, O.G. Kachko, K.A. Pogrebnyak // Applied Radio Electronics: Sci. Journ. – 2015. – Vol. 14. – № 3. – P. 272-277.
Kachko O.G. Analysis, Estimates and Suggestions With Respect To System parameters Generation Method in NTRU – Similar Assymetric Systems / O.G. Kachko, K.A. Pogrebnyak, L.V. Makytonina. // Radio Eengineering: Sci. Journ. – 2016. – Vol. 186. – P. 103–110 [in Ukrainian].
Kachko E.G. Research of methods of calculating of inversion in NTRU Algorithm / E.G. Kachko, D.S. Balagura, K.A. Pogrebnyak, Yu.I. Gorbenko // Applied Radio Electronics: Sci. Journ. – 2013. – Vol. 12. – № 2. – P. 254–257 [in Russian].
Published
2017-03-26
Cited
How to Cite
Gorbenko, I., KachkoО., & Naumenko, G. (2017). Implementing NTRU-similar algorithm on the basis of NTRUPrime. Computer Science and Cybersecurity, (4), 56-62. Retrieved from https://periodicals.karazin.ua/cscs/article/view/8275
Issue
Section
Статті