NTRU Prime IIT Ukraine encryption algorithm with consideration known attacks analysis

  • Ivan Gorbenko V. N. Karazin Kharkiv National University
  • Оlena Kachko JSC «Institute of Information Technologies», Kharkiv, Kharkiv National University of Radio Electronics
  • Maryna Yesina V. N. Karazin Kharkiv National University
Keywords: NTRU Prime, End-to-End Encryption, Quotient Ring

Abstract

The paper deals with the modern cryptographic transformations of the asymmetric end-to-end encryption type, namely – NTRU-like cryptographic systems. A new cryptographic system NTRU Prime IIT Ukraine was created based on existing cryptographic transformations of this type (cryptographic algorithms NTRU (ANSI X9.98-2010) and NTRU Prime). A brief description of this cryptographic system is given and an analysis of its resistance to known attacks is made. At the end of the work, conclusions are made and recommendations on the features, advantages and possibilities of using the new cryptographic asymmetric algorithm of end-to-end encryption NTRU Prime IIT Ukraine are given.

Downloads

Download data is not yet available.

Author Biographies

Ivan Gorbenko, V. N. Karazin Kharkiv National University

Doctor of Sciences (Engineering), Full Professor, Academician of the Academy of Applied Radioelectronics Sciences

Оlena Kachko, JSC «Institute of Information Technologies», Kharkiv, Kharkiv National University of Radio Electronics

Ph.D.

Maryna Yesina, V. N. Karazin Kharkiv National University

Ph.D., Department SIST

References

ETSI GR QSC 001 V.1.1.1 (2016-07). Quntum-Safe Cryptography (QSC); Quantum-safe algorithmic framework. [Electronic resource]. – Access mode: https://portal.etsi.org/webapp/workProgram/Report_WorkItem.asp?wki_id =46690.

Koblitz Neal A riddle wrapped in an enigma / Neal Koblitz, Alfred J. Menezes // – Access mode: https://eprint.iacr.org/2015/1018.pdf.

Lily Chen Report on Post-Quatum Cryptography. NISTIR 8105 (DRAFT) / Lili Chen, Stephen Jordan, Yi-Kai-Liu, Dustin Moody, Rene Peralta, Ray Perlner, Daniel Smith-Tone // – Access mode: http://csrc.nist.gov/publications/drafts/nistir-8105/nistir_8105_draft.pdf.

Mosca M. “Setting the Scene for the ETSI Quantum-safe Cryptography Workshop” / M. Mosca // E-proceedings of “1st Quantum-Safe-Crypto Workshop”, Sophia Antipolis, Sep 26-27, 2013. – Access mode: http://docbox.etsi.org/Workshop/ 2013/201309_CRYPTO/eproceedings_Crypto_2013.pdf.

Post-quantum crypto project. [Electronic resource]. – Access mode: http://csrc.nist.gov/groups/ST/post-quantum-crypto/index.html.

Proposed Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process. [Electronic resource]. – Access mode: http://csrc.nist.gov/groups/ST/post-quantum-crypto/documents/call-for-proposals-draft-aug-2016.pdf.

Quantum Safe Cryptography and Security. An introduction, benefits, enablers and challenges Access mode: http://www.etsi.org/images/files/ETSIWhitePapers/QuantumSafeWhitepaper.pdf.

American National Standard for Financial Services – Lattice-Based Polynomial Public Key Establishment Algorithm for the Financial Services Industry – ANSI X9.98–2010, 2010. – 284 p.

Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal: NTRU Prime. – Access mode: https://ntruprime.cr.yp.to/ntruprime-20160511.pdf.

Kachko O. G. The optimization of NTRU-like algorithm for asymmetric encryption with “inconvenient parameters” / O. G. Kachko, L. V Makutonina, O. S. Akolzina //. Mathematical and computer modeling. Series: Engineering, 15 (2017), 79–85. (in Ukrainian)

Hoffstein J. NTRU: a ring based public key cryptosystem / J. Hoffstein, J. Pipher, J. H. Silverman // Algorithmic Number Theory, Third International Symposium, Portland, Oregon, USA, June 21 – 25, 1998. – Proceedings. – Springer, 1998. – P. 267–288.

Campbell P., Groves M., Shepherd D. SOLYLOQUI: a cautionary tale, 2014. – Access mode: http:docbox.etsi.org /Workshop/2014/201410_CRYPTO/S07_Systams_and_Ayyacks/S07_Groves_Annex.pdf.

Howgrave-Graham N. A hibrid lattice-reduction and the meet-in-the-midle attack against NTRU / N. Howgrave-Graham // Ad-vances in Cryptology – CRYPTO 2007. – Proceedings. – Springer-Verlag. – 2007. – P. 150–169.

Howgrave-Graham N. A meet-in-the-midle attack on an NTRU private key / N. Howgrave-Graham, J. H. Silverman, W. Whyte // Technical report, NTRUCryptosystems, June 2003. Report, 2003.

Coppersmith D. Lattice attack on NTRU / D. Coppersmith, A. Shamir // Advances in Cryptology – EUROCRYPT’97. – Proceedings. – Springer-Verlag. – 1997. – P. 52–61.

Wunderer Th. Revising the hibrid attack: improved analysis and refined security estimates. – Access mode: http://eprint.iacr.org /2016/733.

Babai L. On Lova’sz’ lattice reduction and the nearest lattice point problem / L. Babai // Combinatorica. – 1986. – Vol. 5. – № 6(11). – P. 1–13.

Hoffstein J., Pipher J., Schanck J.M., Silverman J.H., Whyte W., Zhang Z. Choosing parameters for NTRUEncrypt. – Access mode: http://eprint.iacr.org/2015/708.

Chen Y. BKZ 2.0: better lattice security estimates / Y. Chen, P.Q. Nguyen // Advances in Cryptology – ASIACRYPT 2011. – Proceedings. – Springer-Verlag. – 2011. – P. 1–20.

Gorbenko Yu. I. Special'na tema / Yu. I. Gorbenko, R. S. Ganzja // Zbirnyk naukovyh prac', vyp.2(22) Special'ni telekomu-nikacijni systemy ta zahyst informacii', prym. №59 DSSZZI Ukrai'ny. – S. 17–26.

Gorbenko Yu. I. Analiz stijkosti populjarnyh kryptosystem proty kvantovogo kryptoanalizu na osnovi algorytmu Grovera / Yu. I. Gorbenko, R. S. Ganzja // Zahyst informacii': Naukovo-praktychnyj zhurnal, 2014. – Tom 16, №2. – S. 106–112.

Gorbenko Yu. I. Analiz shljahiv rozvytku kryptografii' pislja pojavy kvantovyh komp’juteriv / Ju. I. Gorbenko, R. S. Ganzja // Visnyk Nacional'nogo universytetu «L'vivs'ka Politehnika». Serija «Komp’juterni systemy ta merezhi», 2014. – № 806. – S. 40–49.

J. Silverman and A. Odlyzko, NTRU Report 004, Version 2, A Meet-The Middle Attack on an NTRU Private Key, Technical Report, NTRU Cryptosysytems, (2003).

A Chosen-Ciphertext Attack against NTRU. [Electronic resource]. – Access mode: http://www.iacr.org/archive/crypto2000/18800021/18800021.pdf.

Information technology – Security techniques – Digital signature schemes giving message recovery – Part 2: Integer factorization based mechanisms: ISO/IEC 9796-2:2010. – 54 p.

IBM Raises the Bar with a 50-Qubit Quantum Computer. [Electronic resource]. – Access mode: https://www.technolo-gyreview.com/s/609451/ibm-raises-the-bar-with-a-50-qubit-quantum-computer/?utm_campaign=add_this&utm_source=twit-ter&utm_medium=post.

Sozdan pervyi kvantovyi komp'yuter na 53 kubitakh. [Electronic resource]. – Access mode: https://hightech.fm/2017/11/30/53-qubit.

Published
2018-04-27
Cited
How to Cite
Gorbenko, I., KachkoО., & Yesina, M. (2018). NTRU Prime IIT Ukraine encryption algorithm with consideration known attacks analysis. Computer Science and Cybersecurity, (4), 4-16. Retrieved from https://periodicals.karazin.ua/cscs/article/view/10452
Section
Статті

Most read articles by the same author(s)