Analytical study of implementation issues of NTRU


Autoria(s): Gauravaram, Praveen; Narumanchi, Harika; Emmadi, Nitesh
Data(s)

2014

Resumo

Nth-Dimensional Truncated Polynomial Ring (NTRU) is a lattice-based public-key cryptosystem that offers encryption and digital signature solutions. It was designed by Silverman, Hoffstein and Pipher. The NTRU cryptosystem was patented by NTRU Cryptosystems Inc. (which was later acquired by Security Innovations) and available as IEEE 1363.1 and X9.98 standards. NTRU is resistant to attacks based on Quantum computing, to which the standard RSA and ECC public-key cryptosystems are vulnerable to. In addition, NTRU has higher performance advantages over these cryptosystems. Considering this importance of NTRU, it is highly recommended to adopt NTRU as part of a cipher suite along with widely used cryptosystems for internet security protocols and applications. In this paper, we present our analytical study on the implementation of NTRU encryption scheme which serves as a guideline for security practitioners who are novice to lattice-based cryptography or even cryptography. In particular, we show some non-trivial issues that should be considered towards a secure and efficient NTRU implementation.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/83615/

Publicador

IEEE

Relação

http://eprints.qut.edu.au/83615/13/__staffhome.qut.edu.au_staffgroupm%24_meaton_Desktop_ICACCI-2014.pdf

DOI:10.1109/ICACCI.2014.6968468

Gauravaram, Praveen, Narumanchi, Harika, & Emmadi, Nitesh (2014) Analytical study of implementation issues of NTRU. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI 2014), IEEE, New Delhi, India, pp. 700-707.

Direitos

Copyright 2014 IEEE

Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Palavras-Chave #Encryption #Lattices #Polynomials #Quantum computing #Vectors
Tipo

Conference Paper