Analytical study of implementation issues of NTRU
Data(s) |
2014
|
---|---|
Resumo |
Nth-Dimensional Truncated Polynomial Ring (NTRU) is a lattice-based public-key cryptosystem that offers encryption and digital signature solutions. It was designed by Silverman, Hoffstein and Pipher. The NTRU cryptosystem was patented by NTRU Cryptosystems Inc. (which was later acquired by Security Innovations) and available as IEEE 1363.1 and X9.98 standards. NTRU is resistant to attacks based on Quantum computing, to which the standard RSA and ECC public-key cryptosystems are vulnerable to. In addition, NTRU has higher performance advantages over these cryptosystems. Considering this importance of NTRU, it is highly recommended to adopt NTRU as part of a cipher suite along with widely used cryptosystems for internet security protocols and applications. In this paper, we present our analytical study on the implementation of NTRU encryption scheme which serves as a guideline for security practitioners who are novice to lattice-based cryptography or even cryptography. In particular, we show some non-trivial issues that should be considered towards a secure and efficient NTRU implementation. |
Formato |
application/pdf |
Identificador | |
Publicador |
IEEE |
Relação |
http://eprints.qut.edu.au/83615/13/__staffhome.qut.edu.au_staffgroupm%24_meaton_Desktop_ICACCI-2014.pdf DOI:10.1109/ICACCI.2014.6968468 Gauravaram, Praveen, Narumanchi, Harika, & Emmadi, Nitesh (2014) Analytical study of implementation issues of NTRU. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI 2014), IEEE, New Delhi, India, pp. 700-707. |
Direitos |
Copyright 2014 IEEE Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. |
Fonte |
School of Electrical Engineering & Computer Science; Science & Engineering Faculty |
Palavras-Chave | #Encryption #Lattices #Polynomials #Quantum computing #Vectors |
Tipo |
Conference Paper |