BITRU: Binary Version of the NTRU Public Key Cryptosystem via Binary Algebra
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 11
Abstract
New terms such as closest vector problem (CVP) and the shortest vector problem (SVP), which have been illustrated as NP-hard problem, emerged, leading to a new hope for designing public key cryptosystem based on certain lattice hardness. A new cryptosystem called NTRU is proven computationally efficient and it can be implemented with low cost. With these characteristics, NTRU possesses advantage over others system that rely on number-theoretical problem in a finite field (e.g. integer factorization problem or discrete logarithm problem). These advantages make NTRU a good choice for many applications. After the adaptation of NTRU, many attempts to generalize its algebraic structure have appeared. In this study, a new variant of the NTRU public key cryptosystem called BITRU is proposed. BITRU is based on a new algebraic structure used as an alternative to NTRU-mathematical structure called binary algebra. This commutative and associative. Establishing two public keys in the proposed system has distinguished it from NTRU and those similar to NTRU cryptosystems. This new structure helps to increase the security and complexity of BITRU. The clauses of BITRU, which include key generation, encryption, decryption, and decryption failure, are explained in details. Its suitability of the proposed system is proven and its security is demonstrated by comparing it with NTRU.
Authors and Affiliations
Nadia M. G. Alsaidi, Hassan R. Yassein
Robust Facial Expression Recognition via Sparse Representation and Multiple Gabor filters
Facial expressions recognition plays important role in human communication. It has become one of the most challenging tasks in the pattern recognition field. It has many applications such as: human computer interaction,...
Rule Based Approach for Arabic Part of Speech Tagging and Name Entity Recognition
The aim of this study is to build a tool for Part of Speech (POS) tagging and Name Entity Recognition for Arabic Language, the approach used to build this tool is a rule base technique. The POS Tagger contains two phases...
Clustering based Max-Min Scheduling in Cloud Environment
Cloud Computing ensures Service Level Agreement (SLA) by provisioning of resources to cloudlets. This provisioning can be achieved through scheduling algorithms that properly maps given tasks considering different heuris...
Restructuring of System Analysis and Design Course with Agile Approach for Computer Engineering/Programming Departments
Today software plays an increasingly important and central role in every aspect of everyday life. The number, size, complexity and application areas of the programs developed continue to grow. Many software products have...
Numerical Evaluation of the Effect of Gradient on Reflection Coefficient of Continuously Graded Layer
This paper presents a numerical model, based on transfer matrix method, for modeling the propagation of surface acoustic waves at the interface formed by the coupling liquid and a continuously inhomogeneous thin layer on...