Block cipher in NTRU

Abstract

In every sector today, secure and efficient data transfer is essential. To guarantee the security, for the most part Public Key Cryptographic Systems (PKCS) is utilized. A RSA and NTRU framework by and large fits in with the class of PKCS. The productivity of an open key cryptographic framework is essentially measured in computational overheads, key size and transmission capacity. The way that most chips on keen cards can't handle keys broadening 1024 piece demonstrates that there is a requirement for option. NTRU [7] is such an option and it is a gathering of numerical calculations in view of controlling arrangement of whole numbers and polynomials. This permits NTRU to be effective. NTRU is the main secure open key cryptosystem not in view of factorization or discrete logarithm issues. This means that given sufficient computational resources and time, an adversary, should not be able to break the key. Basically NTRU cryptosystem encrypt and decrypt a binary message. As mentioned in NTRU[8], it takes p= 3 and q =31 to have a binary message encrypt and decrypt properly. As modulus 3 contains any of the integers 0, 1 or 2, it is not certain to decrypt a binary message properly. So NTRU came with an alternative by taking p = 2+X. In this paper we have attempted to show that it can be extended to hexadecimal system and the speed of sending and receiving can be much faster by using hexadecimal system instead of binary system.

Authors and Affiliations

Rakesh Nayak

Keywords

Related Articles

Infrequent Defense System for mobile networks through Miscellaneous Contraption

Malware is malevolent programming which irritates the system PC operation, hacking the touchy data and gets to the private frameworks. It is only a project which is particularly intended to harm the PC it might be an...

Intensification Of Dark Mode Images Using FFT And Bilog Transformation

With the advancement of technologies, the images are created with more and more enhancement. Our project is based on creating a generalized equalization model for image enhancement and further improving the same usin...

A Glance At Malicious Attacks In Web

Web usage is one of the great important to all users in this era. For each and every need internet or web is made use of. Users make use of the area as a medium for searching information, performing business transacti...

One-to-Many Data Linkage By One-Class Clustering Tree

Data linkage is the task of identifying different entries that refer to the same entity across different data sources. The goal of the data linkage task is joining data sets that do not share a common identifier. Data...

Co-Operative Riskless Data Publishing Using Cpdp In Multi Colud

Cloud computing is a new and fast growing technology that offers an innovative, efficient and scalable business model for organizations to adopt various information technology (IT) resources i.e. software, hardware,...

Download PDF file
  • EP ID EP28376
  • DOI -
  • Views 308
  • Downloads 5

How To Cite

Rakesh Nayak (2016). Block cipher in NTRU. International Journal of Research in Computer and Communication Technology, 5(1), -. https://europub.co.uk/articles/-A-28376