Block cipher in NTRU
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2016, Vol 5, Issue 1
Abstract
In every sector today, secure and efficient data transfer is essential. To guarantee the security, for the most part Public Key Cryptographic Systems (PKCS) is utilized. A RSA and NTRU framework by and large fits in with the class of PKCS. The productivity of an open key cryptographic framework is essentially measured in computational overheads, key size and transmission capacity. The way that most chips on keen cards can't handle keys broadening 1024 piece demonstrates that there is a requirement for option. NTRU [7] is such an option and it is a gathering of numerical calculations in view of controlling arrangement of whole numbers and polynomials. This permits NTRU to be effective. NTRU is the main secure open key cryptosystem not in view of factorization or discrete logarithm issues. This means that given sufficient computational resources and time, an adversary, should not be able to break the key. Basically NTRU cryptosystem encrypt and decrypt a binary message. As mentioned in NTRU[8], it takes p= 3 and q =31 to have a binary message encrypt and decrypt properly. As modulus 3 contains any of the integers 0, 1 or 2, it is not certain to decrypt a binary message properly. So NTRU came with an alternative by taking p = 2+X. In this paper we have attempted to show that it can be extended to hexadecimal system and the speed of sending and receiving can be much faster by using hexadecimal system instead of binary system.
Authors and Affiliations
Rakesh Nayak
Enhance The Performance Of Mobile Presence Services By Scalable Server Architecture (Presence Cloud)
A mobile existence overhaul is a necessary constituent of a social network application as it uphold each mobile user’s presence information such as the current status, GPS location and network address. Also updates t...
Big Data Analytics in the Education Sector: Needs, Opportunities and Challenges
Academic institutions are now drawing attention in finding methods for making effective learning process, for identifying learner’s achievements and weakness, for tracing academic progress and also for predicting fut...
The Importance of Modulators for the Usable Field in Fibre-Optics at Microwave Frequencies
The main discussion of this article will be an in-depth study of one of the main types of light modulating device – The External Modulator which is used in modern fibre optical systems. An overview of the fibre optic...
Secure and Privacy Approach in Mobile-Healthcare emergency Using PPSPC technique
In this paper, we proposing a secure and privacy-preserving opportunistic computing framework, called SPOC, for m-Healthcare emergency. With SPOC, smart phone resources including computing power and energy can be op...
Design a pattern generator with low switching activity to test complex combinational logic with high test coverage
In circuit large number of combinational logic used so logic depth is large, so it is impossible to test every fault with other techniques because it’s take more time. In order to increase speed of an algorithm for te...