NTRU Prime IIT Ukraine encryption algorithm with consideration known attacks analysis

Abstract

The paper deals with the modern cryptographic transformations of the asymmetric end-to-end encryption type, namely – NTRU-like cryptographic systems. A new cryptographic system NTRU Prime IIT Ukraine was created based on existing cryptographic transformations of this type (cryptographic algorithms NTRU (ANSI X9.98-2010) and NTRU Prime). A brief description of this cryptographic system is given and an analysis of its resistance to known attacks is made. At the end of the work, conclusions are made and recommendations on the features, advantages and possibilities of using the new cryptographic asymmetric algorithm of end-to-end encryption NTRU Prime IIT Ukraine are given.

Authors and Affiliations

Ivan Gorbenko, Оlena Kachko, Maryna Yesina

Keywords

Related Articles

PRACTICAL CLASSIFICATION TOPOLOGICAL STRUCTURES OF COMMUNICATION NETWORKS FOR MULTIPROCESSOR COMPUTER SYSTEMS

Proposed by the working version of practical classification topological structures of communication networks for multiprocessor computer systems. Any n-dimensional non-full mesh structure presented here as the result of...

The selection of forming polynomials for shift register with nonlinear feedback second order that generates the sequence with maximum period

Model pseudo-random sequence generator based on shift registers with nonlinear feedback second order is considered. Additional requirements for type of polynomial are formulated. They limit the set of polynomials which g...

PROPOSALS OF COMPARATIVE ANALYSIS AND DECISION MAKING DURING THE COMPETITION REGARDING THE CERTAIN BENEFITS OF ASYMMETRIC POST QUANTUM CRYPTOGRAPHIC PRIMITIVES

The paper considers proposals on the implementation of cryptographic primitives comparative analysis and substantiation, development and experimental confirmation of methodical bases application possibilities of system u...

Testing the speed of modern stream ciphers

The paper is a continuation of numerous studies of a candidate for encryption national standard of Ukraine, the Strumok new symmetric stream cipher. The result of a study is compare the most famous algorithms of stream c...

THE CONCEPT OF DIAGNOSTIC DATA ERRORS OF COMPUTING SYSTEMS WITCH FUNCTIONING IN THE SYSTEM OF RESIDUE CLASSES

A method for diagnosing data of computer systems functioning in the system of residue classes (SRC) has been developed. This method is based on the use of orthogonal bases, which are formed from a complete base system. T...

Download PDF file
  • EP ID EP344965
  • DOI -
  • Views 93
  • Downloads 0

How To Cite

Ivan Gorbenko, Оlena Kachko, Maryna Yesina (2017). NTRU Prime IIT Ukraine encryption algorithm with consideration known attacks analysis. КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА, 4(8), 4-16. https://europub.co.uk/articles/-A-344965