NTRU Prime IIT Ukraine encryption algorithm with consideration known attacks analysis

Abstract

The paper deals with the modern cryptographic transformations of the asymmetric end-to-end encryption type, namely – NTRU-like cryptographic systems. A new cryptographic system NTRU Prime IIT Ukraine was created based on existing cryptographic transformations of this type (cryptographic algorithms NTRU (ANSI X9.98-2010) and NTRU Prime). A brief description of this cryptographic system is given and an analysis of its resistance to known attacks is made. At the end of the work, conclusions are made and recommendations on the features, advantages and possibilities of using the new cryptographic asymmetric algorithm of end-to-end encryption NTRU Prime IIT Ukraine are given.

Authors and Affiliations

Ivan Gorbenko, Оlena Kachko, Maryna Yesina

Keywords

Related Articles

THE CONCEPT OF DIAGNOSTIC DATA ERRORS OF COMPUTING SYSTEMS WITCH FUNCTIONING IN THE SYSTEM OF RESIDUE CLASSES

A method for diagnosing data of computer systems functioning in the system of residue classes (SRC) has been developed. This method is based on the use of orthogonal bases, which are formed from a complete base system. T...

Code based fuzzy extractor for biometric keys

In this paper methods of forming cryptographic keys from biometric images using fuzzy extractors are considered. A new scheme of a fuzzy extractor based on the McEliece cryptosystem is proposed. It is shown that the new...

Essence and conditions of implementation of the attack based on related keys relatively electronic signatures IBS-1 and IBS-2 DSTU ISO/IEC 14888-3

The paper deals with the state of protection electronic signatures based on the pairing of points of an elliptic curve against attacks based on the signing data with related keys. It is defined conditions and possibiliti...

5G NETWORK ARCHITECTURE

The work deals with the main stages in the history of the development of different generations of cellular communication and options for the organization of their architecture. A brief overview of the main features and p...

THE CONCEPT OF PROCESSING INTEGER DATA REPRESENTED IN THE SYSTEM OF RESIDUE CLASSES

The coding of residues number witch submitted the appropriate modules of residual classes system (RCS), made with data from complete system of the smallest non-negative residues (CSSNR) was show in the article. In this a...

Download PDF file
  • EP ID EP344965
  • DOI -
  • Views 105
  • Downloads 0

How To Cite

Ivan Gorbenko, Оlena Kachko, Maryna Yesina (2017). NTRU Prime IIT Ukraine encryption algorithm with consideration known attacks analysis. КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА, 4(8), 4-16. https://europub.co.uk/articles/-A-344965