Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4

نویسندگان

چکیده

We propose NTT implementations with each supporting at least one parameter of NTRU and Prime. Our are based on size-1440, size-1536, size-1728 convolutions without algebraic assumptions the target polynomial rings. also several improvements for computation. Firstly, we introduce dedicated radix-(2, 3) butterflies combining Good–Thomas FFT vector-radix FFT. In general, there six they together support implicit permutations. Secondly, odd prime radices, show that multiplications output can be replaced additions/subtractions. demonstrate idea radix-3 how to extend it any prime. improvement applies butterflies. Thirdly, implement an incomplete version addressing potential code size issues. For NTRU, our outperform state-of-the-art by 2.8%−10.3%. Prime, slower than state-of-the-art. However, SotA exploits specific structure coefficient rings or moduli, while NTT-based exploit neither apply across different schemes. This reduces engineering effort, including testing verification.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

NTRU Prime

Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit special structures of the rings used in those cryptosystems. The same structures are also used in the leading proposals for post-quantum lattice-based cryptography, including the classic NTRU cryptosystem and typical Ring-LWE-based cryptosystems. This paper proposes NTRU Prime, which tweaks NTRU to use rin...

متن کامل

Current Attacks on NTRU

Acknowledgements I should thank many people who have helped me on the way of writing and then righting what you read now. I start with my family, whose love and support have been the very foundation of all my studies. I thank Professor Buchmann, who interested me in the field of lattice cryptography and arranged this thesis. I thank my first supervisor Christoph Ludwig, for many talks about lat...

متن کامل

Discussion on Matrix NTRU

In recent years the study of cryptosystem has shifted noticeably from symmetric to asymmetric key encryptions. One of the more intriguing issues of the research is NTRU encryption system, which is based on ring theory. The security of NTRU always depends on the lattices. Several studies have suggested that it is very difficult to know whether a polynomial is invertible or not. Nayak et al. intr...

متن کامل

Performance and analysis of NTRU and Advanced NTRU cryptosystems

Authentication and Confidentiality is the main goal of the public key cryptosystems deal when communication takes place between both the parties. The mostly used cryptographic methods are broadly classified as symmetric and asymmetric. The DES comes under the category of symmetric key cryptosystem whereas RSA, NTRU[1] belongs to the category of asymmetric key cryptosystem. NTRU (Nth degree trun...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems

سال: 2022

ISSN: ['2569-2925']

DOI: https://doi.org/10.46586/tches.v2022.i4.349-371