Discussion on Matrix NTRU

نویسندگان

  • Xu-Ren Luo
  • Chen-Hui Jerry Lin
چکیده

In recent years the study of cryptosystem has shifted noticeably from symmetric to asymmetric key encryptions. One of the more intriguing issues of the research is NTRU encryption system, which is based on ring theory. The security of NTRU always depends on the lattices. Several studies have suggested that it is very difficult to know whether a polynomial is invertible or not. Nayak et al. introduced a new method as a matrix solution to solve the problem. However, this method is not without its flaws. In this paper, we expose the weakness regarding network security in matrix NTRU cryptosystem of Nayak et al. (2008, 2010) conscientiously, and we also propose a novel solution to this weakness. Our approach is based on the fact that some new conditions for selection of keys can increase the size of domain compared to what was shown in the previous studies and improve the strength of security against different kind of network attacks. First, we use a counter example to point out the flaw in the theorem of inverse modulo q introduced in the previous studies. Second, we prepare a new approach for inverse modulo q. The purpose of this paper is to demonstrate that our twofold selection scheme is superior to the original matrix NTRU cryptosystem and will help cryptosystems function under a safer environment by creating one public key and two private keys.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluation of Performance Characteristics of Polynomial based and Lattice based NRTU Cryptosystem

In order to achieve the security for the e-business application, generally, the organizations follow the cryptographic methods. The two widely accepted and used cryptographic methods are symmetric and asymmetric. The DES ideally belongs to the category of symmetric key cryptosystem and RSA, NTRU[3] belongs to the category of asymmetric key cryptosystem. NTRU (Nth degree truncated polynomial rin...

متن کامل

PairTRU: Pairwise Non-commutative Extension of The NTRU Public key Cryptosystem

We show a novel lattice-based scheme (PairTRU) which is a non-commutative variant of the NTRU. The original NTRU is defined via the ring of quotient with variable in integers and this system works in the ring R = Z[x] . We extend this system over Z× Z and it performs all of operations in the non-commutative ring M = M(k,Z×Z)[x] <(Ik×k,Ik×k)x−(Ik×k,Ik×k)> , where M is a matrix ring of k ×...

متن کامل

Comparison between Subfield and Straightforward Attacks on NTRU

Recently in two independent papers, Albrecht, Bai and Ducas and Cheon, Jeong and Lee presented two very similar attacks, that allow to break NTRU with larger parameters and GGH Multinear Map without zero encodings. They proposed an algorithm for recovering the NTRU secret key given the public key which apply for large NTRU modulus, in particular to Fully Homomorphic Encryption schemes based on ...

متن کامل

Title: Estimated Breaking times for Ntru Lattices

In this note we report on experiments with the lattices underlying the NTRU Public Key Cryptosystem. We present data for the time needed to nd a small vector and use this data to extrapolate expected breaking times for the NTRU PKCS for various parameter values. In particular, we nd that NTRU 167, NTRU 263, and NTRU 503 are at least as secure as RSA 512, RSA 1024, and RSA 2048 respectively. In ...

متن کامل

Revisiting Lattice Attacks on Overstretched NTRU Parameters

In 2016, Albrecht, Bai and Ducas and independently Cheon, Jeong and Lee presented very similar attacks to break the NTRU cryptosystem with larger modulus than in the NTRUEncrypt standard. They allow to recover the secret key given the public key of Fully Homomorphic Encryption schemes based on NTRU ideas. Hopefully, these attacks do not endanger the security of the NTRUEncrypt, but shed new lig...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011