NTRU Prime IIT Ukraine encryption algorithm with consideration known attacks analysis
Journal Title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА - Year 2017, Vol 4, Issue 8
Abstract
The paper deals with the modern cryptographic transformations of the asymmetric end-to-end encryption type, namely – NTRU-like cryptographic systems. A new cryptographic system NTRU Prime IIT Ukraine was created based on existing cryptographic transformations of this type (cryptographic algorithms NTRU (ANSI X9.98-2010) and NTRU Prime). A brief description of this cryptographic system is given and an analysis of its resistance to known attacks is made. At the end of the work, conclusions are made and recommendations on the features, advantages and possibilities of using the new cryptographic asymmetric algorithm of end-to-end encryption NTRU Prime IIT Ukraine are given.
Authors and Affiliations
Ivan Gorbenko, Оlena Kachko, Maryna Yesina
The data model "object-event": requirements and synthesis of the model
Requirements imposed to the developed data model are formulated based on the need to find new solutions of the actual problem of timely creation, modernization within the planned budget of databases that have the require...
ПОБУДОВА СИСТЕМИ ГОЛОСУВАННЯ З ВИКОРИСТАННЯМ БЛОКЧЕЙН ТЕХНОЛОГІЙ НА ПРИКЛАДІ HYPERLEDGER
Обговорюється характеристики і особливості роботи в системі Hyperledger Fabric та характерні проблеми реалізації транзакцій. Проведено розгляд регістрів і принципів їх роботи в відповідних системах, зокрема підключення...
PERIODIC CHARACTERISTICS OF OUTPUT FEEDBACK ENCRYPTION MODE
We investigate periodic characteristics of sequence of output blocks in the output feedback encryption mode. The model of random homogeneous substitution is used for an abstract description of this formation. This proper...
Code-Based Public-Key Cryptosystems: the current state, the existing contradictions and prospects of practical use for the post-quantum period
Discusses the asymmetric cryptosystem based on algebraic coding, are investigated with temporary status, controversies and prospects of practical use for the post-quantum period. We propose a new scheme of crypto-transfo...
Modified zonal coding of transformants of low-resource steganography algorithm
The results of modeling the process of compression of halftone images by means of a modified zonal selection of the transformation coefficients. To process transformants, two methods of grouping the coefficients are ap...