NTRU Prime IIT Ukraine encryption algorithm with consideration known attacks analysis

Abstract

The paper deals with the modern cryptographic transformations of the asymmetric end-to-end encryption type, namely – NTRU-like cryptographic systems. A new cryptographic system NTRU Prime IIT Ukraine was created based on existing cryptographic transformations of this type (cryptographic algorithms NTRU (ANSI X9.98-2010) and NTRU Prime). A brief description of this cryptographic system is given and an analysis of its resistance to known attacks is made. At the end of the work, conclusions are made and recommendations on the features, advantages and possibilities of using the new cryptographic asymmetric algorithm of end-to-end encryption NTRU Prime IIT Ukraine are given.

Authors and Affiliations

Ivan Gorbenko, Оlena Kachko, Maryna Yesina

Keywords

Related Articles

The data model "object-event": requirements and synthesis of the model

Requirements imposed to the developed data model are formulated based on the need to find new solutions of the actual problem of timely creation, modernization within the planned budget of databases that have the require...

ПОБУДОВА СИСТЕМИ ГОЛОСУВАННЯ З ВИКОРИСТАННЯМ БЛОКЧЕЙН ТЕХНОЛОГІЙ НА ПРИКЛАДІ HYPERLEDGER

Обговорюється характеристики і особливості роботи в системі Hyperledger Fabric та характерні проблеми реалізації транзакцій. Проведено розгляд регістрів і принципів їх роботи в відповідних системах, зокрема підключення...

PERIODIC CHARACTERISTICS OF OUTPUT FEEDBACK ENCRYPTION MODE

We investigate periodic characteristics of sequence of output blocks in the output feedback encryption mode. The model of random homogeneous substitution is used for an abstract description of this formation. This proper...

Code-Based Public-Key Cryptosystems: the current state, the existing contradictions and prospects of practical use for the post-quantum period

Discusses the asymmetric cryptosystem based on algebraic coding, are investigated with temporary status, controversies and prospects of practical use for the post-quantum period. We propose a new scheme of crypto-transfo...

Modified zonal coding of transformants of low-resource steganography algorithm

The results of modeling the process of compression of halftone images by means of a modified zonal selection of the transformation coefficients. To process transformants, two methods of grouping the coefficients are ap...

Download PDF file
  • EP ID EP344965
  • DOI -
  • Views 112
  • Downloads 0

How To Cite

Ivan Gorbenko, Оlena Kachko, Maryna Yesina (2017). NTRU Prime IIT Ukraine encryption algorithm with consideration known attacks analysis. КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА, 4(8), 4-16. https://www.europub.co.uk/articles/-A-344965