Physics, mathematics, and technology

2010 Issue №10

Back to the list Download the article

An analysis of NTRU-cryptosystem and its security

Pages
112-115

Abstract

The structure of NTRU cryptosystem is described. Variants of attacks on NTRU cryptosystem, particularly an attack based on lattices are considered.

Reference

1. The NTRU public key cryptosystem // A tutorial. The NTRU Cryptosystems, Inc. URL: http://securityinnovation. com/cryptolab/tutorials. shtml.

2. Hoffstein J., Silverman J. Optimization for NTRU // Public-key cryptography and computational number theory. Berlin-N.-Y.: Walter de Gruyter, 2001.

3. Micciiancio D., Regev O. Lattice-based cryptography. July 22, 2008.

4. Hoffstein J., Lieman D., Pipjer J., Silverman J. NTRU: A public key cryptosystem. URL: http://grouper. ieee. org/groups/1363/lattPK/submissions/ntru. pdf.

5. Howgrave-Graha N., Silverman J., Whyte W. Meet-in-the-middle attack on an NTRU private key // NTRU Cryptosystems Technical Report #004. Version 2.

6. Hoffstein J., Pipher J., Silverman J. An introduction to mathematical cryptogra­phy. Springer. 2008.

7. Galbraith S. Mathematic of public key cryptography.

8. Hoffstein J., Howgrave-Graham N., Pipher J., Silverman J. Practical lattice-based cryptography: NTRUEncrypt and NTRUSign.

9. Application security, secure software development, and software secure train­ing. URL: http://securityinnovation. com.