IKBFU's Vestnik

2010 Issue №10

Back to the list Download an article

An analysis of NTRU-cryptosystem and its security



The structure of NTRU cryptosystem is described. Variants of attacks on NTRU cryptosystem, particularly an attack based on lattices are considered.


1. The NTRU public key cryptosystem // A tutorial. The NTRU Cryptosystems, Inc. URL: http://securityinnovation. com/cryptolab/tutorials. shtml.

2. Hoffstein J., Silverman J. Optimization for NTRU // Public-key cryptography and computational number theory. Berlin-N.-Y.: Walter de Gruyter, 2001.

3. Micciiancio D., Regev O. Lattice-based cryptography. July 22, 2008.

4. Hoffstein J., Lieman D., Pipjer J., Silverman J. NTRU: A public key cryptosystem. URL: http://grouper. ieee. org/groups/1363/lattPK/submissions/ntru. pdf.

5. Howgrave-Graha N., Silverman J., Whyte W. Meet-in-the-middle attack on an NTRU private key // NTRU Cryptosystems Technical Report #004. Version 2.

6. Hoffstein J., Pipher J., Silverman J. An introduction to mathematical cryptogra­phy. Springer. 2008.

7. Galbraith S. Mathematic of public key cryptography.

8. Hoffstein J., Howgrave-Graham N., Pipher J., Silverman J. Practical lattice-based cryptography: NTRUEncrypt and NTRUSign.

9. Application security, secure software development, and software secure train­ing. URL: http://securityinnovation. com.