Library Subscription: Guest
Begell Digital Portal Begell Digital Library eBooks Journals References & Proceedings Research Collections
Telecommunications and Radio Engineering
SJR: 0.202 SNIP: 0.2 CiteScore™: 0.23

ISSN Print: 0040-2508
ISSN Online: 1943-6009

Volumes:
Volume 78, 2019 Volume 77, 2018 Volume 76, 2017 Volume 75, 2016 Volume 74, 2015 Volume 73, 2014 Volume 72, 2013 Volume 71, 2012 Volume 70, 2011 Volume 69, 2010 Volume 68, 2009 Volume 67, 2008 Volume 66, 2007 Volume 65, 2006 Volume 64, 2005 Volume 63, 2005 Volume 62, 2004 Volume 61, 2004 Volume 60, 2003 Volume 59, 2003 Volume 58, 2002 Volume 57, 2002 Volume 56, 2001 Volume 55, 2001 Volume 54, 2000 Volume 53, 1999 Volume 52, 1998 Volume 51, 1997

Telecommunications and Radio Engineering

DOI: 10.1615/TelecomRadEng.v78.i7.30
pages 579-594

METHODS OF BUILDING GENERAL PARAMETERS AND KEYS FOR NTRU PRIME UKRAINE OF 5TH – 7TH LEVELS OF STABILITY. PRODUCT FORM

I. D. Gorbenko
V. Karazin National University of Kharkiv, 4 Svoboda Sq., Kharkiv, 61022, Ukraine; Kharkiv National University of Radio Electronics, 14, Nauka Ave., Kharkiv, 61166, Ukraine
O. G. Kachko
Kharkiv National University of Radio Electronics, 14 Nauka Ave., Kharkiv 61166, Ukraine
Yu. I. Gorbenko
Institute of Information Technologies, 12 Bakulina St., Kharkiv 61166, Ukraine
I. V. Stelnik
Institute of Information Technologies, 12 Bakulina St., Kharkiv 61166, Ukraine
S. O. Kandy
Institute of Information Technologies, 12 Bakulina St., Kharkiv 61166, Ukraine
M. V. Yesina
V. Karazin National University of Kharkiv, 4 Svoboda Sq., Kharkiv 61022, Ukraine

ABSTRACT

The research was carried out and the development of an effective practical algorithm for the construction of system-wide parameters and keys of cryptographic transformations such as asymmetric ciphers for a special form of setting the Product Form polynomial was performed. The experimental confirmation of the built-in system-wide parameters for 5–7 stability levels NTRU PRIME UKRAINE, taking into account a combined attack is given.

REFERENCES

  1. Koblitz, N, and Menezes, A.J., (2015), A Riddle wrapped in an Enigma, Department of Mathematics, Box 353.350, University of Washington, Seattle, WA 98195 U.S.A. – Access mode: https://eprint.iacr.org/2015/1018.pdf.

  2. Chen, L., Jordan, S., Yi-Kai-Liu, Moody, D. et al., Report on Post-Quatum Cryptography, NISTIR 8105 (DRAFT) Access mode: http://csrc.nist.gov/publications/drafts/nistir-8105/nistir_8105_ draft.pdf.

  3. ETSI GR QSC 001 V.1.1.1 (2016-07), Quantum-Safe Cryptography (QSC); Quantum-safe algorithmic framework, [Electronic resource] – Access mode: https://portal.etsi.org/webapp/ workProgram/Report_WorkItem.asp?wki_id=46690.

  4. Proposed Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process, [Electronic resource] – Access mode: http://csrc.nist.gov/groups/ST/post- quantum-crypto/documents/call-for-proposals-draft-aug-2016.pdf.

  5. Gorbenko, Yu.I., (2016) Methods of Construction and Analysis, Standardization and Application of Cryptographic Systems, Kharkiv, Ukraine: Fort, 959 p., (in Ukrainian).

  6. Bernstein, D.J., Chitchanok Chuengsatiansup, Lange, T., and van Vredendaal, Ch., NTRU Prime [Electronic resource]. – Access mode: https://ntruprime.cr.yp.to/ntruprime-20160511.pdf.

  7. NTRU Open Source Project [Electronic resource]. – Access mode: https://github.com/ NTRUOpenSourceProject/ntru-crypto.

  8. Gorbenko, І., Kachko, O., and Pogrebnyak, K., (2015) , Features of parameters calculation for NTRU algorithm, Prikladnaya Elektronika, 14(3), pp. 272-277, (in Russian).

  9. American National Standard X 9.98-2010, Lattice-Based Polynomial Public Key Encryption Algorithm, Part 1: Key Establishment; Part 2: Data Encryption, (2010).

  10. Gorbenko, I.D., Kachko, O.G., and Yesina, M.V., (2018) , General Provisions and Analysis of NTRU Prime IIT Ukraine Directional Encryption Algorithm, Radiotechnika, 193, pp. 5-16, (in Russian).

  11. Horstein, J., Pipher, J., Schanck, J., Silverman, J. et al., (2015) , Choosing Parameters for NTRUEncrypt, [Electronic resource]. – Access mode: https://eprint.iacr.org/2015/708.pdf.

  12. Laarhoven Th., Sieving voe closest lattice vectors (with pre-processing), [Electronic resource]. – Access mode: https://arxiv.org/pdf/1607.04789.pdf.

  13. Howgrave Graham, N., Silverman, J.H., and Whyte, W., NTRU Cryptosystems Technical Report, Report #4, Version 2. A Meet-In-The-Middle Attack on an NTRU Private key, [Electronic resource]. – Access mode.

  14. Efficient Embedded Security Standards (EESS) [Electronic resource]. – Access mode: https://github.com/NTRUOpenSourceProject/ntru-crypto/blob/e5655c2a10b74b5a056ca849dbe85e48 60f2eb5/doc/EESS1-2015v3.0.pdf.

  15. Gorbenko, I.D., Kachko, O.G., Gorbenko, Yu.I., and Yesina, M.V., (2018) , Improved method for generating system-wide parameters for NTRU Prime Ukraine, Radiotechnika, 195, (in Ukrainian).

  16. Bernstein, D.J., Chitchanok Chuengsatiansup, Lange, T. and van Vredendaal, Ch., (2016) , NTRU Prime: reducing attack surface at low cost. [Electronic resource]. – Access mode: https://eprint.iacr.org/2016/461.pdf.

  17. Gorbenko, I., Kuznetsov, A., Lutsenko, M., and Ivanenko, D., (2017) , The research of modern stream ciphers, 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkiv, Ukraine, pp. 207-210.

  18. Yuanmi Chen and Phong Q. Nguyen, BKZ 2.0: Better Lattice Security Estimates. [Electronic resource]. – Access mode https://www.iacr.org/archive/asiacrypt2011/70730001/70730001.pdf.


Articles with similar content:

CALCULATION OF GENERAL PARAMETERS FOR NTRU PRIME UKRAINE OF 6-7 LEVELS OF STABILITY
Telecommunications and Radio Engineering, Vol.78, 2019, issue 4
S. O. Kandy, M. V. Yesina, A. N. Alekseychuk, V. A. Ponomar, O. G. Kachko, V. A. Bobukh, I. D. Gorbenko, I. V. Stelnik
THE EFFECT OF THE STOCHASTIC PERTURBATION ON HEAT AND MASS TRANSFER PROCESSES
International Heat Transfer Conference 6, Vol.2, 1978, issue
S. Endrenyi, Béla Palancz
ANALYSIS OF ASYMMETRIC NTRU PRIME IIT UKRAINE ENCRYPTION ALGORITHM WITH REGARDS TO KNOWN ATTACKS
Telecommunications and Radio Engineering, Vol.77, 2018, issue 9
M. V. Yesina, O. G. Kachko, I. D. Gorbenko
Numerical and Numerically-analytical Methods for Calculation of Versal Model Parameters Based on the Campbell-Hausdorff Expansion
Journal of Automation and Information Sciences, Vol.31, 1999, issue 4-5
Valeriy V. Udilov
Modeling of Processes in the Transistor Inverter with Pulse-Width Modulation
Journal of Automation and Information Sciences, Vol.31, 1999, issue 12
Sergey A. Peterchuk