Movatterモバイル変換


[0]ホーム

URL:


Wayback Machine
168 captures
19 Jun 2018 - 09 Dec 2025
AugSEPOct
01
201820192020
success
fail
COLLECTED BY
TIMESTAMPS
loading
The Wayback Machine - https://web.archive.org/web/20190901185114/https://ntruprime.cr.yp.to/
NTRU Prime
Intro
Warnings
Papers
Security
Software
NIST submission

Several ideal-lattice-based cryptosystems have been brokenby recent attacks that exploit special structuresof the rings used in those cryptosystems.The same structures are also usedin the leading proposals for post-quantum lattice-based cryptography,including the classic NTRU cryptosystem and typicalRing-LWE-based cryptosystems.

NTRU Primetweaks NTRU to use rings without these structures.Here are two public-key cryptosystems in the NTRU Prime family,both designed for the standard goal of IND-CCA2 security:

sntrup653,sntrup761,sntrup857,ntrulpr653,ntrulpr761,andntrulpr857are Streamlined NTRU Prime and NTRU LPRimewith high-security post-quantum parameters.The resulting sizes and Haswell speeds(from the officialsupercop-20190816 benchmarks forhiphop)show that reducing the attack surface has very low cost:

Systemciphertext bytespublic-key bytesenc cyclesdec cycleskeygen cycles
sntrup6538979945121266584754692
ntrulpr6531025897727088833244488
sntrup7611039115855060701801008968
ntrulpr76111671039776049406447732
sntrup8571184132270112990081195560
ntrulpr8571312118410136012563660324

sntrup4591761andntrulpr4591761are older versions ofsntrup761andntrulpr761using the same mathematical one-way functions:

Systemciphertext bytespublic-key bytesenc cyclesdec cycleskeygen cycles
sntrup4591761104712184499293064988456
ntrulpr4591761117510478030011418044056

Contributors (alphabetical order)

Acknowledgments

This work was supported bythe Cisco University Research Programunder the "Post-quantum networking" project.

This work was supported bythe U.S. National Science Foundation under grant 1314919."Any opinions, findings, and conclusions or recommendationsexpressed in this materialare those of the author(s) and do not necessarilyreflect the views of the National Science Foundation."

This work was supported bythe Commission of the European Communitiesthrough the Horizon 2020 program under project number 645622 (PQCRYPTO) and project number 645421 (ECRYPT-CSA).

This work was supported bythe Netherlands Organisation for Scientific Research (NWO)under grant 639.073.005.

Calculations were carried out onthe Saber cluster of the Cryptographic Implementations groupat Technische Universiteit Eindhoven.



École normale supérieure de Lyon
Technische Universiteit EindhovenUniversity of Illinois at Chicago

[8]ページ先頭

©2009-2026 Movatter.jp