fbpx
Wikipedia

NTRU

NTRU is an open-source public-key cryptosystem that uses lattice-based cryptography to encrypt and decrypt data. It consists of two algorithms: NTRUEncrypt, which is used for encryption, and NTRUSign, which is used for digital signatures. Unlike other popular public-key cryptosystems, it is resistant to attacks using Shor's algorithm. NTRUEncrypt was patented, but it was placed in the public domain in 2017. NTRUSign is patented, but it can be used by software under the GPL.[1][2]

History edit

The first version of the system, which was called NTRU, was developed in 1996 by mathematicians Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman. That same year, the developers of NTRU joined with Daniel Lieman and founded the company NTRU Cryptosystems, Inc., and were given a patent on the cryptosystem.[3] The name "NTRU", chosen for the company and soon applied to the system as well, was originally derived from the pun Number Theorists 'R' Us or, alternatively, stood for Number Theory Research Unit.[4] In 2009, the company was acquired by Security Innovation, a software security corporation.[5] In 2013, Damien Stehle and Ron Steinfeld created a provably secure version of NTRU,[6] which is being studied by a post-quantum crypto group chartered by the European Commission.[7]

In May 2016, Daniel Bernstein, Chitchanok Chuengsatiansup, Tanja Lange and Christine van Vredendaal released NTRU Prime,[8] which adds defenses against potential attack to NTRU by eliminating algebraic structure they considered worrisome. However, after more than 20 years of scrutiny, no concrete approach to attack the original NTRU exploiting its algebraic structure has been found so far.

NTRU became a finalist in the 3rd round of the Post-Quantum Cryptography Standardization project, whereas NTRU Prime became an alternate candidate.

Performance edit

At equivalent cryptographic strength, NTRU performs costly private-key operations much faster than RSA does.[9] The time of performing an RSA private operation increases as the cube of the key size, whereas that of an NTRU operation increases quadratically.

In 2010, the Department of Electrical Engineering, University of Leuven, noted that "[using] a modern GTX280 GPU, a throughput of up to 200000 encryptions per second can be reached at a security level of 256 bits. Comparing this to a symmetric cipher (not a very common comparison), this is only around 20 times slower than a recent AES implementation."[10]

Resistance to quantum-computer-based attacks edit

Unlike RSA and elliptic-curve cryptography, NTRU is not known to be vulnerable to attacks on quantum computers. The National Institute of Standards and Technology wrote in a 2009 survey that "[there] are viable alternatives for both public key encryption and signatures that are not vulnerable to Shor's Algorithm" and that "[of] the various lattice based cryptographic schemes that have been developed, the NTRU family of cryptographic algorithms appears to be the most practical".[11] The European Union's PQCRYPTO project (Horizon 2020 ICT-645622) is evaluating the provably secure Stehle–Steinfeld version of NTRU (not original NTRU algorithm itself) as a potential European standard.[7] However the Stehle–Steinfeld version of NTRU is "significantly less efficient than the original scheme".[6]

Standardization edit

  • The standard IEEE Std 1363.1, issued in 2008, standardizes lattice-based public-key cryptography, especially NTRUEncrypt.[12]
  • The standard X9.98 standardizes lattice-based public-key cryptography, especially NTRUEncrypt, as part of the X9 standards for the financial services industry.[13]
  • The PQCRYPTO project of the European Commission is considering standardization of the provably secure Stehle–Steinfeld version of NTRU.[6]

Implementations edit

Originally, NTRU was only available as a proprietary, for-pay library, and open-source authors were threatened with legal action.[14][15] It was not until 2011 that the first open-source implementation appeared,[16] and in 2013, Security Innovation exempted open-source projects from having to get a patent license[17] and released an NTRU reference implementation under the GPL v2.[18]

Implementations:

  • OpenSSH by default uses NTRU combined with the X25519 ECDH key exchange since August 2022, included in version 9.0.[19]
  • The GPL-licensed reference implementation[18]
  • A BSD-licensed library[16]
  • bouncycastle[20]
  • GoldBug Messenger[21] was the first chat and E-mail client with NTRU algorithm under open-source license, which is based on the Spot-On Encryption Suite Kernels.[22]
  • Additionally, wolfSSL provides support for NTRU cipher suites in a lightweight C implementation.[23]

References edit

  1. ^ . 2017-03-28. Archived from the original on 2019-02-18.
  2. ^ "Ntru-crypto". GitHub. 25 November 2021.
  3. ^ Robertson, Elizabeth D. (August 1, 2002). "RE: NTRU Public Key Algorithms IP Assurance Statement for 802.15.3" (PDF). IEEE. Retrieved February 4, 2013.
  4. ^ Kerlin, Janet (September 1, 2000). . George Street Journal. Brown University. Archived from the original on January 25, 2001.
  5. ^ Robinson, Maureen (July 22, 2009). (Press release). Wilmington, MA: Security Innovation. Archived from the original on December 17, 2013. Retrieved February 4, 2013.
  6. ^ a b c Stehlé, Damien; Steinfeld, Ron. "Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices". Cryptology ePrint Archive. Retrieved 2016-01-18.
  7. ^ a b Lange, Tanja (1 March 2015). "Initial recommendations of long-term secure post-quantum systems" (PDF). PQCRYPTO.EU. Horizon 2020 ICT-645622. Retrieved 18 January 2015.
  8. ^ D. J. Bernstein; C. Chuengsatiansup; T. Lange; C. van Vredendaal (2016-05-12). "NTRU Prime" (PDF). NTRU Prime.
  9. ^ "NTRU: Quantum-Resistant High Performance Cryptography".
  10. ^ Hermans, Jens; Vercauteren, Frederik; Preneel, Bart (2010). "Speed Records for NTRU". In Pieprzyk, Josef (ed.). Topics in Cryptology - CT-RSA 2010. Lecture Notes in Computer Science. Vol. 5985. San Francisco, CA: Springer Berlin Heidelberg. pp. 73–88. doi:10.1007/978-3-642-11925-5_6. ISBN 978-3-642-11924-8. ISSN 0302-9743. Retrieved February 4, 2013.
  11. ^ Perlner, Ray A.; Cooper, David A. (2009). (PDF). In Seamons, Kent; McBurnett, Neal; Polk, Tim (eds.). Proceedings of the 8th Symposium on Identity and Trust on the Internet. New York, NY: ACM. pp. 85–93. doi:10.1145/1527017.1527028. ISBN 978-1-60558-474-4. S2CID 12214601. Archived from the original (PDF) on May 14, 2012. Retrieved February 3, 2013.{{cite book}}: CS1 maint: date and year (link)
  12. ^ . Grouper.ieee.org. Archived from the original on 19 November 2008. Retrieved 7 December 2014.
  13. ^ "Security Innovation's NTRUEncrypt Adopted as X9 Standard for Data Protection". Business Wire. 11 April 2011. Retrieved 7 December 2014.
  14. ^ "Statement by the libtomcrypt (LTC) author".
  15. ^ "Email exchange between Security Innovation and a software author".
  16. ^ a b Buktu, Tim. "NTRU: Quantum-Resistant cryptography". Independent / not affiliated with NTRU Cryptosystems, Inc. Retrieved February 4, 2013.
  17. ^ . GitHub. Archived from the original on 2019-02-14. Retrieved 2014-12-15.
  18. ^ a b . GitHub. Archived from the original on 2018-03-31. Retrieved 2014-12-08.
  19. ^ "Changes since OpenSSH 8.9 (OpenSSH 9.0 release notes)". OpenBSDs OpenSSH developers. 2022-04-08.
  20. ^ "-ext-". Independent / not affiliated with NTRU Cryptosystems, Inc. Retrieved February 13, 2016.
  21. ^ Scott Edwards (2018). "GoldBug-manual. Manual of the GoldBug Crypto Messenger". GitHub Pages.
  22. ^ "Spot-On Encryption Suite with NTRU: Democratization of Multiple & Exponential Encryption". Spot-On. 2016-12-20. ISBN 978-3-7494-3506-7.
  23. ^ "wolfSSL Embedded SSL/TLS Library". wolfSSL Products. Retrieved 2018-10-09.

External links edit

  • NTRU NIST submission
  • NTRU Prime NIST submission

ntru, open, source, public, cryptosystem, that, uses, lattice, based, cryptography, encrypt, decrypt, data, consists, algorithms, encrypt, which, used, encryption, sign, which, used, digital, signatures, unlike, other, popular, public, cryptosystems, resistant. NTRU is an open source public key cryptosystem that uses lattice based cryptography to encrypt and decrypt data It consists of two algorithms NTRUEncrypt which is used for encryption and NTRUSign which is used for digital signatures Unlike other popular public key cryptosystems it is resistant to attacks using Shor s algorithm NTRUEncrypt was patented but it was placed in the public domain in 2017 NTRUSign is patented but it can be used by software under the GPL 1 2 Contents 1 History 2 Performance 3 Resistance to quantum computer based attacks 4 Standardization 5 Implementations 6 References 7 External linksHistory editThe first version of the system which was called NTRU was developed in 1996 by mathematicians Jeffrey Hoffstein Jill Pipher and Joseph H Silverman That same year the developers of NTRU joined with Daniel Lieman and founded the company NTRU Cryptosystems Inc and were given a patent on the cryptosystem 3 The name NTRU chosen for the company and soon applied to the system as well was originally derived from the pun Number Theorists R Us or alternatively stood for Number Theory Research Unit 4 In 2009 the company was acquired by Security Innovation a software security corporation 5 In 2013 Damien Stehle and Ron Steinfeld created a provably secure version of NTRU 6 which is being studied by a post quantum crypto group chartered by the European Commission 7 In May 2016 Daniel Bernstein Chitchanok Chuengsatiansup Tanja Lange and Christine van Vredendaal released NTRU Prime 8 which adds defenses against potential attack to NTRU by eliminating algebraic structure they considered worrisome However after more than 20 years of scrutiny no concrete approach to attack the original NTRU exploiting its algebraic structure has been found so far NTRU became a finalist in the 3rd round of the Post Quantum Cryptography Standardization project whereas NTRU Prime became an alternate candidate Performance editAt equivalent cryptographic strength NTRU performs costly private key operations much faster than RSA does 9 The time of performing an RSA private operation increases as the cube of the key size whereas that of an NTRU operation increases quadratically In 2010 the Department of Electrical Engineering University of Leuven noted that using a modern GTX280 GPU a throughput of up to 200000 encryptions per second can be reached at a security level of 256 bits Comparing this to a symmetric cipher not a very common comparison this is only around 20 times slower than a recent AES implementation 10 Resistance to quantum computer based attacks editUnlike RSA and elliptic curve cryptography NTRU is not known to be vulnerable to attacks on quantum computers The National Institute of Standards and Technology wrote in a 2009 survey that there are viable alternatives for both public key encryption and signatures that are not vulnerable to Shor s Algorithm and that of the various lattice based cryptographic schemes that have been developed the NTRU family of cryptographic algorithms appears to be the most practical 11 The European Union s PQCRYPTO project Horizon 2020 ICT 645622 is evaluating the provably secure Stehle Steinfeld version of NTRU not original NTRU algorithm itself as a potential European standard 7 However the Stehle Steinfeld version of NTRU is significantly less efficient than the original scheme 6 Standardization editThe standard IEEE Std 1363 1 issued in 2008 standardizes lattice based public key cryptography especially NTRUEncrypt 12 The standard X9 98 standardizes lattice based public key cryptography especially NTRUEncrypt as part of the X9 standards for the financial services industry 13 The PQCRYPTO project of the European Commission is considering standardization of the provably secure Stehle Steinfeld version of NTRU 6 Implementations editOriginally NTRU was only available as a proprietary for pay library and open source authors were threatened with legal action 14 15 It was not until 2011 that the first open source implementation appeared 16 and in 2013 Security Innovation exempted open source projects from having to get a patent license 17 and released an NTRU reference implementation under the GPL v2 18 Implementations OpenSSH by default uses NTRU combined with the X25519 ECDH key exchange since August 2022 included in version 9 0 19 The GPL licensed reference implementation 18 A BSD licensed library 16 bouncycastle 20 GoldBug Messenger 21 was the first chat and E mail client with NTRU algorithm under open source license which is based on the Spot On Encryption Suite Kernels 22 Additionally wolfSSL provides support for NTRU cipher suites in a lightweight C implementation 23 References edit Security Innovation Makes NTRUEncrypt Patent Free 2017 03 28 Archived from the original on 2019 02 18 Ntru crypto GitHub 25 November 2021 Robertson Elizabeth D August 1 2002 RE NTRU Public Key Algorithms IP Assurance Statement for 802 15 3 PDF IEEE Retrieved February 4 2013 Kerlin Janet September 1 2000 Math professors patent computer security system George Street Journal Brown University Archived from the original on January 25 2001 Robinson Maureen July 22 2009 Security Innovation acquires NTRU Cryptosystems a leading security solutions provider to the embedded security market Press release Wilmington MA Security Innovation Archived from the original on December 17 2013 Retrieved February 4 2013 a b c Stehle Damien Steinfeld Ron Making NTRUEncrypt and NTRUSign as Secure as Standard Worst Case Problems over Ideal Lattices Cryptology ePrint Archive Retrieved 2016 01 18 a b Lange Tanja 1 March 2015 Initial recommendations of long term secure post quantum systems PDF PQCRYPTO EU Horizon 2020 ICT 645622 Retrieved 18 January 2015 D J Bernstein C Chuengsatiansup T Lange C van Vredendaal 2016 05 12 NTRU Prime PDF NTRU Prime NTRU Quantum Resistant High Performance Cryptography Hermans Jens Vercauteren Frederik Preneel Bart 2010 Speed Records for NTRU In Pieprzyk Josef ed Topics in Cryptology CT RSA 2010 Lecture Notes in Computer Science Vol 5985 San Francisco CA Springer Berlin Heidelberg pp 73 88 doi 10 1007 978 3 642 11925 5 6 ISBN 978 3 642 11924 8 ISSN 0302 9743 Retrieved February 4 2013 Perlner Ray A Cooper David A 2009 Quantum resistant public key cryptography PDF In Seamons Kent McBurnett Neal Polk Tim eds Proceedings of the 8th Symposium on Identity and Trust on the Internet New York NY ACM pp 85 93 doi 10 1145 1527017 1527028 ISBN 978 1 60558 474 4 S2CID 12214601 Archived from the original PDF on May 14 2012 Retrieved February 3 2013 a href Template Cite book html title Template Cite book cite book a CS1 maint date and year link IEEE P1363 Standard Specifications For Public Key Cryptography Grouper ieee org Archived from the original on 19 November 2008 Retrieved 7 December 2014 Security Innovation s NTRUEncrypt Adopted as X9 Standard for Data Protection Business Wire 11 April 2011 Retrieved 7 December 2014 Statement by the libtomcrypt LTC author Email exchange between Security Innovation and a software author a b Buktu Tim NTRU Quantum Resistant cryptography Independent not affiliated with NTRU Cryptosystems Inc Retrieved February 4 2013 FOSS Exception GitHub Archived from the original on 2019 02 14 Retrieved 2014 12 15 a b Open Source NTRU Public Key Cryptography and Reference Code GitHub Archived from the original on 2018 03 31 Retrieved 2014 12 08 Changes since OpenSSH 8 9 OpenSSH 9 0 release notes OpenBSDs OpenSSH developers 2022 04 08 ext Independent not affiliated with NTRU Cryptosystems Inc Retrieved February 13 2016 Scott Edwards 2018 GoldBug manual Manual of the GoldBug Crypto Messenger GitHub Pages Spot On Encryption Suite with NTRU Democratization of Multiple amp Exponential Encryption Spot On 2016 12 20 ISBN 978 3 7494 3506 7 wolfSSL Embedded SSL TLS Library wolfSSL Products Retrieved 2018 10 09 External links editNTRU NIST submission NTRU Prime NIST submission Retrieved from https en wikipedia org w index php title NTRU amp oldid 1177108390, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.