BITRU: Binary Version of the NTRU Public Key Cryptosystem via Binary Algebra

被引:0
|
作者
Alsaidi, Nadia M. G. [1 ]
Yassein, Hassan R. [2 ]
机构
[1] Univ Technol Baghdad, Dept Appl Sci, Baghdad, Iraq
[2] Al Qadisiyah Univ, Coll Educ, Dept Math, Al Dewaniya, Iraq
关键词
NTRU; BITRU; polynomial ring; binary algebra;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
New terms such as closest vector problem (CVP) and the shortest vector problem (SVP), which have been illustrated as NP-hard problem, emerged, leading to a new hope for designing public key cryptosystem based on certain lattice hardness. A new cryptosystem called NTRU is proven computationally efficient and it can be implemented with low cost. With these characteristics, NTRU possesses advantage over others system that rely on number-theoretical problem in a finite field (e.g. integer factorization problem or discrete logarithm problem). These advantages make NTRU a good choice for many applications. After the adaptation of NTRU, many attempts to generalize its algebraic structure have appeared. In this study, a new variant of the NTRU public key cryptosystem called BITRU is proposed. BITRU is based on a new algebraic structure used as an alternative to NTRU-mathematical structure called binary algebra. This commutative and associative. Establishing two public keys in the proposed system has distinguished it from NTRU and those similar to NTRU cryptosystems. This new structure helps to increase the security and complexity of BITRU. The clauses of BITRU, which include key generation, encryption, decryption, and decryption failure, are explained in details. Its suitability of the proposed system is proven and its security is demonstrated by comparing it with NTRU.
引用
收藏
页码:1 / 6
页数:6
相关论文
共 36 条
  • [31] An Image Cryptosystem based on Diffusion of Significant Bit-planes of a Scrambled Image with Generated Binary Key Matrices
    Naik, Kshiramani
    Pal, Arup Kumar
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 389 - 392
  • [32] Image authentication and integrity verification via content-based watermarks and a public key cryptosystem
    Li, CT
    Lou, DC
    Chen, TH
    2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2000, : 694 - 697
  • [33] Binary Tree Encryption with Constant-Size Public Key in the Standard Model
    Feng, Shengyuan
    Gong, Junqing
    Chen, Jie
    COMPUTER JOURNAL, 2022, 65 (06): : 1489 - 1511
  • [34] Binary Tree Based Public-Key Management for Mobile Ad Hoc Networks
    Kambourakis, Georgios
    Konstantinou, Elisavet
    Gritzalis, Stefanos
    2008 IEEE INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS (ISWCS 2008), 2008, : 258 - 263
  • [35] A new public-key authentication watermarking for binary document images resistant to parity attacks
    Kim, HY
    2005 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), VOLS 1-5, 2005, : 1321 - 1324
  • [36] Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study
    Manasrah, Ahmad M.
    Al-Din, Basim Najim
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1450 - 1461