Research Article

On Logical Operation for NTRU Cryptosystem

by  Sonika Singh
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Issue 2
Published: Sep 2017
Authors: Sonika Singh
10.5120/ijca2017915314
PDF

Sonika Singh . On Logical Operation for NTRU Cryptosystem. International Journal of Computer Applications. 174, 2 (Sep 2017), 1-3. DOI=10.5120/ijca2017915314

                        @article{ 10.5120/ijca2017915314,
                        author  = { Sonika Singh },
                        title   = { On Logical Operation for NTRU Cryptosystem },
                        journal = { International Journal of Computer Applications },
                        year    = { 2017 },
                        volume  = { 174 },
                        number  = { 2 },
                        pages   = { 1-3 },
                        doi     = { 10.5120/ijca2017915314 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2017
                        %A Sonika Singh
                        %T On Logical Operation for NTRU Cryptosystem%T 
                        %J International Journal of Computer Applications
                        %V 174
                        %N 2
                        %P 1-3
                        %R 10.5120/ijca2017915314
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Tripathi and Thakur proposed a new variant of NTRU cryptosystem [8] by using the Exclusive-OR operation. They proposed this system under the same general principles as that of the NTRU cryptosystem except the logical operators “Exclusive-OR” with the different bit size for encryption and decryption are used in place of truncated polynomial in NTRU cryptosystem. In this article we discuss some shortcomings of the scheme [8] and argue that the proposed scheme is not practical and secure.

References
  • Eldon, J. W., 2010. Boolean Algebra and its Application. Springer.
  • Hoffstein, J. , Pipher, J. and Silverman, J. H. 1996. NTRU: a new high speed public key cryptosystem. Preprint; presented at the rump session of Crypto96.
  • Hoffstein, J., Pipher, J. and Silverman, J. H . 1998. NTRU: a ring based public key cryptosystem. In Proc. of ANTS, LNCS Springer, 1423, 267-288.
  • Hoffstein, J., Lieman, D. and Silverman, J. 1999. Polynomial Rings and Efficient Public Key Authentication. In Proceeding of CryptTCS’99, City University of Hong-Kong Press, 7-19.
  • Koblitz, N. 1987. Elliptic curve cryptosystem. Mathematics of Computation, 48, 203-209.
  • Roja, P. P., Avadhani, P.S. and Prasad, E .V . 2006. An Efficient Method of Shared Key Generation Based on Truncated Polynomials. International Journal of Computer Science and Network Security, 6.(8B, 156-161.
  • Rivest, R. L., Shamir, A. and Adleman, L. 1978. A Method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21, 120-126.
  • Tripathi, B.P. and Thakur, K. 2015. A logical XOR operation for NTRU Cryptosystem, International Journal of Computer Applications, 126 , 0975-8887.
  • Steven, G. and Paul , H. 2009. Introduction to Boolean Algebras. Springer-Verlag.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

NTRU Cryptosystem Logical XOR operation Boolean Algebra.

Powered by PhDFocusTM