DocumentCode :
190542
Title :
Insight into the operation of NTRU and a comparative study of NTRU, RSA and ECC public key cryptosystems
Author :
Gaithuru, Juliet N. ; Bakhtiari, Majid
Author_Institution :
Fac. of Comput., Univ. Teknol. Malaysia, Skudai, Malaysia
fYear :
2014
fDate :
23-24 Sept. 2014
Firstpage :
273
Lastpage :
278
Abstract :
Information is a fundamental part of the world today and with it has come the need for information security during communication over public channels so as to safeguard communication. There are various public key algorithms being implemented today, the most popular being RSA and ECC. Given the trend towards quantum computing systems, there is need to provide assurance of information security in the post-quantum period. Due to the susceptibility of ECC and RSA to quantum algorithm attacks, NTRU is the leading alternative. This paper provides a clear description of the operation of the NTRU public key cryptosystem, the constraints for the selection of its parameters, its security followed by a practical illustration of its operation. This paper also highlights the strengths and weaknesses of NTRU followed by a comparative study of the performance of NTRU, RSA and ECC. Finally, we give a conclusion of potential areas for further research so as to provide assurance of security pertaining to NTRU.
Keywords :
public key cryptography; ECC public key cryptosystem; NTRU public key cryptosystem; RSA public key cryptosystem; elliptic curve cryptography; information security; quantum computing systems; Elliptic curve cryptography; Encryption; Polynomials; Quantum computing; ECC; NTRU; RSA; cryptosystem; decryption failure; lattices; post-quantum computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Engineering Conference (MySEC), 2014 8th Malaysian
Conference_Location :
Langkawi
Type :
conf
DOI :
10.1109/MySec.2014.6986028
Filename :
6986028
Link To Document :
بازگشت