Choosing Parameters for NTRUEncrypt

被引:50
作者
Hoffstein, Jeff [1 ]
Pipher, Jill [1 ]
Schanck, John M. [2 ,3 ]
Silverman, Joseph H. [1 ]
Whyte, William [3 ]
Zhang, Zhenfei [3 ]
机构
[1] Brown Univ, Providence, RI 02912 USA
[2] Univ Waterloo, Waterloo, ON, Canada
[3] Secur Innovat, Wilmington, MA 01887 USA
来源
TOPICS IN CRYPTOLOGY - CT-RSA 2017 | 2017年 / 10159卷
关键词
Public-key cryptography/NTRUEncrypt; Cryptanalysis; Parameter derivation; LATTICE-REDUCTION;
D O I
10.1007/978-3-319-52153-4_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We describe a method for generating parameter sets, and calculating security estimates, for NTRUEncrypt. Our security analyses consider lattice attacks, the hybrid attack, subfield attacks, and quantum search. Analyses are provided for the IEEE 1363.1-2008 product-form parameter sets, for the NTRU Challenge parameter sets, and for two new parameter sets. These new parameter sets are designed to provide >= 128-bit post-quantum security.
引用
收藏
页码:3 / 18
页数:16
相关论文
共 15 条
  • [1] [Anonymous], 2015, IACR CRYPTOLOGY EPRI
  • [2] Bernstein D. J., 2009, COST ANAL HASH COLLI
  • [3] Chen Y., 2011, BKZ 2 0 BETTER LATTI
  • [4] Chen YM, 2011, LECT NOTES COMPUT SC, V7073, P1, DOI 10.1007/978-3-642-25385-0_1
  • [5] Ducas L, 2013, LECT NOTES COMPUT SC, V8042, P40, DOI 10.1007/978-3-642-40041-4_3
  • [6] Fluhrer S.R., 2015, IACR Cryptology ePrint Archive, V2015, P676
  • [7] Gama N, 2008, LECT NOTES COMPUT SC, V4965, P31
  • [8] Hirschhorn PS, 2009, LECT NOTES COMPUT SC, V5536, P437, DOI 10.1007/978-3-642-01957-9_27
  • [9] Hoffstein J., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P267, DOI 10.1007/BFb0054868
  • [10] Random small Hamming weight products with applications to cryptography
    Hoffstein, J
    Silverman, JH
    [J]. DISCRETE APPLIED MATHEMATICS, 2003, 130 (01) : 37 - 49