期刊文献+

基于动态模型的NTRU算法

Algorithm of dynamic patterns for NTRU
下载PDF
导出
摘要 提出一种新的方法来改进NTRU算法执行速度。分析NTRU算法中多项式系数可能存在重复出现"11""101"等模型的分布特征,然后用贪心算法找出在多项式卷积计算时可以重复使用最多次数的模型,过滤多项式系数对模型的干扰,从而实现在多项式中发现模型数最大化。重复使用模型相应的卷积值,可以提高NTRU算法的密钥产生、加密和解密的速度。 This paper presented a new method to enhance the executive speed of NTRU algorithm. First, analyzed the polynomial coefficients to find out the distribution characteristics of patterns, such as "11"" 101" and so on, which were possible to occur repetitively. Then, using greedy algorithm determined the patterns that could be used most frequently when calculating the convolution of polynomial, and eliminating the interferential effects that polynomial coefficients would have on patterns, thereby ultimately maximized the number of patterns found in the polynomial. By using the convolution of related patterns repetitively, speeds up the key generation, as well as the encryption and decryption operation of NTRU.
出处 《计算机应用研究》 CSCD 北大核心 2009年第5期1896-1899,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(60573141,60773041) 江苏省高校自然科学基金资助项目(08KJD520014)
关键词 公开密钥体系 样本 NTRU加密 卷积 public-key cryptanalysis patterns NTRU encrypt convolution
  • 相关文献

参考文献9

  • 1LUDWIG C. A faster lattice reduction method using quantum search [C]//Proc of the 14th International Symposium on Algorithms and Computation. Berlin : Springer, 2003 : 199-208.
  • 2HOFFSTE1N J, SILVERMAN J H. Optimizations for NTRU [ C ]//Proc of Public-Key Cryptography and Computational Number Theory. Warsaw : de Gruyter,2000 : 11-15.
  • 3HOFFSTEIN J, SILVERMAN J H. Random small hamming weight products with applications to cryptography [ J ]. Discrete Applied Mathematics ,2003,130( 1 ) :37-49.
  • 4BAILEY D V,COFFIN D,ELBIRT A,et al. NTRU in constrained devices[ C ]//Proc of the 3rd International Workshop on Cryptographic Hardware and Embedded Systems-CHES. Berlin : Springer, 2001 : 262- 272.
  • 5LEE M K,KIM J W,SONG J E,et al. Sliding window method for NTRU[ C ]//Proc of the 5th International Conference on Applied Cryptography and Network Security. Berlin : Springer,2007:432-444.
  • 6IEEE P1363.1/139, Draft standard for public-key cryptographic techniques based on hard problems over lattices[ S ]. 2007.
  • 7CAI Qingjun ZHANG Yuli.Subliminal Channels in the NTRU and the Subliminal-Free Methods[J].Wuhan University Journal of Natural Sciences,2006,11(6):1541-1544. 被引量:2
  • 8GAUBATZ G,KAPS J P, SUNAR B. Public key cryptography in sensor networks-revisited [ C ]//Proc of the 1st European Workshop on Security in Ad hoc and Sensor Networks. Berlin:Springer,2005:2-18.
  • 9MOL P, YUNG M. Recovering NTRU secret key from inversion oracles [ C ]//Proc of the 11 th International Workshop on Practice and Theory in Public-Key Cryptography. Berlin : Spring-get,2008 : 18-36.

二级参考文献1

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部