CFP last date
20 January 2025
Reseach Article

On Logical Operation for NTRU Cryptosystem

by Sonika Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 2
Year of Publication: 2017
Authors: Sonika Singh
10.5120/ijca2017915314

Sonika Singh . On Logical Operation for NTRU Cryptosystem. International Journal of Computer Applications. 174, 2 ( Sep 2017), 1-3. DOI=10.5120/ijca2017915314

@article{ 10.5120/ijca2017915314,
author = { Sonika Singh },
title = { On Logical Operation for NTRU Cryptosystem },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2017 },
volume = { 174 },
number = { 2 },
month = { Sep },
year = { 2017 },
issn = { 0975-8887 },
pages = { 1-3 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number2/28376-2017915314/ },
doi = { 10.5120/ijca2017915314 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:21:03.439864+05:30
%A Sonika Singh
%T On Logical Operation for NTRU Cryptosystem
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 2
%P 1-3
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Tripathi and Thakur proposed a new variant of NTRU cryptosystem [8] by using the Exclusive-OR operation. They proposed this system under the same general principles as that of the NTRU cryptosystem except the logical operators “Exclusive-OR” with the different bit size for encryption and decryption are used in place of truncated polynomial in NTRU cryptosystem. In this article we discuss some shortcomings of the scheme [8] and argue that the proposed scheme is not practical and secure.

References
  1. Eldon, J. W., 2010. Boolean Algebra and its Application. Springer.
  2. Hoffstein, J. , Pipher, J. and Silverman, J. H. 1996. NTRU: a new high speed public key cryptosystem. Preprint; presented at the rump session of Crypto96.
  3. Hoffstein, J., Pipher, J. and Silverman, J. H . 1998. NTRU: a ring based public key cryptosystem. In Proc. of ANTS, LNCS Springer, 1423, 267-288.
  4. Hoffstein, J., Lieman, D. and Silverman, J. 1999. Polynomial Rings and Efficient Public Key Authentication. In Proceeding of CryptTCS’99, City University of Hong-Kong Press, 7-19.
  5. Koblitz, N. 1987. Elliptic curve cryptosystem. Mathematics of Computation, 48, 203-209.
  6. Roja, P. P., Avadhani, P.S. and Prasad, E .V . 2006. An Efficient Method of Shared Key Generation Based on Truncated Polynomials. International Journal of Computer Science and Network Security, 6.(8B, 156-161.
  7. Rivest, R. L., Shamir, A. and Adleman, L. 1978. A Method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21, 120-126.
  8. Tripathi, B.P. and Thakur, K. 2015. A logical XOR operation for NTRU Cryptosystem, International Journal of Computer Applications, 126 , 0975-8887.
  9. Steven, G. and Paul , H. 2009. Introduction to Boolean Algebras. Springer-Verlag.
Index Terms

Computer Science
Information Sciences

Keywords

NTRU Cryptosystem Logical XOR operation Boolean Algebra.