Preview

Advanced Engineering Research (Rostov-on-Don)

Advanced search

Comparative analysis of NTRUEncrypt modified post-quantum cryptographic system and standard RSA cryptosystem

https://doi.org/10.23947/1992-5980-2019-19-2-185-194

Abstract

Introduction. The NTRUEncrypt cryptographic system, the calculation of the algorithmic complexity of the development of the NTRUEncrypt cryptosystem and its modifications are considered. The study objectives are to develop NTRUEncrypt, an efficient post-quantum cryptographic algorithm, which has high cryptographic resistance to quantum computer attacks, to work out a modification of the proposed algorithm, to analyze and experimentally validate its advantages.

Materials and Methods. A description of the NTRUEncrypt encryption system is proposed. The modification of the considered algorithm is studied; the block diagram of the implementation of the software based on it is presented. An example of the software operation and its characteristic is given. The reliability of the results is proved using the Mann-Whitney U test. During the experiment, the third-party software implementation of the RSA cryptosystem was used. A Stopwatch class element was introduced in the source code of all three programs of NTRUEncrypt, RSA, and NTRUEncrypt modifications. This class provides a set of methods and properties that can be used for the precise measurement of the execution time. Thus, it became possible to record the results of the time spent on all three basic stages: key creation, encryption and decryption of the message.

Research Results. The advantages of the developed cryptosystems in terms of the performance characteristics are proved. An experimental comparison of the implemented NTRUEncrypt algorithm and its modification is performed. All advantages of the latter are indicated.

Discussion and Conclusions. The advantage of using the NTRUEncrypt algorithm modification is experimentally validated. The new application is 25% faster to perform general work on key generation, encryption and decryption. In addition, the internal memory usage is optimized through reducing the weight of the source program file and the size of the secret key. When attempting to crack a ciphertext, cryptographic robustness and complexity of using quantum algorithms are shown.

About the Authors

P. V. Razumov
Don State Technical University
Russian Federation
Rostov-on-Don


I. A. Smirnov
Don State Technical University
Russian Federation
Rostov-on-Don


I. A. Pilipenko
Don State Technical University
Russian Federation
Rostov-on-Don


A. V. Selyova
Don State Technical University
Russian Federation
Rostov-on-Don


L. V. Cherkesova
Don State Technical University
Russian Federation
Rostov-on-Don


References

1. Shor, P. Algorithms for Quantum Computation: Discrete Log and Factoring / P. Shor. — Murray Hill : AT&T Bell Labs, 1994. — 124-134 p.

2. Шаклеина, Т. А. «Мозговые центры» и их роль в формировании внешней политики США / Т. А. Шаклеина // Введение в прикладной анализ международных ситуаций. — Москва : Аспект Пресс, 2014. — C. 112.

3. Основы криптографии / А. П. Алферов [и др.]. — Москва : Гелиос АРВ, 2002. — С. 209-220.

4. Лапонина, О. Р. Криптографические основы безопасности / О. Р. Лапонина. — Москва: Национальный открытый университет ИНТУИТ, 2016. — С. 118.

5. Ишмухаметов, Ш. Т. Методы факторизации натуральных чисел / Ш. Т. Ишмухаметов. — Казань : Изд-во Казан. ун-та, 2011. — С. 74-82.

6. Bakhtiari, M. Serious Security Weakness in RSA Cryptosystem / M. Bakhtiari, M. A. Maarof // International Journal of Computer Science and Information Security. — 2012. — № 3. — P. 175-178.

7. Василенко, О. Н. Теоретико-числовые алгоритмы в криптографии / О. Н. Василенко. — Москва : МЦНМО, 2003. — С. 73-74.


Review

For citations:


Razumov P.V., Smirnov I.A., Pilipenko I.A., Selyova A.V., Cherkesova L.V. Comparative analysis of NTRUEncrypt modified post-quantum cryptographic system and standard RSA cryptosystem. Vestnik of Don State Technical University. 2019;19(2):185-194. https://doi.org/10.23947/1992-5980-2019-19-2-185-194

Views: 772


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2687-1653 (Online)