{"title":"一种具有附加私钥的新型NTRU变体的新颖安全性分析","authors":"N. Salleh, H. Kamarulhaili, L. Abualigah","doi":"10.5267/j.ijdns.2023.2.001","DOIUrl":null,"url":null,"abstract":"This paper proposes a new variant of NTRU with a slightly different critical formulation. The significance of this new variant is that it requires an additional private key to provide a tighter scheme. Because of these changes, modified key generation, encryption and decryption algorithms have been developed accordingly. The new variant is analyzed and tested against several well-known attacks, namely the alternate private key attack, brute force attack, meet-in-the-middle attack, multiple transmission attacks and lattice attack. Security properties related to these attacks have been established and explored to ensure the new variant is secure against the said attacks. Several examples are provided to illustrate the ideas.","PeriodicalId":36543,"journal":{"name":"International Journal of Data and Network Science","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A novel security analysis for a new NTRU variant with additional private key\",\"authors\":\"N. Salleh, H. Kamarulhaili, L. Abualigah\",\"doi\":\"10.5267/j.ijdns.2023.2.001\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposes a new variant of NTRU with a slightly different critical formulation. The significance of this new variant is that it requires an additional private key to provide a tighter scheme. Because of these changes, modified key generation, encryption and decryption algorithms have been developed accordingly. The new variant is analyzed and tested against several well-known attacks, namely the alternate private key attack, brute force attack, meet-in-the-middle attack, multiple transmission attacks and lattice attack. Security properties related to these attacks have been established and explored to ensure the new variant is secure against the said attacks. Several examples are provided to illustrate the ideas.\",\"PeriodicalId\":36543,\"journal\":{\"name\":\"International Journal of Data and Network Science\",\"volume\":\"1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Data and Network Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5267/j.ijdns.2023.2.001\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Social Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Data and Network Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5267/j.ijdns.2023.2.001","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
A novel security analysis for a new NTRU variant with additional private key
This paper proposes a new variant of NTRU with a slightly different critical formulation. The significance of this new variant is that it requires an additional private key to provide a tighter scheme. Because of these changes, modified key generation, encryption and decryption algorithms have been developed accordingly. The new variant is analyzed and tested against several well-known attacks, namely the alternate private key attack, brute force attack, meet-in-the-middle attack, multiple transmission attacks and lattice attack. Security properties related to these attacks have been established and explored to ensure the new variant is secure against the said attacks. Several examples are provided to illustrate the ideas.