CFP last date
20 May 2024
Reseach Article

A Logical XOR Operation for NTRU Cryptosystem

by Bhanu Pratap Tripathi, Khushboo Thakur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 126 - Number 2
Year of Publication: 2015
Authors: Bhanu Pratap Tripathi, Khushboo Thakur
10.5120/ijca2015905990

Bhanu Pratap Tripathi, Khushboo Thakur . A Logical XOR Operation for NTRU Cryptosystem. International Journal of Computer Applications. 126, 2 ( September 2015), 13-15. DOI=10.5120/ijca2015905990

@article{ 10.5120/ijca2015905990,
author = { Bhanu Pratap Tripathi, Khushboo Thakur },
title = { A Logical XOR Operation for NTRU Cryptosystem },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 126 },
number = { 2 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 13-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume126/number2/22523-2015905990/ },
doi = { 10.5120/ijca2015905990 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:16:23.475933+05:30
%A Bhanu Pratap Tripathi
%A Khushboo Thakur
%T A Logical XOR Operation for NTRU Cryptosystem
%J International Journal of Computer Applications
%@ 0975-8887
%V 126
%N 2
%P 13-15
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The NTRU public key cryptosystem was first presented by J. Hoffstein, J. H. Silverman and J. Pipher in 1996. This system is based on shortest and closest vector problem in a lattice and operations based on objects in a truncated polynomial ring. In this paper we propose new variant of NTRU cryptosystem which is based on logical exclusive OR operator. This system works under the same general principles as that of the NTRU cryptosystem except the logical operators “exclusive OR" with the different bit size for encryption and decryption which are used in place of truncated polynomial in NTRU cryptosystem. We also calculate the time complexity which shows that this system is faster than NTRU cryptosystem.

References
  1. J. Hoffstein, J. Pipher and J. H. Silverman, “NTRU: A Ring-Based Public Key Cryptosystem". Algorithmic Number Theory (ANTS III), Springer- Verlag, 1998, pp. 267-288.
  2. J. Hoffstein, D. Lieman, J. Silverman “Polynomial Rings and Efficient Public Key Authentication", Proceeding of the International Workshop on Cryptographic Techniques and E-Commerce, 1999.
  3. P. Prapoorna Roja, P.S. Avadhani. and E .V .Prasad, “An Efficient Method of Shared Key Generation Based on Truncated Polynomials". IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.(8B), 2006, pp. 156-161.
  4. Steven G., and Paul H.,”Introduction to Boolean Algebras". Springer-Verlag, 2009.
  5. Whitesitt Eldon J. “Boolean Algebra and its Application". Springer, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

NTRU logical operator Boolean function Encryption Decryption.