Skip navigation

DSpace JSPUI

DSpace preserves and enables easy and open access to all types of digital content including text, images, moving images, mpegs and data sets

Learn More
DSpace logo
English
中文
  • Browse
    • Communities
      & Collections
    • Publication Year
    • Author
    • Title
    • Subject
    • Advisor
  • Search TDR
  • Rights Q&A
    • My Page
    • Receive email
      updates
    • Edit Profile
  1. NTU Theses and Dissertations Repository
  2. 理學院
  3. 數學系
Please use this identifier to cite or link to this item: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/85180
Title: NTRU系統之實作演算法分析
Algorithm Analysis for the Implementation of NTRU Cryptosystem
Authors: Pei-Hsuan Chang
張霈萱
Advisor: 陳君明(Jiun-Ming Chen)
Keyword: 美國國家標準暨技術研究院,後量子密碼學,NTRU,硬體實作,多項式乘法,多項式反元素,
NIST,post-quantum cryptography,NTRU,hardware implementation,polynomial multiplication,polynomial inversion,
Publication Year : 2022
Degree: 碩士
Abstract: 在可預期的未來內,量子電腦的技術將漸趨成熟。而秀爾演算法的發現將威脅基於整數分解與離散對數問題的傳統公鑰密碼系統,包含RSA、ElGamal加密以及ECIES。因此,後量子密碼系統必將取代傳統公鑰密碼系統。 在本文中,我們將先介紹作為美國國家標準暨技術研究院(NIST)第三輪後量子密碼競賽候選演算法之一的NTRU密碼系統。其後,將針對兩種參數集——NTRU-HPS以及NTRU-HRSS——討論其密鑰生成時的可逆性並給出解密正確性證明。 在這些數學理論的討論後,我們將把焦點轉往實作上。我們將設計並分析實作NTRU所需使用的演算法。實作的目標參數集設定為具有NIST安全等級3的ntruhps2948677。這部分將包含如何實作多項式反元素、多項式乘法以及如何對有號整數做模3的計算。
In the foreseeable future, quantum computers will be at a stage. Due to Shor’s algorithm, it threatens the safety of traditional public-key-cryptosystem which is based on the hardness of integer factorization and discrete logarithms, including RSA, ElGamal encryption, and ECIES. Therefore, post-quantum cryptography (PQC) must replace these traditional public-key-cryptosystems. In this paper, we will first introduce the NTRU system (N-th degree Truncated polynomial Ring Units), which is a finalist of NIST (National Institute of Standards and Technology}) 3rd round post-quantum cryptography competition. We will study the invertibility in the key generation and also give a correctness proof of two types of parameter sets: NTRU-HPS and NTRU-HRSS. After these mathematical discussions, we will move our attention to the implementation. We aim to design and analyze algorithms for the implementation of NTRU. The target parameter set is ntruhps2948677, which has NIST security level 3. This will include how to implement computations of polynomial inverse, polynomial arithmetic, and reduction modulo 3 of signed integers.
URI: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/85180
DOI: 10.6342/NTU202202107
Fulltext Rights: 同意授權(限校園內公開)
metadata.dc.date.embargo-lift: 2022-08-18
Appears in Collections:數學系

Files in This Item:
File SizeFormat 
U0001-0508202221340100.pdf
Access limited in NTU ip range
880.66 kBAdobe PDF
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved