Dons Deals

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, 24 November 2013

There's a New Public Key in Town - Open Source NTRU Public Key Cryptography Algorithm

Posted on 10:12 by Unknown
There's a New Public Key in Town. NTRUOpenSourceProject/ntru-crypto and it's Free and Open Source. You can get it at GitHub...

Don

ntru-crypto

Open Source NTRU Public Key Cryptography Algorithm and Reference Code

Key Contacts:

  • Dr. William Whyte
  • Dr. Mark Etzel
  • Mr. Peter Jenney

Contacts may be reached by sending mail to ntru-crypto@securityinnovation.com

Project Overview

Security Innovation, Inc., the owner of the NTRU public key cryptography system, made the intellectual property and a sample implementation available under the Gnu Public License (GPL) in 2013 with the goal of enabling more widespread adoption of this superior cryptographic technology. The system is also available for commercial use under the terms of the Security Innovation Commercial License.

NTRU represents a significant improvement in the Public Key cryptography world—it’s faster, stronger and smaller than virtually any other system in use and it’s quantum computer resistant, making it the best choice for current projects with lifetimes that extend into the post quantum computer age.

"The open source licensing of the NTRU crypto system will make it even easier for wide-spread adoption of our X9.98 standard, allowing Financial Services companies to protect their important financial transactions", said executive director Cynthia Fuller of Accredited Standards Committee X9 -Financial Industry Standards.

For additional overview information click https://www.securityinnovation.com/products/encryption-libraries/ntru-cryptography.html

FAQ

What is NTRU?

NTRU is a lattice-based public key cryptosystem from Security Innovation and the leading alternative to RSA and Elliptic Curve Cryptography (ECC) due to its higher performance and resistance to attacks from quantum computers. NTRU was developed in 1996 as a visionary solution to cyber security challenges for the twenty-first century. NTRU is based on a mathematical problem called the “Approximate close lattice vector problem” and comprises three algorithms: NTRUEncrypt, NTRUSign, and PASSSign. It has been reviewed and published in scholarly journals and presented at Crypto, Eurocrypt, and RSA, and has been adopted in IEEE and X9 standards

What makes NTRU fast?

Because it is based on different math from RSA and ECC, the NTRU algorithm has different cryptographic properties. At comparable cryptographic strength, NTRU performs costly private key operations much faster than RSA or ECC. In addition, NTRU's comparative performance increases with the level of security required. As key sizes increase by a factor of n, RSA's operations/second decrease by about n3 whereas NTRU's decrease at n2.

Which applications/industries would benefit most from NTRU?

Any application that requires fast performance (large amounts of data to be protected in a short amount of time) and/or high-levels of security for the next 10 years would benefit from the NTRU solution. Furthermore, the small code size (small footprint) of the NTRU implementations make it suitable for even small embedded processors.

These applications include Payment Systems, secure messaging and email, mobile eCommerce, Healthcare, Near Field Communications (NFC), Vehicle Communications (V2V, V2I), Military/Aerospace, Web Browsers and Servers, Remote Backup Solutions, Voice over IP (VoIP), Online Presentations/Virtual Classrooms, Infrastructure (Railway switching, Traffic lights, etc), Utility meters and Cloud Provides/Datacenters.

What makes NTRU quantum computing resistant?

NTRU is currently not known to be vulnerable to algorithms based on quantum computers, unlike RSA or its other challenger, Elliptic Curve Cryptography. A working, full-scale quantum computer running the process known as “Shor’s algorithm” would be able to break RSA or ECC of any practical size in negligible time. In contrast, NTRU’s security is reduced only slightly by quantum computers. This has been validated by external reviewers such as the National Institute of Standards and Technology (NIST), who in a 2009 survey referenced NTRU as justification for the statement that “there are viable alternatives for both public key encryption and signatures that are not vulnerable to Shor’s Algorithm”.

What business problem does NTRU solve?

We're providing a data protection solution that can help ensure long-term privacy of internet and financial transactions, something that has been compromised lately with RSA/ECC. Industry needs a better and more transparent secure data communications solution, both now and in the future.

NTRU can improve communication efficiency while enhancing data security. The most commonly used encryption solution (RSA) is painfully slow, especially with the larger keys that are required for acceptable security standards. Rather than slow down data transmission, businesses today often choose to not protect all of their data.

NTRU on the other hand, provides much stronger security with substantially better performance. Higher performing NTRU encryption requires fewer servers while still protecting (encrypting) all data. If you are encrypting all transactions with a secure algorithm, the damage caused by intrusions can be significantly lessened. Secure encryption reduces the chances of costly data breaches, improves privacy and compliance and saves money by reducing the need for some intrusion detection systems and other security solutions.

What is NTRU's history and peer review?

NTRU was invented in 1996 based on a completely different mathematical problems from RSA and Elliptic Curve called the “Approximate close lattice vector problem.” It has been published, reviewed in scholarly journals, and presented at Crypto, Eurocrypt, RSA. The NTRU approach to lattice-based cryptography, which uses a particular type of lattice known as an “ideal lattice”, has been a catalyst for the development of other efficient lattice-based cryptographic primitives, most notably Gentry’s approach to fully homomorphic encryption.

There have been more than 20 reports (https://securityinnovation.com/security-lab/crypto/402.-scrutiny-ntru-encrypt.html) issued regarding the NTRU algorithm over the past 16 years. This research came from academic institutions, including Brown University, L’École normale supérieure (ENS), University of California San Diego, and Shanghai Jiaotong University. This scrutiny has led to even stronger parameter choices and hardened implementations. Now that NTRU is available under an open source license, the algorithm will receive even more testing.

How fast is NTRU?

At comparable cryptographic strength, NTRU performs private key operations 20x to 200x faster than openSSL RSA. Faster means less processing time (cheaper) and offers the ability to encrypt more data (more secure). In addition, as key sizes (security levels) increase by n, RSA's operations/second decrease at a rate of n3 whereas NTRU's decrease at n. A University of Leuven (http://link.springer.com/chapter/10.1007%2F978-3-642-11925-5_6) report states "NTRU is extremely fast on parallelizable processors." Ari Juels, Chief Scientist, RSA Labs stated, "[NTRU] is considerably faster; that is something we acknowledge" (http://www.networkworld.com/news/2011/042011-ntrue-algorithm-x9.html)

Security  NTRU Key Size     ECC   RSA     NTRU Ops/Sec.   ECC   RSA  Level     Std.    Opt.       Key Size     Std.    Opt.     Ops/Sec.  112       5951    4411      224   2048    2284    10638   951     156  128       6743    4829      256   4096    1896    9901    650     12  192       9757    6523      384   7680    1034    6849    285     8  256       12881   8173      512   15360   638     5000    116     1  

Much of the performance impact in SSL comes from the use of public key cryptography, which is used to initiate new sessions (session “handshakes”). During session handshakes, the main public key activity consuming server resources is decryption of the session key provided by each client. Performance increases in decryption have a significant impact on server performance. At current levels of activity, for a server using NTRU, the server time spent peforming public key cryptography will become negligible.

Has NTRU's speed been verified by third parties?

Yes. The Department of Electrical Engineering at the University of Leuven released a report entitled Speed records for NTRU. in which they write: "NTRU is extremely fast on parallelizable processors."

Has NTRU been standardized?

NTRU has been adopted by two standards bodies, IEEE and the Financial Services Industry’s Accredited Standards Committee X9. a. IEEE P1363 Working Group for Standards In Public Key Cryptography (http://grouper.ieee.org/groups/1363/lattPK/index.html). b. X9.98 Lattice-Based Polynomial Public Key Establishment Algorithm for the Financial Services Industry. “This standard specifies the use of the NTRUEncrypt algorithm to establish secure communications for financial services. … X9.98 marks a particularly significant step forward in improving the robustness of systems based on X9 standards: it allows the deployment of systems that are protected against quantum computing attacks as well as against classical attacks.”

Additionally, an Internet Draft standardizing NTRU-based ciphersuites in Transport Layer Security (TLS) is currently progressing through the Internet Engineering Task Force (IETF)

Is NTRU Patented?

Yes. The patents will still be enforced but may be used under the GPL, i.e. under the condition that any work that uses them is also made available under the GPL. The patents and the code implementations are also available under standard commercial terms.

Why has NTRU been open source licensed?

By offering NTRU source code and patents under the Gnu Public License (GPL) v2, we are intending to remove barriers to widespread deployment. We want to enable the developers of the open-source software that powers the internet to test, use, deploy, and start transitioning to fast, future-proof cryptography. Recent revelations and speculation about NSA influence on both crypto algorithms and crypto implementations have made it clear that the security community desperately needs alternatives to existing crypto solutions.

Making NTRU open-source also removes barriers to testing of both the algorithm and the implementation. Open scrutiny and testing is the only way to instill confidence in any encryption solution.

Furthermore, the open source licensing allows users to implement the NTRU algorithm in other languages and for other operating systems beyond those we currently support.

Are there any commercial licenses available?

For commercial (not open source) applications, Security Innovation offers a commercial license (see repository) that is not limited to use in open source applications only.

Is replacing RSA with NTRU the best solution moving forward?

We don’t think a single encryption solution is the best idea, regardless of the algorithm. Double encryption using two fast algorithms such as NTRU plus another post-quantum crypto algorithm, or even ECC, would provide far greater security at a considerable higher performance than RSA alone today. Our Chief Scientist, William Whyte, wrote a blog post on this subject. (http://blog.securityinnovation.com/blog/2013/08/king-rsa-cryptos-successor-why-we-need-to-move-away-from-a-monarchy.html)

Doesn’t open sourcing make NTRU implementations more vulnerable to hackers?

On the contrary: NTRU has been tested by several external groups in addition to the commercial implementations over the past 10 years. By exposing it to even more users, the strength of the algorithm will be proven and the implementations will be strengthened. Hiding behind a veil of patents and licensing does not equate to greater or lesser security. The underlying strength of the algorithm is unaffected by the chosen licensing model. In the event of any vulnerability being discovered in a particular implementation of the crypto algorithm, open source software allows users to build in short-term mitigation defenses to protect themselves until the vulnerability is fixed. We feel this situation is better than leaving users exposed and unaware.

Where can I get more technical information

Go to https://www.securityinnovation.com/security-lab/crypto.html which is where we’ve collected a boatload of content on NTRU including NIST reports, the math and other very useful stuff.


Downlaod here...
https://github.com/NTRUOpenSourceProject/ntru-crypto

Open Source NTRU Public Key Cryptography Algorithm - NTRU public key crypto released to open source community


NTRU public key crypto released to open source community
NTRUOpenSourceProject/ntru-crypto · GitHub
Linux Today - NTRU public key crypto released to open source community
RSA and ECC Keys
Bcrypt - Blowfish File Encryption
Best Free File Encryption Utility
DonsDeals: Clean old host keys - Deleting an RSA host key in Fedora Linux
security - How to remove strict RSA key checking in SSH and what's the problem here? - Server Fault
Deleting an RSA host key By Forwest Media
File Encryption general info
Megabad: A quick look at the state of Mega’s encryption | Ars Technica
DJB's encryption
Freezing Android to crack the encryption
Disk Encryption in Fedora 16
aesutil - Advanced Encryption Standard
Lavabit Founder Takes To Kickstarter To Open Source A New End-To-End Encryption Messaging Protocol | TechCrunch
Cypherix Cryptainer LE Free Encryption Software
Dark Mail Alliance aims to offer Email 3.0, with built-in end-to-end encryption | LinuxBSDos.com
Linux Today - Open-source project, Crypton, seeks to make encryption easier
Linux Today - Lavabit Founder Takes To Kickstarter To Open Source A New End-To-End Encryption Messaging Protocol
Linux Today - A crowd funded modern, fast web-mail client with user-friendly encryption and privacy features.
Linux Today - Dark Mail Alliance aims to offer Email 3.0, with built-in end-to-end encryption
Google Expedites Data Encryption | Maximum PC
Legislation Seeks to Bar N.S.A. Tactic in Encryption - NYTimes.com
Open-source project, Crypton, seeks to make encryption easier | PCWorld
Software Protection Initiative - Encryption Wizard download public
Does using encryption make you a bigger target for the NSA? | TechRepublic
Best Free Encryption Utility for Cloud Storage
Best Free File Encryption Utility
Comparing TrueCrypt and AxCrypt As The Best Free Encryption Utilities
NSA and GCHQ unlock privacy and security on the internet | World news | The Guardian
Whisper open-sources Android text-encryption app • The Register
TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows 7/Vista/XP, Mac OS X and Linux
NSA defeats most Web privacy encryption, Snowden documents indicate - UPI.com
This Cute Chat Site Could Save Your Life and Help Overthrow Your Government | Threat Level | Wired.com
RSA and ECC Keys
Bcrypt - Blowfish File Encryption
Best Free File Encryption Utility
DonsDeals: Clean old host keys - Deleting an RSA host key in Fedora Linux
security - How to remove strict RSA key checking in SSH and what's the problem here? - Server Fault
Deleting an RSA host key By Forwest Media
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • ZigBee - a specification for a suite of high level communication protocols used to create personal area networks built from small low-power digital radios
    ZigBee From Wikipedia, the free encyclopedia Jump to: navigation , search ZigBee ...
  • Open Sorce Hardware - The Wandboard is a low cost board based on the i.MX6 multicore ARM Cortex-A9 family of processors. In consists of a core module based on the EDM standard and a simple to extend baseboard
    Here's an Open Source Wandboard - Freescale i.MX6 ARM Cortex-A9 Opensource Community Development Board. The Wandboard is a low ...
  • 1967 Chevy Camaro Complete Rebuild - Videos, HowStuffWorks Videos "NAPA Videos"
    Video Playlist - West Coast Customs Shop, Completely Tears Down a 1967 Chevy Camaro and then does a Complete Rebuild...
  • Installing and Updating GRUB 2 in Fedora Linux
    This Page has allot of info on Installing, Updating and Trouble Shooting Grub 2 in Fedora Linux. There are some good How To's for...
  • Dynaco Stereo 400 Power Amplifier - Dead Channel Fix - Dynaco Repairs For PC-28 Amplifier Boards
    My Dynaco Stereo 400 Amp... The Page Below these e-mails with Kevin Boales. Looks like the one that I found. Back in ...
  • Open source PLC's - PLC (programmable logic controller)
    Here's some Great Looking Open source PLC Projects. The OSPLC Small & Large Bricks are open-source PLC (programmable logic ...
  • NetProMax PC with Motherboard P5PE-VM ASUSTeK
    Here are some links to info on the NetProMax PC with Motherboard P5PE-VM ASUSTeK ... Don ASUSTe...
  • Running a PXE Boot Server in Parted Magic
    Here's some good info on Running PXE Boot Server in Parted Magic... Don PXE – Parted Magic PXE PXE: the "classic" way ...
  • Americas Health Care - Obama Care - Key Features of the Affordable Care Act - Health Care and Education Reconciliation Act
    Finally! Some real info, as in... This is the date that the Affordable Care Act, goes into effect. Open enrollment in the Heal...
  • Building a Brushless Motor Controller using an ATmega Chip - by Davide Gironi
    Here's a very in depth Article on Building a Brushless Motor Controller using an ATmega Chip - by Davide Gironi... Do...

Blog Archive

  • ▼  2013 (354)
    • ►  December (12)
    • ▼  November (33)
      • Ninja Blocks Home Automation System - Hardware, as...
      • The Rules are Changing as we go, with Obama Care -...
      • Linux Drivers for the HP Photosmart C3180 All-in-O...
      • How To install HULU and NETFLIX on your XBMC Media...
      • Fun Linux Commands - 20 Funny Commands of Linux or...
      • Illumination Software Creator - visually build you...
      • I'm trying out SparkyLinux, it's based on Debian T...
      • How to Hack a Portable DVD Player into a Cheap LCD...
      • LCD TV Repair made easy # 1 - YouTube
      • NetHogs App, is great for finding out how much Ban...
      • Neverquest Trojan Targets Online Banking Users - O...
      • Free Online Video Courses from the guys at Google ...
      • There's a New Public Key in Town - Open Source NTR...
      • DIY Pick and Place V2 Project Complete - Brian Dor...
      • Earth Quakes in Azle TX! Yep, it's real!
      • Auto-Sort Bookmarks - Add-ons for Firefox
      • Network Activity Viewer - Net Activity Viewer
      • Fokirtor Linux Back Door Uses Covert Communication...
      • Human Powered Hydrofoils - Bikes
      • Installing and Configuring OpenSSH Server In Linux...
      • Virus Scan a file online, upload a file
      • Ham Radios - BITX - An easy to build 6 watts SSB t...
      • Web Browser Safety - What Is Your Browser Doing be...
      • Not just an altered Ink Jet Printer for Printing C...
      • KiCad Project Creation - Video Series "Getting To ...
      • WinDirStat disk usage statistics viewer and clean-...
      • England's National Media Museum Discovers World’s ...
      • How to install Raspbmc on the Raspberry Pi, from t...
      • TreeLine and HTMLDoc for Editing Organizing and Co...
      • Cuisinart 3-in-1 Cook Central (MSC-600) Demo Video...
      • Fedora or Korora 17 How to Move or Delete utab fil...
      • Intel's Galileo open-source computer for the hacke...
      • What's the Image on the Google Home Page, all abou...
    • ►  October (23)
    • ►  September (46)
    • ►  August (52)
    • ►  July (36)
    • ►  June (45)
    • ►  May (17)
    • ►  April (38)
    • ►  March (19)
    • ►  February (22)
    • ►  January (11)
  • ►  2012 (145)
    • ►  December (27)
    • ►  November (31)
    • ►  October (14)
    • ►  September (15)
    • ►  August (48)
    • ►  July (10)
Powered by Blogger.

About Me

Unknown
View my complete profile