( 1 of 1 ) |
United States Patent | 6,081,597 |
Hoffstein ,   et al. | June 27, 2000 |
The public key encryption system of the present invention has short and easily created encryption keys and wherein the encoding and decoding processes are performed extremely rapidly, and has low memory requirements. The encoding and decoding processes use both the addition and multiplication operations in a ring modulo with two different ideals. The cryptosystem of the present invention allows encryption keys to be chosen essentially at random from a large set of binary vectors, for which key lengths are comparable to the key lengths of the most widely used prior art cryptosystems. The present invention features an appropriate security level (.about.2.sup.80), with encoding and decoding processes ranging from approximately one to two orders of magnitude faster than the prior art, particularly the exponentiation cryptosystems.
Inventors: | Hoffstein; Jeffrey (Pawtucket, RI); Pipher; Jill (Pawtucket, RI); Silverman; Joseph H. (Needham, MA) |
Assignee: | NTRU Cryptosystems, Inc. (Pawtucket, RI) |
Appl. No.: | 914449 |
Filed: | August 19, 1997 |
U.S. Class: | 380/28; 380/30; 708/491 |
Intern'l Class: | H04L 009/28; H04L 009/30 |
Field of Search: | 380/28,30,21 708/491 |
4218582 | Aug., 1980 | Hellman et al. | 178/22. |
4405829 | Sep., 1983 | Rivest et al. | 178/22. |
4633036 | Dec., 1986 | Hellman et al. | 178/22. |
4995082 | Feb., 1991 | Schnorr | 380/23. |
5054066 | Oct., 1991 | Riek et al. | 380/30. |
5231668 | Jul., 1993 | Kravitz | 380/28. |
5276737 | Jan., 1994 | Micali | 380/30. |
5299262 | Mar., 1994 | Brickell et al. | 380/28. |
5351297 | Sep., 1994 | Miyaji et al. | 380/28. |
5375170 | Dec., 1994 | Shamir | 380/30. |
5577124 | Nov., 1996 | Anshel et al. | 380/46. |
5600725 | Feb., 1997 | Rueppel et al. | 380/30. |
5625692 | Apr., 1997 | Herzberg et al. | 380/21. |
5790675 | Aug., 1998 | Patarin | 380/23. |
5805703 | Sep., 1998 | Crandal | 380/30. |
R. Pieper, "Cryptanalysis of Redei- and Dickson Permutations on Arbitrary Finite Rings" in Applicable Algebra in Engineering, Communication and Computing, Springer-Verlag, pp. 59-76, 1993. Blum, M., Goldwasser, S., "An efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information," Advances in Cryptology: Proceedings of Crypto 84, Lecture Notes in Computer Science, vol. 196, Springer-Verlag, 1985, pp. 289-299. (Month unknown). Coppersmith, D., Shamir, A., "Lattice Attacks On NTRU," preprint, Apr. 5, 1997, presented at Eurocrypt 97, pp. 1-13. Goldreich, O., Goldwasser, S., Halevi, S., "Public-Key Cryptosystems From Lattice Reduction Problems," MIT-Laboratory for Computer Science preprint, Nov. 1996, pp. 0-29. Hoffstein, J., Pipher, J., Silverman, J.H., "NTRU: A Ring-Based Public Key Cryptosystem," preprint, presented at the rump session of Crypto 96, pp. I-1-I-18. (No date). Schnorr, C.P., Hoerner, H.H., "Attacking The Chor Rivest Cryptosystem By Improved Lattice Reduction," Proc. Eurocrypt 1995, Lecture Notes in Computer Science, vol. 921, Springer-Verlag, 1995, pp 1-12. (Month unknown). Stinson, D., "Crytography: Theory and Practice," CRC Press, Boca Raton, 1995, pp. 114-203. (Month unknown). Goldwasser, S., Micali, S., "Probabilistic Encryption" J. Computer and Systems Science, vol. 28, (1984) pp. 270-299. (Month unknown). McEliece, R.J., "A Public-Key Cryptosystem Based On Algebraic Coding Theory," JPL Pasadena, DSN Progress Reports, vol. 42-44 (1978) pp. 114-116. (Month unknown). |