Don's Pages and my Music

Sunday, November 24, 2013

There's a New Public Key in Town - Open Source NTRU Public Key Cryptography Algorithm

There's a New Public Key in Town. NTRUOpenSourceProject/ntru-crypto and it's Free and Open Source. You can get it at GitHub...

Don

ntru-crypto

Open Source NTRU Public Key Cryptography Algorithm and Reference Code

Key Contacts:

  • Dr. William Whyte
  • Dr. Mark Etzel
  • Mr. Peter Jenney

Contacts may be reached by sending mail to ntru-crypto@securityinnovation.com

Project Overview

Security Innovation, Inc., the owner of the NTRU public key cryptography system, made the intellectual property and a sample implementation available under the Gnu Public License (GPL) in 2013 with the goal of enabling more widespread adoption of this superior cryptographic technology. The system is also available for commercial use under the terms of the Security Innovation Commercial License.

NTRU represents a significant improvement in the Public Key cryptography world—it’s faster, stronger and smaller than virtually any other system in use and it’s quantum computer resistant, making it the best choice for current projects with lifetimes that extend into the post quantum computer age.

"The open source licensing of the NTRU crypto system will make it even easier for wide-spread adoption of our X9.98 standard, allowing Financial Services companies to protect their important financial transactions", said executive director Cynthia Fuller of Accredited Standards Committee X9 -Financial Industry Standards.

For additional overview information click https://www.securityinnovation.com/products/encryption-libraries/ntru-cryptography.html

FAQ

What is NTRU?

NTRU is a lattice-based public key cryptosystem from Security Innovation and the leading alternative to RSA and Elliptic Curve Cryptography (ECC) due to its higher performance and resistance to attacks from quantum computers. NTRU was developed in 1996 as a visionary solution to cyber security challenges for the twenty-first century. NTRU is based on a mathematical problem called the “Approximate close lattice vector problem” and comprises three algorithms: NTRUEncrypt, NTRUSign, and PASSSign. It has been reviewed and published in scholarly journals and presented at Crypto, Eurocrypt, and RSA, and has been adopted in IEEE and X9 standards

What makes NTRU fast?

Because it is based on different math from RSA and ECC, the NTRU algorithm has different cryptographic properties. At comparable cryptographic strength, NTRU performs costly private key operations much faster than RSA or ECC. In addition, NTRU's comparative performance increases with the level of security required. As key sizes increase by a factor of n, RSA's operations/second decrease by about n3 whereas NTRU's decrease at n2.

Which applications/industries would benefit most from NTRU?

Any application that requires fast performance (large amounts of data to be protected in a short amount of time) and/or high-levels of security for the next 10 years would benefit from the NTRU solution. Furthermore, the small code size (small footprint) of the NTRU implementations make it suitable for even small embedded processors.

These applications include Payment Systems, secure messaging and email, mobile eCommerce, Healthcare, Near Field Communications (NFC), Vehicle Communications (V2V, V2I), Military/Aerospace, Web Browsers and Servers, Remote Backup Solutions, Voice over IP (VoIP), Online Presentations/Virtual Classrooms, Infrastructure (Railway switching, Traffic lights, etc), Utility meters and Cloud Provides/Datacenters.

What makes NTRU quantum computing resistant?

NTRU is currently not known to be vulnerable to algorithms based on quantum computers, unlike RSA or its other challenger, Elliptic Curve Cryptography. A working, full-scale quantum computer running the process known as “Shor’s algorithm” would be able to break RSA or ECC of any practical size in negligible time. In contrast, NTRU’s security is reduced only slightly by quantum computers. This has been validated by external reviewers such as the National Institute of Standards and Technology (NIST), who in a 2009 survey referenced NTRU as justification for the statement that “there are viable alternatives for both public key encryption and signatures that are not vulnerable to Shor’s Algorithm”.

What business problem does NTRU solve?

We're providing a data protection solution that can help ensure long-term privacy of internet and financial transactions, something that has been compromised lately with RSA/ECC. Industry needs a better and more transparent secure data communications solution, both now and in the future.

NTRU can improve communication efficiency while enhancing data security. The most commonly used encryption solution (RSA) is painfully slow, especially with the larger keys that are required for acceptable security standards. Rather than slow down data transmission, businesses today often choose to not protect all of their data.

NTRU on the other hand, provides much stronger security with substantially better performance. Higher performing NTRU encryption requires fewer servers while still protecting (encrypting) all data. If you are encrypting all transactions with a secure algorithm, the damage caused by intrusions can be significantly lessened. Secure encryption reduces the chances of costly data breaches, improves privacy and compliance and saves money by reducing the need for some intrusion detection systems and other security solutions.

What is NTRU's history and peer review?

NTRU was invented in 1996 based on a completely different mathematical problems from RSA and Elliptic Curve called the “Approximate close lattice vector problem.” It has been published, reviewed in scholarly journals, and presented at Crypto, Eurocrypt, RSA. The NTRU approach to lattice-based cryptography, which uses a particular type of lattice known as an “ideal lattice”, has been a catalyst for the development of other efficient lattice-based cryptographic primitives, most notably Gentry’s approach to fully homomorphic encryption.

There have been more than 20 reports (https://securityinnovation.com/security-lab/crypto/402.-scrutiny-ntru-encrypt.html) issued regarding the NTRU algorithm over the past 16 years. This research came from academic institutions, including Brown University, L’École normale supérieure (ENS), University of California San Diego, and Shanghai Jiaotong University. This scrutiny has led to even stronger parameter choices and hardened implementations. Now that NTRU is available under an open source license, the algorithm will receive even more testing.

How fast is NTRU?

At comparable cryptographic strength, NTRU performs private key operations 20x to 200x faster than openSSL RSA. Faster means less processing time (cheaper) and offers the ability to encrypt more data (more secure). In addition, as key sizes (security levels) increase by n, RSA's operations/second decrease at a rate of n3 whereas NTRU's decrease at n. A University of Leuven (http://link.springer.com/chapter/10.1007%2F978-3-642-11925-5_6) report states "NTRU is extremely fast on parallelizable processors." Ari Juels, Chief Scientist, RSA Labs stated, "[NTRU] is considerably faster; that is something we acknowledge" (http://www.networkworld.com/news/2011/042011-ntrue-algorithm-x9.html)

Security  NTRU Key Size     ECC   RSA     NTRU Ops/Sec.   ECC   RSA  Level     Std.    Opt.       Key Size     Std.    Opt.     Ops/Sec.  112       5951    4411      224   2048    2284    10638   951     156  128       6743    4829      256   4096    1896    9901    650     12  192       9757    6523      384   7680    1034    6849    285     8  256       12881   8173      512   15360   638     5000    116     1  

Much of the performance impact in SSL comes from the use of public key cryptography, which is used to initiate new sessions (session “handshakes”). During session handshakes, the main public key activity consuming server resources is decryption of the session key provided by each client. Performance increases in decryption have a significant impact on server performance. At current levels of activity, for a server using NTRU, the server time spent peforming public key cryptography will become negligible.

Has NTRU's speed been verified by third parties?

Yes. The Department of Electrical Engineering at the University of Leuven released a report entitled Speed records for NTRU. in which they write: "NTRU is extremely fast on parallelizable processors."

Has NTRU been standardized?

NTRU has been adopted by two standards bodies, IEEE and the Financial Services Industry’s Accredited Standards Committee X9. a. IEEE P1363 Working Group for Standards In Public Key Cryptography (http://grouper.ieee.org/groups/1363/lattPK/index.html). b. X9.98 Lattice-Based Polynomial Public Key Establishment Algorithm for the Financial Services Industry. “This standard specifies the use of the NTRUEncrypt algorithm to establish secure communications for financial services. … X9.98 marks a particularly significant step forward in improving the robustness of systems based on X9 standards: it allows the deployment of systems that are protected against quantum computing attacks as well as against classical attacks.”

Additionally, an Internet Draft standardizing NTRU-based ciphersuites in Transport Layer Security (TLS) is currently progressing through the Internet Engineering Task Force (IETF)

Is NTRU Patented?

Yes. The patents will still be enforced but may be used under the GPL, i.e. under the condition that any work that uses them is also made available under the GPL. The patents and the code implementations are also available under standard commercial terms.

Why has NTRU been open source licensed?

By offering NTRU source code and patents under the Gnu Public License (GPL) v2, we are intending to remove barriers to widespread deployment. We want to enable the developers of the open-source software that powers the internet to test, use, deploy, and start transitioning to fast, future-proof cryptography. Recent revelations and speculation about NSA influence on both crypto algorithms and crypto implementations have made it clear that the security community desperately needs alternatives to existing crypto solutions.

Making NTRU open-source also removes barriers to testing of both the algorithm and the implementation. Open scrutiny and testing is the only way to instill confidence in any encryption solution.

Furthermore, the open source licensing allows users to implement the NTRU algorithm in other languages and for other operating systems beyond those we currently support.

Are there any commercial licenses available?

For commercial (not open source) applications, Security Innovation offers a commercial license (see repository) that is not limited to use in open source applications only.

Is replacing RSA with NTRU the best solution moving forward?

We don’t think a single encryption solution is the best idea, regardless of the algorithm. Double encryption using two fast algorithms such as NTRU plus another post-quantum crypto algorithm, or even ECC, would provide far greater security at a considerable higher performance than RSA alone today. Our Chief Scientist, William Whyte, wrote a blog post on this subject. (http://blog.securityinnovation.com/blog/2013/08/king-rsa-cryptos-successor-why-we-need-to-move-away-from-a-monarchy.html)

Doesn’t open sourcing make NTRU implementations more vulnerable to hackers?

On the contrary: NTRU has been tested by several external groups in addition to the commercial implementations over the past 10 years. By exposing it to even more users, the strength of the algorithm will be proven and the implementations will be strengthened. Hiding behind a veil of patents and licensing does not equate to greater or lesser security. The underlying strength of the algorithm is unaffected by the chosen licensing model. In the event of any vulnerability being discovered in a particular implementation of the crypto algorithm, open source software allows users to build in short-term mitigation defenses to protect themselves until the vulnerability is fixed. We feel this situation is better than leaving users exposed and unaware.

Where can I get more technical information

Go to https://www.securityinnovation.com/security-lab/crypto.html which is where we’ve collected a boatload of content on NTRU including NIST reports, the math and other very useful stuff.


Downlaod here...
https://github.com/NTRUOpenSourceProject/ntru-crypto

Open Source NTRU Public Key Cryptography Algorithm - NTRU public key crypto released to open source community


NTRU public key crypto released to open source community
NTRUOpenSourceProject/ntru-crypto · GitHub
Linux Today - NTRU public key crypto released to open source community
RSA and ECC Keys
Bcrypt - Blowfish File Encryption
Best Free File Encryption Utility
DonsDeals: Clean old host keys - Deleting an RSA host key in Fedora Linux
security - How to remove strict RSA key checking in SSH and what's the problem here? - Server Fault
Deleting an RSA host key By Forwest Media
File Encryption general info
Megabad: A quick look at the state of Mega’s encryption | Ars Technica
DJB's encryption
Freezing Android to crack the encryption
Disk Encryption in Fedora 16
aesutil - Advanced Encryption Standard
Lavabit Founder Takes To Kickstarter To Open Source A New End-To-End Encryption Messaging Protocol | TechCrunch
Cypherix Cryptainer LE Free Encryption Software
Dark Mail Alliance aims to offer Email 3.0, with built-in end-to-end encryption | LinuxBSDos.com
Linux Today - Open-source project, Crypton, seeks to make encryption easier
Linux Today - Lavabit Founder Takes To Kickstarter To Open Source A New End-To-End Encryption Messaging Protocol
Linux Today - A crowd funded modern, fast web-mail client with user-friendly encryption and privacy features.
Linux Today - Dark Mail Alliance aims to offer Email 3.0, with built-in end-to-end encryption
Google Expedites Data Encryption | Maximum PC
Legislation Seeks to Bar N.S.A. Tactic in Encryption - NYTimes.com
Open-source project, Crypton, seeks to make encryption easier | PCWorld
Software Protection Initiative - Encryption Wizard download public
Does using encryption make you a bigger target for the NSA? | TechRepublic
Best Free Encryption Utility for Cloud Storage
Best Free File Encryption Utility
Comparing TrueCrypt and AxCrypt As The Best Free Encryption Utilities
NSA and GCHQ unlock privacy and security on the internet | World news | The Guardian
Whisper open-sources Android text-encryption app • The Register
TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows 7/Vista/XP, Mac OS X and Linux
NSA defeats most Web privacy encryption, Snowden documents indicate - UPI.com
This Cute Chat Site Could Save Your Life and Help Overthrow Your Government | Threat Level | Wired.com
RSA and ECC Keys
Bcrypt - Blowfish File Encryption
Best Free File Encryption Utility
DonsDeals: Clean old host keys - Deleting an RSA host key in Fedora Linux
security - How to remove strict RSA key checking in SSH and what's the problem here? - Server Fault
Deleting an RSA host key By Forwest Media

No comments:

Post a Comment