A quantum proof (post-quantum) implementation of the NTRU algorithm
Project description
Quantum-Proof NTRU Algorithm in Python
General Overview
This is a Python implementation of the NTRUEncrypt algorithm, which is a lattice-based public key encryption scheme that is believed to be resistant to attacks by quantum computers. The implementation is based on the NTRU Prime 4591 parameter set, which provides a security level of approximately 128 bits. The purpose of this implementation is to provide a quantum-proof encryption scheme that can be used to secure sensitive data.
Requirements
The implementation requires the following Python packages:
- NumPy
To install these packages, you can use the following command:
pip install numpy sympy
You can install it with the reuirements too:
pip install -r requirements.txt
PyPi Usage
This project can be installed with pip for easy usage.
Installation
pip install pq-ntru
Usage
import pq_ntru
pq_ntru.generate_keys("key_filename", mode="moderate")
enc = pq_ntru.encrypt("key_filename", "message")
dec = pq_ntru.decrypt("key_filename", enc)
Other Usage
To use the implementation, you can import the ntru module and use the encrypt and decrypt functions to encrypt and decrypt messages, respectively.
git clone https://github.com/protdos/pq-ntru
import NTRU2
NTRU2.generate_keys("test", mode="moderate")
enc = NTRU2.encrypt("test", "hello world")
dec = NTRU2.decrypt("test", enc)
print("Decrypted message:", dec)
Implementation Details
The implementation is based on the NTRU Prime 4591 parameter set, which uses a polynomial ring with coefficients in the finite field Z/4591Z. The encryption and decryption algorithms use the NTRU lattice-based encryption scheme, which involves computing a polynomial that is close to a certain lattice point.
The implementation uses the following steps for encryption:
Convert the message to a polynomial with coefficients in the range [-1, 1].
Generate a random polynomial with coefficients in the range [-1, 1] and compute its inverse modulo a certain polynomial.
Compute the product of the message polynomial and the inverse polynomial modulo a certain polynomial, resulting in a new polynomial.
Add noise to the new polynomial to obtain the ciphertext polynomial.
The implementation uses the following steps for decryption:
Compute the product of the ciphertext polynomial and the private key polynomial modulo a certain polynomial, resulting in a new polynomial.
Recover the message polynomial by computing the inverse of the new polynomial modulo a certain polynomial.
Basic Info over NTRU
NTRUEncrypt is a public key cryptosystem that is based on the mathematical problem of finding a short vector in a lattice. It is believed to be resistant to attacks by quantum computers due to its use of lattice-based cryptography. The security of the system is based on the difficulty of finding short vectors in the lattice, which is a problem that is believed to be hard even for quantum computers.
NTRU was first proposed in 1996 by Hoffstein, Pipher, and Silverman. Since then, several variants of the algorithm have been proposed, including NTRUEncrypt and NTRU Signature. NTRUEncrypt is used for public key encryption, while NTRU Signature is used for digital signatures.
Benefits of NTRU
NTRUEncrypt has several benefits over other public key cryptosystems, including:
-
Resistance to attacks by quantum computers
-
High performance
-
Small key sizes
-
Low bandwidth requirements
-
Robustness against side-channel attacks
Conclusion
This implementation provides a quantum-proof encryption scheme that can be used to secure sensitive data. The NTRU algorithm is believed to be resistant to attacks by quantum computers and has several benefits over other public key cryptosystems. The implementation is based on the NTRU Prime 4591 parameter set and provides a security level of approximately 128 bits.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.