Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology
ISSN: 2321-3337 Impact Factor:1.521 Volume:1 Issue:2 Year: 12 September,2013 Pages:66-65
Public key infrastructure (PKI) offers essential services for managing digital certificates and encryption keys for people, programs, and systems, moreover the PKI helps to provide security services such as confidentiality, integrity, non-repudiation, and authentication. The certificate Authority(CA) is significant component in PKI; hence, this paper proposes to implement CA by NTRU public key cryptosystem algorithm, in term of key generation, signing X.509 certificates and verification of signature. Implementation has been developed using java language. Furthermore, the results have been compared with RSA in the same environment. As result of this work, NTRU can generate CA more efficiently comparing with RSA
Cryptography algorithm PK CA NTRU RSA Performance
[1] William Stallings ,“Cryptography and Network Security Principles and Practices”, Fourth Edition, Publisher: Prentice Hall,Pub Date: November 16, 2005. [2] JoelWeise ,“Public Key Infrastructure Overview”, SunPSSM Global Security Practice,Sun BluePrints™ OnLine - August 2001. [3] Anoop MS,“Public Key Cryptography Applications Algorithms and Mathematical Explanations”,Tata ElxsiLtd, India. [4] http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber =4800404&contentType=Standards. [5] RSA Laboratories PKCS #1 v2.1,” RSA Cryptography Standard”,June 14, 2002, http://www.rsa.com/rsalabs/node.asp?id=2125 [6] Haodong Wang, Bo Sheng, and Qun Li “TelosB Implementation of Elliptic Curve Cryptography over Primary Field”, WM-CS Technical Report (WM-CS-2005). [7] Hoffstein J., Lieman D., Pipher J.,Silverman J. “NTRU: A Public Key Cryptosystem”, NTRU Cryptosystems, Inc.(www.ntru.com). [8] Dr. Abdul Monem S.Rahma & Dr. Qasim Mohammed Hussein, “A New Attack on NTRU Public Key Cryptosystem Depend on Using Public Key and Public Information”, Computer Science Department, University of Technology / Baghdad,Eng.& Tech. Journal,Vol.28, No.6, 2010. [9] IEEE 802.15.4 TelosB Mote with Sensor Suite. Crossbow Technology, I n c. [10] Challa Narasimham, Jayaram Pradhan ,” EVALUATION OF PERFORMANCE CHARACTERISTICS OF CRYPTOSYSTEM USING TEXT FILES”, Dept of Computer Science, Berhampur University, Orissa, India, Journal of Theoretical and Applied Information Technology, 2008 JATIT. [11] Kurosawa K, Okada K, Tsujii S (1995). Low exponent attack against elliptic curve RSA. Adv. Cryptol.— Asiacrypt’, 95: 376-383. [12] S.Al-Bakri, M. L.Kiah, A. A. Zaidan,B. B. Zaidan, and G.Alam3,” Securing peer-to-peer mobile communications using public key cryptography: New security strategy”, Malaysia. International Journal of the Physical Sciences Vol. 6(4), pp. 930-938, 18 February, 2011,Available online at http://www.academicjournals.org/IJPS. [13] J.Hermans,F.Vercauteren, and B.Preneel, ”Speed records for NTRU”,2010. [14] Ali MERS,”HE COMPARATIVE PERFORMANCE ANALYSIS OF LATTICE BASED NTRU CRYPTOSYSTEM WITH OTHER ASYMMETRICAL CRYPTOSYSTEMS”, Thesis Submitted to the Graduate School of Engineering and Science of A_zmir Institute of Technology, September 2007. [15] J.Hoffstein,J.Pipher,J.H.Silverman,”NTRU: A Ring-Based Public Key Cryptosystem”, 1998 .(www.ntru.com). [16] from bouncycastle.org.http://www.bouncycastle.org/index.ht ml.