Low-cost implementations of NTRU for pervasive security

NTRU is a public-key cryptosystem based on the shortest vector problem in a lattice which is an alternative to RSA and ECC. This work presents a compact and low power NTRU design that is suitable for pervasive security applications such as RFIDs and sensor nodes. We have designed two architectures,...

Full description

Saved in:
Bibliographic Details
Published in2008 International Conference on Application-Specific Systems, Architectures and Processors pp. 79 - 84
Main Authors Atici, A.C., Batina, L., Junfeng Fan, Verbauwhede, I., Yalcin, S.B.O.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.07.2008
Subjects
Online AccessGet full text
ISBN9781424418978
1424418976
ISSN1063-6862
DOI10.1109/ASAP.2008.4580158

Cover

Abstract NTRU is a public-key cryptosystem based on the shortest vector problem in a lattice which is an alternative to RSA and ECC. This work presents a compact and low power NTRU design that is suitable for pervasive security applications such as RFIDs and sensor nodes. We have designed two architectures, one is only capable of encryption and the other one performs both encryption and decryption. The strategy for the designs includes clock gating of registers, operand isolation and precomputation. This work is also the first one to present a complete NTRU design with encryption/decryption circuitry. Our encryption-only NTRU design has a gate-count of 2.8 kgates and dynamic power consumption of 1.72 muW. Moreover, encryption-decryption NTRU design consumes about 6 muW dynamic power and consists of 10.5 kgates.
AbstractList NTRU is a public-key cryptosystem based on the shortest vector problem in a lattice which is an alternative to RSA and ECC. This work presents a compact and low power NTRU design that is suitable for pervasive security applications such as RFIDs and sensor nodes. We have designed two architectures, one is only capable of encryption and the other one performs both encryption and decryption. The strategy for the designs includes clock gating of registers, operand isolation and precomputation. This work is also the first one to present a complete NTRU design with encryption/decryption circuitry. Our encryption-only NTRU design has a gate-count of 2.8 kgates and dynamic power consumption of 1.72 muW. Moreover, encryption-decryption NTRU design consumes about 6 muW dynamic power and consists of 10.5 kgates.
Author Yalcin, S.B.O.
Batina, L.
Atici, A.C.
Verbauwhede, I.
Junfeng Fan
Author_xml – sequence: 1
  givenname: A.C.
  surname: Atici
  fullname: Atici, A.C.
  organization: Inst. of Sci. & Technol., Istanbul Tech. Univ., Istanbul
– sequence: 2
  givenname: L.
  surname: Batina
  fullname: Batina, L.
– sequence: 3
  surname: Junfeng Fan
  fullname: Junfeng Fan
– sequence: 4
  givenname: I.
  surname: Verbauwhede
  fullname: Verbauwhede, I.
– sequence: 5
  givenname: S.B.O.
  surname: Yalcin
  fullname: Yalcin, S.B.O.
BookMark eNpVUNtKw0AUXLEFm9oPEF_2BxLP3s8-huINgoq2z2Ubd2GluZCNlf69AfvivAwzMMMwGZm1XesJuWFQMAb2rvwo3woOgIVUCEzhBVlZg0xyKRlaVJf_tMEZWTDQIteo-ZxkU9RYQOT2imQpfQFwIzQuiKm6n7zu0khj0x9849vRjbFrE-0Cfdm8b2noBtr74ehSPHqafP09xPF0TebBHZJfnXlJtg_3m_VTXr0-Pq_LKo_MqDFX6I01sJ-gJKJ2AaSzIWjnjNFOunraxRnC3jimJeOfGCDU2kqhJ0eIJbn9643e-10_xMYNp935BPELR7lMow
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ASAP.2008.4580158
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9781424418985
1424418984
EndPage 84
ExternalDocumentID 4580158
Genre orig-research
GroupedDBID 29P
6IE
6IK
6IL
AAJGR
AAWTH
ADZIZ
AFFNX
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IPLJI
OCL
RIE
RIL
RNS
ID FETCH-LOGICAL-i175t-58e7970bbbb54886af04a9ff6aa776a4ac0792180b7a16412d8f0fc694367a133
IEDL.DBID RIE
ISBN 9781424418978
1424418976
ISSN 1063-6862
IngestDate Wed Aug 27 02:23:08 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2007908829
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-58e7970bbbb54886af04a9ff6aa776a4ac0792180b7a16412d8f0fc694367a133
PageCount 6
ParticipantIDs ieee_primary_4580158
PublicationCentury 2000
PublicationDate 2008-July
PublicationDateYYYYMMDD 2008-07-01
PublicationDate_xml – month: 07
  year: 2008
  text: 2008-July
PublicationDecade 2000
PublicationTitle 2008 International Conference on Application-Specific Systems, Architectures and Processors
PublicationTitleAbbrev ASAP
PublicationYear 2008
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0027368
ssj0000453411
Score 1.5163463
Snippet NTRU is a public-key cryptosystem based on the shortest vector problem in a lattice which is an alternative to RSA and ECC. This work presents a compact and...
SourceID ieee
SourceType Publisher
StartPage 79
SubjectTerms Clocks
Computer architecture
Cryptography
Logic gates
Polynomials
Power demand
Registers
Title Low-cost implementations of NTRU for pervasive security
URI https://ieeexplore.ieee.org/document/4580158
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1JTwIxFG6Qk15cwLinB48WOkyny5EYCTFCiELCjbSlTYiRITLExF_v6yygxoNzaGZ6mWmn7du-7z2EbhPpO456SjqOGQIrhBFpoRGcGulsIuY5mnAw5P0Je5wm0xq623JhnHM5-My1wm0ey5-ndhNcZW2WwHmayD20JyQvuFpbfwqoJnAgRztjKy5pcDwmgQVRkboiCQK4yvVUPssy3BlR1e6-dEcFxLJ824-yK7nU6R2iQfW9BdjktbXJTMt-_krl-N8BHaHmjt-HR1vJdYxqbnmCDr6lJmwg8ZR-EJuuM7x4qyDm-RLFqcfD8fMEg7aLV8GlGwDweF3WwWuiSe9hfN8nZZEFsgDNISOJdEIJauAC40Vy7SnTynuutRBcM22pUKAHUCM0mFZRZy499ZYrFnPoieNTVF-mS3eGsApRT9jgxgrOEko1ZUzHVkdWGSOMO0eNMAWzVZFHY1aO_uLv7ku0X2AzAjT2CtWz9427BgUgMzf5n_8CLTem6A
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFH9BPKgXP8D4bQ8eHXSsXzsSI0EFQhQSbqQtbUKMjMiIiX-97TZAjQd3aLZeti6vfV-_33sAN1TYhsEWBw1DVOAkhARCu4EzrITRlE8yNGG3x9pD8jiioxLcrrkwxpgMfGZq_jbL5U8SvfShsjqh7jylYgu2KSGE5mytdUTFGSfuSA437lZUEOFYFHgexIrWFQqnglfVnopnUSQ8QxzXmy_Nfg6yLN73o_FKpnda-9BdfXEON3mtLVNV05-_ijn-d0kHUN0w_FB_rbsOoWRmR7D3rThhBXgn-Qh0skjR9G0FMs-EFCUW9QbPQ-TsXTT3QV0PgUeLohNeFYat-8FdOyjaLARTZzukARWGxxwrdzn3RTBpMZGxtUxKzpkkUmMeO0sAKy6dcxU2JsJiq1lMIuZmougYyrNkZk4AxT7v6ba40pwRirHEhMhIy1DHSnFlTqHif8F4nlfSGBerP_t7-hp22oNuZ9x56D2dw26O1PBA2Qsop-9Lc-nMgVRdZVLwBSUdqjU
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2008+International+Conference+on+Application-Specific+Systems%2C+Architectures+and+Processors&rft.atitle=Low-cost+implementations+of+NTRU+for+pervasive+security&rft.au=Atici%2C+A.C.&rft.au=Batina%2C+L.&rft.au=Junfeng+Fan&rft.au=Verbauwhede%2C+I.&rft.date=2008-07-01&rft.pub=IEEE&rft.isbn=9781424418978&rft.issn=1063-6862&rft.spage=79&rft.epage=84&rft_id=info:doi/10.1109%2FASAP.2008.4580158&rft.externalDocID=4580158
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1063-6862&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1063-6862&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1063-6862&client=summon