logo

Ring-LWE Ciphertext Compression and Error Correction

   

Added on  2023-05-30

4 Pages2104 Words416 Views
Running head: Ring-LWE Ciphertext Compression and Error Correction
Ring-LWE Ciphertext Compression and Error Correction
Name of the student
Name of the university
Author note

Introduction
The Literature “Ring-LWE Ciphertext
Compression and Error Correction”, presented by
Markku-Juhani O. Saarinen is based on tools for
lightweight post-quantum cryptography. Usually,
cryptosystems uses private or public keys to
encrypt and decrypt cypher text. In this literature
author describes the about some specific lattice
based public key cryptosystems which capable of
transforming cipher text from one lattice to another
without utilizing the any public or private key
knowledge. The working mechanism of such
cryptography is explored with the properties of
lattice transmission. Author used a different
approach by transforming cypher text to achieve
Ring lightweight texts. The other approach is
considered effective decryption of ultra-lightweight
execution marks such as Smart Cards, Internet of
Things and RFID applications [1]. These approach
needs no modification of original encryption
process and any security restrictions. These are
very unique flexibility which can be achieved
through real application based on the lattice-based
cryptography.
Structure:
The Author and publication were able to
provide a professional structure which make the
paper very easy to read and follow the contents
precisely. The writings are presented and divided
into several heading and sub headings along with
the some table and visualizations which makes the
paper more precise and understanding the concept
effectively. The heading of the report is self-
explanatory and the abstract sparks the description
of the Ring-LWE Cryptography. After listed some
of the keywords, author provided a broad
description on the topic which includes
Polynomial-time Quantum algorithms, quantum
technologies, future asymmetric requirement and
other key technology associated with the Ring-
LWE Cryptography [2]. The structure of the paper
is also summarized in the below section of the
introduction. After a basic discussion on several
technology in the introduction section, the broad
description and mechanism is described in the next
sections. They describes the Ring-LWE public key
encryption scheme Lindner-Peikert in the second
section while in section there cypher text
compression technique is introduced. In the next
section, a constant-time error correction as novel
auxiliary algorithms is described along with the
application to authentication, Related Hardware
Considerations, Security and Failure Rate
Estimates, Side-Channel Security and lightweight
implementation [3]. At last the section five draw a
small conclusion on the description. Author also
used forty references to support his approaches
which are also in texted accordingly.
Summary:
Markku-Juhani O. Saarinen were focused
on some certain tools to explore and construct
trunc8, a concrete Ring-LWE encryption and
authentication system. The whole discussion is
around this key area. Author also states in the
literature that the probability of the decryption error
can be increased due to the Cipher text
compression. Author also provide a basic
description of the XECC which is code for fast
multi-error correction. This code enable the
constant time implementation in software. Author
also believes that the error could be measured and
analyzed which will be very useful to derive failure
bonds for n-bit error correction. Author also
performs an experiment on public key encryption
along with an 8 bit AVR target authentication
system. The result shows that the performance
results exceeds the elliptic curve [4]. The result is
also compared with RSA based proposal along with
implementation of Cortex M0 and similar result has
been found with same security level. Author
analyze the result performance along with security
and implementation. The literature shows that
lattice compression technique deduces cipher text
size by more than forty percent at with similar
security level. Previously unreachable ultra-
lightweight platforms are also accessible while
enabling the public key cryptography.
RING-LWEPUBLICKEYENCRYPTION
Author provides a well-structured Ring-
LWE encryption algorithm, “Lindner-Peikert”
which is mentioned in the several light weight
targets in both software and hardware. Firstly,
Author defines the key conventions and notation.
The implementation schema is referred as trunc8,
encompassing of a certain set of parameters and
algorithms. The arithmetic calculation is presented
with several modulo and coefficient. Next, a key is
generated based on global parameter which is
shared among the huge number of public keys [5].
The n-bit strings are the private keys and public
keys. Then the encryption is conducted based on
the n-bit message where author added 0 or 0.5 to
coefficients. The decryption can be done while
decoding the cypher text. Author presents the
following ring multiplication for decryption:
Input: Ciphertext (u,v) and private key s.
1: m ← v
2: for i = 0,1,...n−1 do
3: if si = 1 then
4: for j = 0,1,...,n−i−1 do
5: m[i + j] ← m[i + j] + u[j]
6: end for
7: for j = n−i,...,n−1 do

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ring-LWE Ciphertext Compression and Error Correction - A Literature Review
|1
|443
|369