Wilmington, MA (PRWEB) February 05, 2015

Security Innovation is pleased to launch the NTRU Challenge today, February 5th, 2015. The NTRU Challenge will increase the understanding of the shortest vector problem in NTRU lattices while encouraging and stimulating further research into the security analysis of NTRU-based cryptosystems. The NTRU Challenge has been designed to provide additional information to users of NTRU public-key cryptosystems to aid in their selection of suitable key lengths for a desired level of security.

Access the challenge here: http://www.SecurityInnovation.com/NTRUChallenge

The Challenge asks participants to compute the NTRU private keys from the given list of public keys and associated system parameters. This is the type of problem faced by hackers who wish to defeat an NTRU-based cryptosystem. The Challenge consists of several individual NTRU challenges, targeted at different security levels, some of which can be solved in a day, some in a few months and some which are considered to be computationally intractable.

The prize for the first correct solution for the 11 lower security level challenges will be $ 1,000 each, with $ 5,000 being awarded per solution for the 16 higher security level challenges. Additionally, participants who arrive at innovative and unique solutions may be chosen for induction into the NTRU Hall of Fame, an award which includes an all-expenses paid trip to a major cryptographic conference.

NTRU is based on a completely different mathematical problem from RSA and ECC – resulting in higher performance and a superior ability to withstand quantum computing attacks, and better performance at similar security levels against classical computing attacks. It is industry-vetted and commercial-ready, unlike most other lattice-based algorithms.

Learn more about the NTRU Challenge at http://www.SecurityInnovation.com/NTRUChallenge.

About NTRU Crypto


NTRU was developed in 1996 by Brown University math professors who wanted to create a superior data protection for constrained embedded and consumer electronic devices. With the growth of big data and cyber security attacks, NTRU is increasingly appealing to organizations with high-volume ecommerce and hosted services transactions that want to provide end to end encryption without sacrificing security or speed. With its extremely small footprint, high speed, future-proof security, and adoption by IEEE and X9 standards, NTRU is poised to become the de facto crypto in the post-RSA world. It has been published, reviewed in scholarly journals, and presented at Crypto, Eurocrypt, RSA Conference, and PQCrypto (Post-Quantum Cryptography).

The new signature scheme pqNTRUSign can perform ~1000 verifications per second on a 2.7 GHz machine. In contrast, ECDSA over the popular NISTp256 curve is only capable of ~480 verifications per second, based on standard, open-source, benchmarking tool SUPERCOP http://bench.cr.yp.to/supercop.html. pqNTRUSign is provably secure against transcript attacks, like our PASS-RS. This new signature scheme illustrates our research team’s commitment to discovering fundamentally new constructs in public key cryptography and expanding the toolkit available to the cryptographic community.

NTRU Scrutiny:

    The Department of Electrical Engineering at the University of Leuven released a report entitled “Speed records for NTRU” in which they write: “NTRU is extremely fast on parallelizable processors.” (http://homes.esat.kuleuven.be/~fvercaut/papers/ntru_gpu.pdf)
    Since its introduction at Crypto ’96, NTRUEncrypt has been subject to constant scrutiny by top cryptographers, including a EuroCrypt ’97 security analysis by Adi Shamir and Don Coppersmith. NTRUEncrypt has been publicly presented at top cryptographic conferences, has been described through publication in refereed journals and conference proceedings, and has been reviewed by outside experts.
    The National Institute of Standards & Technology (NIST) accredited NTRU with being the most practical lattice-based cryptographic solution for post-quantum computing world (Perlner and Cooper, 2009)

About Security Innovation

A software security pioneer since 2002, Security Innovation is dedicated to protecting sensitive data in the world’s most challenging environments – whether on embedded systems, desktops, web applications, mobile devices, or in the cloud. Recognizing that software applications no longer exist in isolation, our clients are better prepared to anticipate, navigate and reduce software security risk regardless of technology or system complexity. There are more than a million licenses of Security Innovation’s eLearning products in use today and our embedded security products ship on tens of millions of systems each year. The company is privately held and is headquartered in Wilmington, MA USA. Visit the company at http://www.securityinnovation.com or follow on Twitter @SecInnovation.

Related Big Data Press Releases