Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.

Well done!

You have completed (UPI) Chapter 16: Emerging Technologies in Cybersecurity!

Instruction

16.2.3 NTRU Cryptography

Cryptographic algorithms such as FALCON, which use NTRU (Nth degree of TRUncated polynomial ring) arithmetic, are based on lattice cryptography. The parameters of the scheme include a large prime number 𝑁, a large number 𝑞, and a small number 𝑝, both used for modulo arithmetic. Two numbers, df and dg, are used to truncate the polynomials 𝑓(i) and 𝑔(i). The key generation cycle for client devi...