Efficiency of attacks on NTRUEncrypt
Abstract
The motivation of this thesis was to make a comparison of the time needed to successfully break an encryption using NTRUEncrypt from data acquired from a computer in 1998, to data from a computer in 2023. A program was coded to simulate and attack an encryption using the algorithm, and attacks similar to those presented in the article “”NTRU: A ring-based public key cryptosystem” was executed. The results are presented and compared to those in the article, and differences and similarities are discussed.