Show simple item record

dc.contributor.advisorLarsson, Måns Daniel
dc.contributor.authorSolheim, Daniel Husebye
dc.date.accessioned2023-12-08T14:56:12Z
dc.date.available2023-12-08T14:56:12Z
dc.date.issued2023
dc.identifierno.usn:wiseflow:6843422:54681656
dc.identifier.urihttps://hdl.handle.net/11250/3106725
dc.description.abstractThe motivation of this thesis was to make a comparison of the time needed to successfully break an encryption using NTRUEncrypt from data acquired from a computer in 1998, to data from a computer in 2023. A program was coded to simulate and attack an encryption using the algorithm, and attacks similar to those presented in the article “”NTRU: A ring-based public key cryptosystem” was executed. The results are presented and compared to those in the article, and differences and similarities are discussed.
dc.description.abstract
dc.languageeng
dc.publisherUniversity of South-Eastern Norway
dc.titleEfficiency of attacks on NTRUEncrypt
dc.typeMaster thesis


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record