NTRU

The NTRU assumption is a lattice-based hardness assumption over polynomial rings, introduced alongside the NTRU public-key cryptosystem — HPS98. The public key looks like a ratio of two short polynomials, and hardness asserts that recovering (or ) from alone is computationally infeasible.

Assumption

The assumption is parameterized by a degree , a large modulus , a small modulus (typically ), and bounds on the number of nonzero coefficients of the secret polynomials. All arithmetic takes place in the ring , with reductions modulo taken coefficient-wise into .

Key generation. Sample short polynomials with coefficients in (with ones and negative ones for , and ones and negative ones for ). Require that is invertible modulo both and . Set

The public key is ; the private key is .

NTRU Problem

Given only , the NTRU problem asks to recover short polynomials satisfying the same relation.

\begin{algorithm}
\algname{Game}
\caption{$\Game^{\text{ntru}}_{n,q,d_f,d_g,\calA}(\secpar)$}
\begin{algorithmic}
\State Sample short $f, g \in R$ with $\lVert f \rVert, \lVert g \rVert \le 1$ coefficientwise
\State $h \gets g \cdot f^{-1} \bmod q$
\State $(\hat{f}, \hat{g}) \gets \calA(1^\secpar, n, q, h)$
\Return $[h \cdot \hat{f} \equiv \hat{g} \pmod{q}\ \wedge\ \hat{f}, \hat{g}\ \text{are short}]$
\end{algorithmic}
\end{algorithm}

NTRU is hard for parameters if for all efficient ,

is negligible.

  • Under a suitable choice of parameters, the NTRU problem reduces to the Ring-LWE problem: Ring-LWE hardness implies NTRU hardness — SS11
  • NTRU implies PKEHPS98

Variations

NTRU Prime

NTRU Prime replaces the ring with for a prime , eliminating the small subgroup structure of that can be exploited by certain attacks.

NTRU Encrypt / NTRUSign

The original NTRU submissions to NIST PQC standardization include NTRUEncrypt (a key encapsulation mechanism) and the historically proposed NTRUSign (a signature scheme, later broken and withdrawn).

Attacks

  • Lattice reduction (BKZ): the NTRU public key defines a -dimensional lattice containing short vectors ; BKZ-style algorithms attack this lattice. Parameter sizes have been revised upward over time to maintain security margins against improved BKZ variants.
  • Meet-in-the-middle: applies when or is small relative to .
  • NTRU has no known quantum speedup beyond the generic square-root speedup of Grover’s algorithm applied to brute-force lattice search.