Implementation of Number Theoretic Transform Unit (NTRU) Cryptography to Secure Text Files
DOI:
https://doi.org/10.59934/jaiea.v5i1.1682Keywords:
Cryptography, NTRU, Data Security, Encryption, Text FilesAbstract
This research aims to develop a text file security system using the NTRU cryptographic algorithm. This process begins with understanding the basic principles of NTRU, which uses a polynomial-based mathematical structure to generate key pairs. The public key is used to encrypt text files, while the private key is used to decrypt them. The research stages include generating public-private keys, followed by the process of encrypting text files into ciphertext and decrypting to restore the files to their original form. The result of this research is a system capable of effectively securing text files using NTRU encryption. This system is expected to contribute to improving digital information security, especially in protecting the confidentiality of text files. This research report will provide insights and detailed steps regarding the implementation of NTRU. This research is expected to be a guide for developers and researchers in implementing NTRU to strengthen broader data security.
Downloads
References
B. Harjito, T. Setyawati, and A. Wijayanto, “Comparative Analysis between Elgamal and NTRU Algorithms and their implementation of Digital Signature for Electronic Certificate,” Int. J. Electr. Comput. Eng. Syst., vol. 13, no. 9, pp. 729–739, 2022, doi: 10.32985/ijeces.13.9.1.
] A. Bhowmik and U. Menon, “Enhancing the NTRU Cryptosystem,” Int. J. Comput. Appl., vol. 176, no. 29, pp. 46–53, 2020, doi: 10.5120/ijca2020920320.
] L. C. Hardiaman Hulu, William, D. Sipayung, M. Hafis, and Christnatalis, “Analysis A parallel combination between the Number Theorists aRe Us, Riverst Shamir Adleman and Triple Data Encryption Standard methods for measuring the speed of document security,” J. Phys. Conf. Ser., vol. 1230, no. 1, 2019, doi: 10.1088/1742-6596/1230/1/012093.
] A. Karmakar, S. S. Roy, F. Vercauteren, and I. Verbauwhede, “Efficient finite field multiplication for isogeny based post quantum cryptography,” 2017, doi: 10.1007/978-3-319-55227-9_14.
] A. M. H. Pardede, M. Zarlis, and H. Mawengkang, “Optimization of Health Care Services with Limited Resources,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 9, no. 4, pp. 1444–1449, 2019, doi: 10.18517/ijaseit.9.4.8348.
] A. M. H. Pardede, Y. Maulita, and R. Buaton, “Application modeling ipv6 (internet protocol version 6) on e-id card for identification number for effectiveness and efficiency of registration process identification of population,” in Journal of Physics: Conference Series, 2018, vol. 978, . 1, doi: 10.1088/1742-6596/978/1/012017.
] P. Mohanty, U. Choppali, and E. Kougianos, “Everything you wanted to know about smart cities,” IEEE Consum. Electron. Mag., vol. 5, no. 3, pp. 60–70, 2016, doi: 10.1109/MCE.2016.2556879.
] W. A. Jabbar, W. K. Saad, and M. Ismail, “MEQSA-OLSRv2: A multicriteria-based hybrid multipath protocol for energy-efficient and QoS-aware data routing in MANET-WSN convergence scenarios of IoT,” IEEE Access, 2018, doi: 10.1109/ACCESS.2018.2882853.
] D. Niyigena, C. Habineza, and T. S. Ustun, “Computer-based smart energy management system for rural health centers,” 2016, doi: 10.1109/IRSEC.2015.7455005.
] F.-Z. Younsi, A. Bounnekar, D. Hamdadou, and O. Boussaid, “SEIR-SW, Simulation Model of Influenza Spread Based on the Small World Network,” Tsinghua Sci. Technol., vol. 20, no. 5, pp. 460–473, 2015.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Journal of Artificial Intelligence and Engineering Applications (JAIEA)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.







