Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where John M. Schanck is active.

Publication


Featured researches published by John M. Schanck.


the cryptographers’ track at the rsa conference | 2017

Choosing Parameters for NTRUEncrypt

Jeffrey Hoffstein; Jill Pipher; John M. Schanck; Joseph H. Silverman; William Whyte; Zhenfei Zhang

We describe a method for generating parameter sets, and calculating security estimates, for NTRUEncrypt. Our security analyses consider lattice attacks, the hybrid attack, subfield attacks, and quantum search. Analyses are provided for the IEEE 1363.1-2008 product-form parameter sets, for the NTRU Challenge parameter sets, and for two new parameter sets. These new parameter sets are designed to provide \(\ge 128\)-bit post-quantum security.


applied cryptography and network security | 2014

Practical Signatures from the Partial Fourier Recovery Problem

Jeffrey Hoffstein; Jill Pipher; John M. Schanck; Joseph H. Silverman; William Whyte

We present PASS RS , a variant of the prior PASS and PASS-2 proposals, as a candidate for a practical post-quantum signature scheme. Its hardness is based on the problem of recovering a ring element with small norm from an incomplete description of its Chinese remainder representation. For our particular instantiation, this corresponds to the recovery of a vector with small infinity norm from a limited set of its Fourier coefficients.


International Workshop on Post-Quantum Cryptography | 2014

Transcript Secure Signatures Based on Modular Lattices

Jeffrey Hoffstein; Jill Pipher; John M. Schanck; Joseph H. Silverman; William Whyte

We introduce a class of lattice-based digital signature schemes based on modular properties of the coordinates of lattice vectors. We also suggest a method of making such schemes transcript secure via a rejection sampling technique of Lyubashevsky (2009). A particular instantiation of this approach is given, using NTRU lattices. Although the scheme is not supported by a formal security reduction, we present arguments for its security and derive concrete parameters based on the performance of state-of-the-art lattice reduction and enumeration techniques.


international conference on selected areas in cryptography | 2016

Estimating the Cost of Generic Quantum Pre-image Attacks on SHA-2 and SHA-3

Matthew Amy; Olivia Di Matteo; Vlad Gheorghiu; Michele Mosca; Alex Parent; John M. Schanck

We investigate the cost of Grover’s quantum search algorithm when used in the context of pre-image attacks on the SHA-2 and SHA-3 families of hash functions. Our cost model assumes that the attack is run on a surface code based fault-tolerant quantum computer. Our estimates rely on a time-area metric that costs the number of logical qubits times the depth of the circuit in units of surface code cycles. As a surface code cycle involves a significant classical processing stage, our cost estimates allow for crude, but direct, comparisons of classical and quantum algorithms.


cryptographic hardware and embedded systems | 2017

High-speed key encapsulation from NTRU

Andreas Hülsing; Joost Rijneveld; John M. Schanck; Peter Schwabe

This paper presents software demonstrating that the 20-year-old NTRU cryptosystem is competitive with more recent lattice-based cryptosystems in terms of speed, key size, and ciphertext size. We present a slightly simplified version of textbook NTRU, select parameters for this encryption scheme that target the 128-bit post-quantum security level, construct a KEM that is CCA2-secure in the quantum random oracle model, and present highly optimized software targeting Intel CPUs with the AVX2 vector instruction set. This software takes only 307 914 cycles for the generation of a keypair, 48 646 for encapsulation, and 67 338 for decapsulation. It is, to the best of our knowledge, the first NTRU software with full protection against timing attacks.


privacy enhancing technologies | 2016

Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world

John M. Schanck; William Whyte; Zhenfei Zhang

Abstract We propose a circuit extension handshake for Tor that is forward secure against adversaries who gain quantum computing capabilities after session negotiation. In doing so, we refine the notion of an authenticated and confidential channel establishment (ACCE) protocol and define pre-quantum, transitional, and post-quantum ACCE security. These new definitions reflect the types of adversaries that a protocol might be designed to resist. We prove that, with some small modifications, the currently deployed Tor circuit extension handshake, ntor, provides pre-quantum ACCE security. We then prove that our new protocol, when instantiated with a post-quantum key encapsulation mechanism, achieves the stronger notion of transitional ACCE security. Finally, we instantiate our protocol with NTRU-Encrypt and provide a performance comparison between ntor, our proposal, and the recent design of Ghosh and Kate.


international conference on high performance computing and simulation | 2016

NTRU modular lattice signature scheme on CUDA GPUs

Wei Dai; Berk Sunar; John M. Schanck; William Whyte; Zhenfei Zhang

In this work we show how to use Graphics Processing Units (GPUs) with Compute Unified Device Architecture (CUDA) to accelerate a lattice based signature scheme, namely, the NTRU modular lattice signature (NTRU-MLS) scheme. Lattice based schemes require operations on large vectors that are perfect candidates for GPU implementations. In addition, similar to most lattice based signature schemes, NTRU-MLS provides transcript security with a rejection sampling technique. With a GPU implementation, we are able to generate many candidates simultaneously, and hence mitigate the performance slowdown from rejection sampling. Our implementation results show that for the original NTRU-MLS parameter sets, we obtain a 2x improvement in the signing speed; for the revised parameter sets, where acceptance rate of rejection sampling is down to around 1%, our implementation can be as much as 47x faster than a CPU implementation.


ieee european symposium on security and privacy | 2018

CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM

Joppe W. Bos; Léo Ducas; Eike Kiltz; Tancrède Lepoint; Vadim Lyubashevsky; John M. Schanck; Peter Schwabe; Gregor Seiler; Damien Stehlé


IACR Cryptology ePrint Archive | 2015

Choosing Parameters for NTRUEncrypt.

Jeffrey Hoffstein; Jill Pipher; John M. Schanck; Joseph H. Silverman; William Whyte; Zhenfei Zhang


IACR Cryptology ePrint Archive | 2015

A quantum-safe circuit-extension handshake for Tor.

John M. Schanck; William Whyte; Zhenfei Zhang

Collaboration


Dive into the John M. Schanck's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Peter Schwabe

Radboud University Nijmegen

View shared research outputs
Top Co-Authors

Avatar

Berk Sunar

Worcester Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wei Dai

Worcester Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Andreas Hülsing

Eindhoven University of Technology

View shared research outputs
Top Co-Authors

Avatar

Joost Rijneveld

Radboud University Nijmegen

View shared research outputs
Researchain Logo
Decentralizing Knowledge