
Any private key value that you enter or we generate is not stored on this site, this tool is provided via an HTTPS URL to ensure that private keys cannot be stolen, for extra security run this software on your network, no cloud dependency
Reader Offer The Modern Cryptography CookBook for Just $9 Avail Discount coupon first 100 reader. No hurry read the sample chapters here first
NTRU implementation
Ref: https://github.com/tbuktu/ntru
N: number of polynomial coefficients
q: modulus
df: number of ones in the private polynomial
dm0: minimum acceptable number of 1's, 0's, and 1's in the polynomial
maxM1: maximum absolute value of mTrin.sumCoeffs() or zero to disable this check. Values greater than zero cause the constant coefficient of the message to always be zero.
db: number of random bits to prepend to the message; should be a multiple of 8
ca: parameter for the Index Generation Function ({@link IndexGenerator})
minCallsR: minimum number of hash calls for the IGF to make
minCallsMask: minimum number of calls to generate the masking polynomial
hashSeed whether to hash the seed in the MGF first (true) or use the seed directly (false)
oid: three bytes that uniquely identify the parameter set
sparse: whether to treat ternary polynomials as sparsely populated
fastFp: ternary true or False
hashAlga valid identifier SHA256
parameter set that gives 256 bits of security and is optimized for key size
EES1087EP2 =(1087, 2048, 120, 120, 0, 256, 13, 25, 14, true, new byte[] {0, 6, 3}, true, false, "SHA512");
EES1087EP2_FAST = (1087, 2048, 8, 8, 11, 120, 0, 256, 13, 25, 14, true, new byte[] {0, 6, 3}, true, true, "SHA512");
parameter set that gives 256 bits of security and is a tradeoff between key size and encryption/decryption speed.
EES1171EP1 = (1171, 2048, 106, 106, 0, 256, 13, 20, 15, true, new byte[] {0, 6, 4}, true, false, "SHA512");
EES1171EP1_FAST = (1171, 2048, 8, 7, 11, 106, 0, 256, 13, 20, 15, true, new byte[] {0, 6, 4}, true, true, "SHA512");
parameter set that gives 256 bits of security and is optimized for encryption/decryption speed.
EES1499EP1 = (1499, 2048, 79, 79, 0, 256, 13, 17, 19, true, new byte[] {0, 6, 5}, true, false, "SHA512");
EES1499EP1_FAST = (1499, 2048, 7, 6, 11, 79, 0, 256, 13, 17, 19, true, new byte[] {0, 6, 5}, true, true, "SHA512");
parameter set that gives 128 bits of security and uses simple ternary polynomials. */
APR2011_439 = (439, 2048, 146, 130, 126, 128, 12, 32, 9, true, new byte[] {0, 7, 101}, true, false, "SHA256");
his parameter set gives 128 bits of security but uses productform polynomials
APR2011_439_FAST = (439, 2048, 9, 8, 5, 130, 126, 128, 12, 32, 9, true, new byte[] {0, 7, 101}, true, true, "SHA256");
parameter set that gives 256 bits of security and uses simple ternary polynomials
APR2011_743 = (743, 2048, 248, 220, 60, 256, 12, 27, 14, true, new byte[] {0, 7, 105}, false, false, "SHA512");
parameter set gives 256 bits(Recommedned)
APR2011_743_FAST = (743, 2048, 11, 11, 15, 220, 60, 256, 12, 27, 14, true, new byte[] {0, 7, 105}, false, true, "SHA512");