Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 29737


Select areas to restrict search in scientific publication database:
10010260
An Attack on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field Using Greater Common Divisor
Abstract:
Greater common divisor (GCD) attack is an attack that relies on the polynomial structure of the cryptosystem. This attack required two plaintexts differ from a fixed number and encrypted under same modulus. This paper reports a security reaction of Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field under GCD attack. Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field was exposed mathematically to the GCD attack using GCD and Dickson polynomial. The result shows that the cryptanalyst is able to get the plaintext without decryption by using GCD attack. Thus, the study concluded that it is highly perilous when two plaintexts have a slight difference from a fixed number in the same Elliptic curve group over finite field.
Digital Object Identifier (DOI):

References:

[1] W. Diffie, and M. Hellman, "New directions in cryptography". IEEE Transaction on Information Theory vol. 22, p644-654, 1976.
[2] T. ElGamal, "A Public Key Cryptosystem and A Signature Scheme Based on Discrete Logarithms". IEEE Transaction on Information Theory vol. 31, p469-472, 1985.
[3] N. Koblitz. "Elliptic curve cryptosystems". Mathematics of Computation 48 (177): p203–209, 1985.
[4] V. Miller. "Use of elliptic curves in cryptography". CRYPTO 85: p417–426, 1985.
[5] P. J. Smith, and C. Skinner, "A Public Key Cryptosystem and A Digital Signature Systems Based on the Lucas Function Analogue to Discrete Logarithms". Pre-proceedings Asia Crypt'94, p298-306, 1994.
[6] P. J. Smith and M. J. J. Lennon. "LUC: A new public key system". Proceedings of the ninth IFIP international Symposium on Computer Security, p103-117, 1993.
[7] M. R. M. Said. "Application of Recurrence Relations to Cryptography". PhD Thesis, Macquarie University, Australia, 1997.
[8] T. J. Wong. “A RSA-type Cryptosystem Based on Quartic Polynomials". PhD Thesis, Universiti Putra Malaysia, Malaysia, 2011.
[9] T. J. Wong, M. R. M. Said, K. A. M. Atan, and B. Ural, “The Quartic Analog to the RSA Cryptosystem”. Malaysian Journal of Mathematical Sciences vol. 1(1), p63-81, 2007.
[10] L. E. Dickson. “The analytic representation of substitutions on a power of a prime number of letters with a discussion of the linear group.” The Annals of Mathematics 11(1/6): p65–120; 161–183, 1897.
[11] T. J. Wong, M. R. M. Said, M. Othman, and L. F. Koo, “A Lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem”. AIP Conference Proceedings vol. 1635, p256-259, 2014.
[12] T. J. Wong, L. F. Koo, and P. H. Yiu. “On the Wiener’s Attack into Lucas Based El- Gamal Cryptosystem in the Elliptic Curve Over Finite Field”. International Journal of Science and Engineering Investigations vol 7(72), p37-39, 2018.
[13] T. J. Wong, L. F. Koo, and P. H. Yiu. “Lucas Based El-Gamal Cryptosystem in the Elliptic CurveGroup over finite field under Lenstra’s Attack”. Asian Journal of Mathematics and Computer Research vol. 23(4), p207-213, 2018.
Vol:13 No:06 2019Vol:13 No:05 2019Vol:13 No:04 2019Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007