Conditions for counter measure against one time pad attack on Baptista type cryptosystem
In 1998, M.S. Baptista proposed a chaotic cryptosystem using the ergodicity property of the simple low-dimensional and chaotic logistic equation Xn+1=bXn+(1-Xn)where X0 and b are the secret keys. This cryptosystem hasthe ability to prevarious ciphers responding to the same message input. Since t...
| Main Authors: | Kamel Ariffin, Muhammad Rezal, Md Noorani, Mohd Salmi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Malaysian Society for Cryptology Research
2009
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/13752/ http://psasir.upm.edu.my/id/eprint/13752/1/Conditions%20for%20counter%20measure%20against%20one%20time%20pad%20attack%20on%20Baptista%20type%20cryptosystem.pdf |
Similar Items
Modified Baptista type cryptosystem via matrix secret key.
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2008)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2008)
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
by: Daud, Muhamad Azlan
Published: (2014)
by: Daud, Muhamad Azlan
Published: (2014)
Timing attack analysis on AAβ cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
GCD attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009)
by: Wong, Tze Jin, et al.
Published: (2009)
A survey of partial key exposure attacks on RSA cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
On the hastad's attack to LUC4,6 cryptosystem and compared with other RSA-type cryptosystem
by: Wong, Tze Jin, et al.
Published: (2013)
by: Wong, Tze Jin, et al.
Published: (2013)
AAβ public key cryptosystem - a comparative analysis against RSA and ECC
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
Garbage-man-in-the-middle attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009)
by: Wong, Tze Jin, et al.
Published: (2009)
AAβ-Cryptosystem: a chaos based public key cryptosystem
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
Cryptographic attack on LUC-type cryptosystems using GMITM (Type 1)
by: Sarbini, Izzatul Nabila, et al.
Published: (2019)
by: Sarbini, Izzatul Nabila, et al.
Published: (2019)
Analysis on the AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Security analysis on luc-type cryptosystems using common modulus attack
by: Sarbini, Izzatul Nabila, et al.
Published: (2023)
by: Sarbini, Izzatul Nabila, et al.
Published: (2023)
Algebraic cryptanalysis on the AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
Analysis on the Rabin-p cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
The extensions on algebraic attack in AES cryptosystem
by: RezaeiPour, Davood, et al.
Published: (2009)
by: RezaeiPour, Davood, et al.
Published: (2009)
Provably secure randomized AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
Enhanced AAβ cryptosystem: the design
by: Asbullah, Muhammad Asyraf, et al.
Published: (2018)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2018)
Provably secure Rabin-p cryptosystem in hybrid setting
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Design of Rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Fast decryption method for a Rabin primitive-based cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
Algebraic analysis of a rabin-like cryptosystem and its countermeasures
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
AAβ public-key cryptosystem - a practical implementation of the new asymmetric
by: Mahad, Zahari, et al.
Published: (2013)
by: Mahad, Zahari, et al.
Published: (2013)
Efficient methods to overcome Rabin cryptosystem decryption failure
by: Mahad, Zahari, et al.
Published: (2017)
by: Mahad, Zahari, et al.
Published: (2017)
Enhanced AAβ cryptosystem - a comparative analysis
by: Mahad, Zahari, et al.
Published: (2019)
by: Mahad, Zahari, et al.
Published: (2019)
On the common modulus attack into the LUC4,6 cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014)
by: Wong, Tze Jin, et al.
Published: (2014)
Rounding theorem the possibility of applying cryptosystem on the decimal numbers.
by: Alfaris, Rand, et al.
Published: (2008)
by: Alfaris, Rand, et al.
Published: (2008)
Rabin-RZ: a new efficient method to overcome Rabin cryptosystem decryption failure problem
by: Mahad, Zahari, et al.
Published: (2015)
by: Mahad, Zahari, et al.
Published: (2015)
Rabin-RZ: a new efficient method to overcome Rabin cryptosystem decryption failure problem
by: Mahad, Zahari, et al.
Published: (2014)
by: Mahad, Zahari, et al.
Published: (2014)
On the variants of RSA cryptosystem and its related algebraic cryptanalysis
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
Internet of things (IoT); security requirements, attacks and counter measures
by: Imdad, Maria, et al.
Published: (2020)
by: Imdad, Maria, et al.
Published: (2020)
The efficiency of embedding-based attacks on the GGH lattice-based cryptosystem
by: Mandangan,, A., et al.
Published: (2023)
by: Mandangan,, A., et al.
Published: (2023)
AAβ public key cryptosystem - a new practical asymmetric implementation based on the square root problem
by: Mahad, Zahari, et al.
Published: (2012)
by: Mahad, Zahari, et al.
Published: (2012)
The beta-transformation: a case study for chaos based cryptography
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
Common modulus attack against Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field
by: Koo, Lee Feng, et al.
Published: (2018)
by: Koo, Lee Feng, et al.
Published: (2018)
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
by: Abubakar, Adamu, et al.
Published: (2014)
by: Abubakar, Adamu, et al.
Published: (2014)
Cryptographic attack on Lucas based cryptosystems using chinese remainder theorem
by: Wong, Tze Jin, et al.
Published: (2019)
by: Wong, Tze Jin, et al.
Published: (2019)
Symbolic Attack Sites and the Performance of Terrorism, Counter Terrorism and Memory
by: Aly, Anne
Published: (2014)
by: Aly, Anne
Published: (2014)
An attack on ELG-LUC3-ECC cryptosystem using Hastad’s and Julta’s theorem
by: Wong, T.J., et al.
Published: (2024)
by: Wong, T.J., et al.
Published: (2024)
An attack on ELG-LUC3-ECC cryptosystem using Hastad’s and Julta’s theorem
by: Wong, Tze Jin, et al.
Published: (2024)
by: Wong, Tze Jin, et al.
Published: (2024)
The quartic analog to the RSA cryptosystem
by: Wong, Tze Jin, et al.
Published: (2007)
by: Wong, Tze Jin, et al.
Published: (2007)
Similar Items
-
Modified Baptista type cryptosystem via matrix secret key.
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2008) -
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
by: Daud, Muhamad Azlan
Published: (2014) -
Timing attack analysis on AAβ cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014) -
GCD attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009) -
A survey of partial key exposure attacks on RSA cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)