Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field

Garbage-man-in-the-middle (type 2) attack is one of the various homomorphic attacks based on its homomorphism nature of cryptosystem. The idea of this attack relies on the possibility to access to the “bin” of recipient. This type of attack requires an access to the “bin” in order to recover the ori...

Full description

Bibliographic Details
Main Authors: Sarbini, Izzatul Nabila, Wong, Tze Jin, Koo, Lee Feng, Othman, Mohamed, Md. Said, Mohamad Rushdan, Yiu, Pang Hung
Format: Conference or Workshop Item
Language:English
Published: Institute for Mathematical Research, Universiti Putra Malaysia 2018
Online Access:http://psasir.upm.edu.my/id/eprint/66527/
http://psasir.upm.edu.my/id/eprint/66527/1/Cryptology2018-2.pdf
_version_ 1848855595096997888
author Sarbini, Izzatul Nabila
Wong, Tze Jin
Koo, Lee Feng
Othman, Mohamed
Md. Said, Mohamad Rushdan
Yiu, Pang Hung
author_facet Sarbini, Izzatul Nabila
Wong, Tze Jin
Koo, Lee Feng
Othman, Mohamed
Md. Said, Mohamad Rushdan
Yiu, Pang Hung
author_sort Sarbini, Izzatul Nabila
building UPM Institutional Repository
collection Online Access
description Garbage-man-in-the-middle (type 2) attack is one of the various homomorphic attacks based on its homomorphism nature of cryptosystem. The idea of this attack relies on the possibility to access to the “bin” of recipient. This type of attack requires an access to the “bin” in order to recover the original plaintext. In this paper, an investigation was carried out to evaluate the nature of a homomorphic attack on the Lucas based El-Gamal Cryptosystem in the Elliptic Curve Group over finite field. The result shows that the cryptanalyst is able to obtain the plaintext without knowing the secret number, a, b and R, providing that the receiver decrypts the ciphertexts with a faulty decryption key.
first_indexed 2025-11-15T11:28:15Z
format Conference or Workshop Item
id upm-66527
institution Universiti Putra Malaysia
institution_category Local University
language English
last_indexed 2025-11-15T11:28:15Z
publishDate 2018
publisher Institute for Mathematical Research, Universiti Putra Malaysia
recordtype eprints
repository_type Digital Repository
spelling upm-665272019-03-03T23:55:47Z http://psasir.upm.edu.my/id/eprint/66527/ Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field Sarbini, Izzatul Nabila Wong, Tze Jin Koo, Lee Feng Othman, Mohamed Md. Said, Mohamad Rushdan Yiu, Pang Hung Garbage-man-in-the-middle (type 2) attack is one of the various homomorphic attacks based on its homomorphism nature of cryptosystem. The idea of this attack relies on the possibility to access to the “bin” of recipient. This type of attack requires an access to the “bin” in order to recover the original plaintext. In this paper, an investigation was carried out to evaluate the nature of a homomorphic attack on the Lucas based El-Gamal Cryptosystem in the Elliptic Curve Group over finite field. The result shows that the cryptanalyst is able to obtain the plaintext without knowing the secret number, a, b and R, providing that the receiver decrypts the ciphertexts with a faulty decryption key. Institute for Mathematical Research, Universiti Putra Malaysia 2018 Conference or Workshop Item PeerReviewed text en http://psasir.upm.edu.my/id/eprint/66527/1/Cryptology2018-2.pdf Sarbini, Izzatul Nabila and Wong, Tze Jin and Koo, Lee Feng and Othman, Mohamed and Md. Said, Mohamad Rushdan and Yiu, Pang Hung (2018) Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field. In: 6th International Cryptology and Information Security Conference 2018 (CRYPTOLOGY2018), 9-11 July 2018, Port Dickson, Negeri Sembilan, Malaysia. (pp. 35-41).
spellingShingle Sarbini, Izzatul Nabila
Wong, Tze Jin
Koo, Lee Feng
Othman, Mohamed
Md. Said, Mohamad Rushdan
Yiu, Pang Hung
Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field
title Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field
title_full Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field
title_fullStr Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field
title_full_unstemmed Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field
title_short Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field
title_sort garbage-man-in-the-middle (type 2) attack on the lucas based el-gamal cryptosystem in the elliptic curve group over finite field
url http://psasir.upm.edu.my/id/eprint/66527/
http://psasir.upm.edu.my/id/eprint/66527/1/Cryptology2018-2.pdf