On the wiener's attack into lucas based El-gamal cryptosystem in the elliptic curve over finite field

This paper reports a security analysis on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Over Finite Field.Wiener’s Attack was selected to analyzethe cryptosystemunder a bad implementation practice. Result showed that the cryptosystem wasweak if the chosen ke...

Full description

Bibliographic Details
Main Authors: Wong, Tze Jin, Koo, Lee Feng, Yiu, Pang Hung
Format: Article
Language:English
Published: International Journal of Science and Engineering Investigations 2018
Online Access:http://psasir.upm.edu.my/id/eprint/75133/
http://psasir.upm.edu.my/id/eprint/75133/1/On%20the%20wiener%E2%80%99s%20attack%20into%20lucas%20based%20El-gamal%20cryptosystem%20in%20the%20elliptic%20curve%20over%20finite%20field.pdf
_version_ 1848857612759597056
author Wong, Tze Jin
Koo, Lee Feng
Yiu, Pang Hung
author_facet Wong, Tze Jin
Koo, Lee Feng
Yiu, Pang Hung
author_sort Wong, Tze Jin
building UPM Institutional Repository
collection Online Access
description This paper reports a security analysis on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Over Finite Field.Wiener’s Attack was selected to analyzethe cryptosystemunder a bad implementation practice. Result showed that the cryptosystem wasweak if the chosen keys were too small among those inthe order of group G.
first_indexed 2025-11-15T12:00:19Z
format Article
id upm-75133
institution Universiti Putra Malaysia
institution_category Local University
language English
last_indexed 2025-11-15T12:00:19Z
publishDate 2018
publisher International Journal of Science and Engineering Investigations
recordtype eprints
repository_type Digital Repository
spelling upm-751332020-04-20T18:17:39Z http://psasir.upm.edu.my/id/eprint/75133/ On the wiener's attack into lucas based El-gamal cryptosystem in the elliptic curve over finite field Wong, Tze Jin Koo, Lee Feng Yiu, Pang Hung This paper reports a security analysis on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Over Finite Field.Wiener’s Attack was selected to analyzethe cryptosystemunder a bad implementation practice. Result showed that the cryptosystem wasweak if the chosen keys were too small among those inthe order of group G. International Journal of Science and Engineering Investigations 2018-01 Article PeerReviewed text en http://psasir.upm.edu.my/id/eprint/75133/1/On%20the%20wiener%E2%80%99s%20attack%20into%20lucas%20based%20El-gamal%20cryptosystem%20in%20the%20elliptic%20curve%20over%20finite%20field.pdf Wong, Tze Jin and Koo, Lee Feng and Yiu, Pang Hung (2018) On the wiener's attack into lucas based El-gamal cryptosystem in the elliptic curve over finite field. International Journal of Science and Engineering Investigations, 7 (72). 37 - 39. ISSN ESSN: 2251-8843
spellingShingle Wong, Tze Jin
Koo, Lee Feng
Yiu, Pang Hung
On the wiener's attack into lucas based El-gamal cryptosystem in the elliptic curve over finite field
title On the wiener's attack into lucas based El-gamal cryptosystem in the elliptic curve over finite field
title_full On the wiener's attack into lucas based El-gamal cryptosystem in the elliptic curve over finite field
title_fullStr On the wiener's attack into lucas based El-gamal cryptosystem in the elliptic curve over finite field
title_full_unstemmed On the wiener's attack into lucas based El-gamal cryptosystem in the elliptic curve over finite field
title_short On the wiener's attack into lucas based El-gamal cryptosystem in the elliptic curve over finite field
title_sort on the wiener's attack into lucas based el-gamal cryptosystem in the elliptic curve over finite field
url http://psasir.upm.edu.my/id/eprint/75133/
http://psasir.upm.edu.my/id/eprint/75133/1/On%20the%20wiener%E2%80%99s%20attack%20into%20lucas%20based%20El-gamal%20cryptosystem%20in%20the%20elliptic%20curve%20over%20finite%20field.pdf