An analysis for chosen plaintext attack in elliptic curve cryptosystem based on second order lucas sequence

Elliptic Curve Cryptography is a cryptography based on the algebraic structure of elliptic curves over finite fields. The security of Elliptic Curve Cryptography depends on discrete logarithms that is much more difficult to challenge at equivalent key lengths. Lucas sequence is a sequence that satis...

Full description

Bibliographic Details
Main Authors: Koo, Lee Feng, Sarbini, Izzatul Nabila, Yiu, Pang Hung, Naning @ Zin, Fatin Hana, Wong, Tze Jin
Format: Article
Language:English
Published: International Journal of Scientific and Technology Research 2019
Online Access:http://psasir.upm.edu.my/id/eprint/80577/
http://psasir.upm.edu.my/id/eprint/80577/1/CURVE.pdf
_version_ 1848858920279343104
author Koo, Lee Feng
Sarbini, Izzatul Nabila
Yiu, Pang Hung
Naning @ Zin, Fatin Hana
Wong, Tze Jin
author_facet Koo, Lee Feng
Sarbini, Izzatul Nabila
Yiu, Pang Hung
Naning @ Zin, Fatin Hana
Wong, Tze Jin
author_sort Koo, Lee Feng
building UPM Institutional Repository
collection Online Access
description Elliptic Curve Cryptography is a cryptography based on the algebraic structure of elliptic curves over finite fields. The security of Elliptic Curve Cryptography depends on discrete logarithms that is much more difficult to challenge at equivalent key lengths. Lucas sequence is a sequence that satisfies the recurrence relation and is very useful for fast and reliable primality testing. Therefore, a cryptosystem had been developed which is analogous to Elliptic Curve Cryptosystem, and is based on second order Lucas sequence. This cryptosystem will be tested by using chosen plaintext attack. The chosen plaintext attack is one of the homomorphic attacks. It is a consequence of the multiplication structure and based on homomorphic nature. Thus, this paper reports a way the chosen plaintext attack succeed in Elliptic Curve Cryptosystem based on second order Lucas sequence.
first_indexed 2025-11-15T12:21:06Z
format Article
id upm-80577
institution Universiti Putra Malaysia
institution_category Local University
language English
last_indexed 2025-11-15T12:21:06Z
publishDate 2019
publisher International Journal of Scientific and Technology Research
recordtype eprints
repository_type Digital Repository
spelling upm-805772020-11-05T19:34:11Z http://psasir.upm.edu.my/id/eprint/80577/ An analysis for chosen plaintext attack in elliptic curve cryptosystem based on second order lucas sequence Koo, Lee Feng Sarbini, Izzatul Nabila Yiu, Pang Hung Naning @ Zin, Fatin Hana Wong, Tze Jin Elliptic Curve Cryptography is a cryptography based on the algebraic structure of elliptic curves over finite fields. The security of Elliptic Curve Cryptography depends on discrete logarithms that is much more difficult to challenge at equivalent key lengths. Lucas sequence is a sequence that satisfies the recurrence relation and is very useful for fast and reliable primality testing. Therefore, a cryptosystem had been developed which is analogous to Elliptic Curve Cryptosystem, and is based on second order Lucas sequence. This cryptosystem will be tested by using chosen plaintext attack. The chosen plaintext attack is one of the homomorphic attacks. It is a consequence of the multiplication structure and based on homomorphic nature. Thus, this paper reports a way the chosen plaintext attack succeed in Elliptic Curve Cryptosystem based on second order Lucas sequence. International Journal of Scientific and Technology Research 2019 Article PeerReviewed text en http://psasir.upm.edu.my/id/eprint/80577/1/CURVE.pdf Koo, Lee Feng and Sarbini, Izzatul Nabila and Yiu, Pang Hung and Naning @ Zin, Fatin Hana and Wong, Tze Jin (2019) An analysis for chosen plaintext attack in elliptic curve cryptosystem based on second order lucas sequence. International Journal of Scientific and Technology Research, 8 (11). pp. 1193-1196. ISSN 2277-8616 http://www.ijstr.org/final-print/nov2019/An-Analysis-For-Chosen-Plaintext-Attack-In-Elliptic-Curve-Cryptosystem-Based-On-Second-Order-Lucas-Sequence-.pdf
spellingShingle Koo, Lee Feng
Sarbini, Izzatul Nabila
Yiu, Pang Hung
Naning @ Zin, Fatin Hana
Wong, Tze Jin
An analysis for chosen plaintext attack in elliptic curve cryptosystem based on second order lucas sequence
title An analysis for chosen plaintext attack in elliptic curve cryptosystem based on second order lucas sequence
title_full An analysis for chosen plaintext attack in elliptic curve cryptosystem based on second order lucas sequence
title_fullStr An analysis for chosen plaintext attack in elliptic curve cryptosystem based on second order lucas sequence
title_full_unstemmed An analysis for chosen plaintext attack in elliptic curve cryptosystem based on second order lucas sequence
title_short An analysis for chosen plaintext attack in elliptic curve cryptosystem based on second order lucas sequence
title_sort analysis for chosen plaintext attack in elliptic curve cryptosystem based on second order lucas sequence
url http://psasir.upm.edu.my/id/eprint/80577/
http://psasir.upm.edu.my/id/eprint/80577/
http://psasir.upm.edu.my/id/eprint/80577/1/CURVE.pdf