Cryptographic attack on Lucas based cryptosystems using chinese remainder theorem

Lenstra’s attack uses Chinese remainder theorem as a tool and requires a faulty signature to be successful. This paper reports on the security responses of fourth and sixth order Lucas based (LUC4,6) cryptosystem under the Lenstra’s attack as compared to the other two Lucas based cryptosystems such...

Full description

Bibliographic Details
Main Authors: Wong, Tze Jin, Lee, Feng Koo, Pang, Hung Yiu
Format: Article
Language:English
Published: World Academy of Science Engineering and Technology 2019
Online Access:http://psasir.upm.edu.my/id/eprint/81055/
http://psasir.upm.edu.my/id/eprint/81055/1/LUCAS.pdf
_version_ 1848859013085659136
author Wong, Tze Jin
Lee, Feng Koo
Pang, Hung Yiu
author_facet Wong, Tze Jin
Lee, Feng Koo
Pang, Hung Yiu
author_sort Wong, Tze Jin
building UPM Institutional Repository
collection Online Access
description Lenstra’s attack uses Chinese remainder theorem as a tool and requires a faulty signature to be successful. This paper reports on the security responses of fourth and sixth order Lucas based (LUC4,6) cryptosystem under the Lenstra’s attack as compared to the other two Lucas based cryptosystems such as LUC and LUC3 cryptosystems. All the Lucas based cryptosystems were exposed mathematically to the Lenstra’s attack using Chinese Remainder Theorem and Dickson polynomial. Result shows that the possibility for successful Lenstra’s attack is less against LUC4,6 cryptosystem than LUC3 and LUC cryptosystems. Current study concludes that LUC4,6 cryptosystem is more secure than LUC and LUC3 cryptosystems in sustaining against Lenstra’s attack.
first_indexed 2025-11-15T12:22:35Z
format Article
id upm-81055
institution Universiti Putra Malaysia
institution_category Local University
language English
last_indexed 2025-11-15T12:22:35Z
publishDate 2019
publisher World Academy of Science Engineering and Technology
recordtype eprints
repository_type Digital Repository
spelling upm-810552021-04-28T11:18:59Z http://psasir.upm.edu.my/id/eprint/81055/ Cryptographic attack on Lucas based cryptosystems using chinese remainder theorem Wong, Tze Jin Lee, Feng Koo Pang, Hung Yiu Lenstra’s attack uses Chinese remainder theorem as a tool and requires a faulty signature to be successful. This paper reports on the security responses of fourth and sixth order Lucas based (LUC4,6) cryptosystem under the Lenstra’s attack as compared to the other two Lucas based cryptosystems such as LUC and LUC3 cryptosystems. All the Lucas based cryptosystems were exposed mathematically to the Lenstra’s attack using Chinese Remainder Theorem and Dickson polynomial. Result shows that the possibility for successful Lenstra’s attack is less against LUC4,6 cryptosystem than LUC3 and LUC cryptosystems. Current study concludes that LUC4,6 cryptosystem is more secure than LUC and LUC3 cryptosystems in sustaining against Lenstra’s attack. World Academy of Science Engineering and Technology 2019 Article PeerReviewed text en http://psasir.upm.edu.my/id/eprint/81055/1/LUCAS.pdf Wong, Tze Jin and Lee, Feng Koo and Pang, Hung Yiu (2019) Cryptographic attack on Lucas based cryptosystems using chinese remainder theorem. International Journal of Mathematical and Computational Sciences, 13 (4). pp. 84-89. ISSN 2010-3913; ESSN: 2070-3910 https://publications.waset.org/10010261/cryptographic-attack-on-lucas-based-cryptosystems-using-chinese-remainder-theorem 10.5281/zenodo.2643939
spellingShingle Wong, Tze Jin
Lee, Feng Koo
Pang, Hung Yiu
Cryptographic attack on Lucas based cryptosystems using chinese remainder theorem
title Cryptographic attack on Lucas based cryptosystems using chinese remainder theorem
title_full Cryptographic attack on Lucas based cryptosystems using chinese remainder theorem
title_fullStr Cryptographic attack on Lucas based cryptosystems using chinese remainder theorem
title_full_unstemmed Cryptographic attack on Lucas based cryptosystems using chinese remainder theorem
title_short Cryptographic attack on Lucas based cryptosystems using chinese remainder theorem
title_sort cryptographic attack on lucas based cryptosystems using chinese remainder theorem
url http://psasir.upm.edu.my/id/eprint/81055/
http://psasir.upm.edu.my/id/eprint/81055/
http://psasir.upm.edu.my/id/eprint/81055/
http://psasir.upm.edu.my/id/eprint/81055/1/LUCAS.pdf