Cryptographic attack on LUC-type cryptosystems using GMITM (Type 1)
Garbage-man-in-the-middle (type 1) attack is an attack exploit the polynomial structure of LUC-type cryptosystems and depends on the possibility to get the faulty plaintext in the bin of the receiver. This paper reports an investigation for LUC-type cryptosystems under garbage-man-in-the middle (typ...
| Main Authors: | Sarbini, Izzatul Nabila, Wong, Tze Jin, Othman, Mohamed, Koo, Lee Feng, Rasedee, Ahmad Fadly Nurullah, Yiu, Pang Hung, Naning @ Zin, Fatin Hana |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Institute of Advanced Scientific Research
2019
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/81056/ http://psasir.upm.edu.my/id/eprint/81056/1/ABSTRACT.pdf |
Similar Items
Security analysis on luc-type cryptosystems using common modulus attack
by: Sarbini, Izzatul Nabila, et al.
Published: (2023)
by: Sarbini, Izzatul Nabila, et al.
Published: (2023)
Security analysis of Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field using two types of GMITM attacks
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
Cryptographic attack on Lucas based cryptosystems using chinese remainder theorem
by: Wong, Tze Jin, et al.
Published: (2019)
by: Wong, Tze Jin, et al.
Published: (2019)
On the hastad's attack to LUC4,6 cryptosystem and compared with other RSA-type cryptosystem
by: Wong, Tze Jin, et al.
Published: (2013)
by: Wong, Tze Jin, et al.
Published: (2013)
An analysis for chosen plaintext attack in elliptic curve cryptosystem based on second order lucas sequence
by: Koo, Lee Feng, et al.
Published: (2019)
by: Koo, Lee Feng, et al.
Published: (2019)
GCD attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009)
by: Wong, Tze Jin, et al.
Published: (2009)
An attack on ELG-LUC3-ECC cryptosystem using Hastad’s and Julta’s theorem
by: Wong, Tze Jin, et al.
Published: (2024)
by: Wong, Tze Jin, et al.
Published: (2024)
On the common modulus attack into the LUC4,6 cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014)
by: Wong, Tze Jin, et al.
Published: (2014)
An attack on ELG-LUC3-ECC cryptosystem using Hastad’s and Julta’s theorem
by: Wong, T.J., et al.
Published: (2024)
by: Wong, T.J., et al.
Published: (2024)
Garbage-man-in-the-middle attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009)
by: Wong, Tze Jin, et al.
Published: (2009)
Common modulus attack against Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field
by: Koo, Lee Feng, et al.
Published: (2018)
by: Koo, Lee Feng, et al.
Published: (2018)
Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
On the wiener's attack into lucas based El-gamal cryptosystem in the elliptic curve over finite field
by: Wong, Tze Jin, et al.
Published: (2018)
by: Wong, Tze Jin, et al.
Published: (2018)
Computation of private key for LUC cryptosystem
by: Md Ali, Zulkarnain, et al.
Published: (2009)
by: Md Ali, Zulkarnain, et al.
Published: (2009)
Lucas based el-gamal cryptosystem in the elliptic curve group over finite field under lenstras attack
by: Tze, Jin Wong, et al.
Published: (2018)
by: Tze, Jin Wong, et al.
Published: (2018)
An improvement of LUC2 cryptosystem algorithm using doubling with remainder
by: Othman, Mohamed, et al.
Published: (2006)
by: Othman, Mohamed, et al.
Published: (2006)
Conditions for counter measure against one time pad attack on Baptista type cryptosystem
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
A RSA-type cryptosystem based on quartic polynomials
by: Wong, Tze Jin
Published: (2011)
by: Wong, Tze Jin
Published: (2011)
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
by: Wong, Tze Jin
Published: (2006)
by: Wong, Tze Jin
Published: (2006)
The extensions on algebraic attack in AES cryptosystem
by: RezaeiPour, Davood, et al.
Published: (2009)
by: RezaeiPour, Davood, et al.
Published: (2009)
A lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014)
by: Wong, Tze Jin, et al.
Published: (2014)
Timing attack analysis on AAβ cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
by: Daud, Muhamad Azlan
Published: (2014)
by: Daud, Muhamad Azlan
Published: (2014)
A secure cryptographic algorithm against side channel attacks
by: Abu, Nur Azman, et al.
Published: (2015)
by: Abu, Nur Azman, et al.
Published: (2015)
Modified Baptista type cryptosystem via matrix secret key.
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2008)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2008)
A survey of partial key exposure attacks on RSA cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
The efficiency of embedding-based attacks on the GGH lattice-based cryptosystem
by: Mandangan,, A., et al.
Published: (2023)
by: Mandangan,, A., et al.
Published: (2023)
A balanced secure cryptographic algorithm against timing and side channel attacks
by: Abu, Nur Azman, et al.
Published: (2014)
by: Abu, Nur Azman, et al.
Published: (2014)
2 point block backward difference method for solving Riccati type differential problems
by: Rasedee, Ahmad Fadly Nurullah, et al.
Published: (2016)
by: Rasedee, Ahmad Fadly Nurullah, et al.
Published: (2016)
Johnson noise and optical characteristics of polymer nanocomposites based on colloidal quantum dots and in-situ nanoparticles formation
by: Naning @ Zin, Fatin Hana, et al.
Published: (2020)
by: Naning @ Zin, Fatin Hana, et al.
Published: (2020)
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
by: Abubakar, Adamu, et al.
Published: (2014)
by: Abubakar, Adamu, et al.
Published: (2014)
Types of anti-phishing solutions for phishing attack
by: Siti Hawa, Apandi, et al.
Published: (2020)
by: Siti Hawa, Apandi, et al.
Published: (2020)
Solving duffing type differential equations using a three-point block variable order step size method
by: Rasedee, Ahmad Fadly Nurullah, et al.
Published: (2019)
by: Rasedee, Ahmad Fadly Nurullah, et al.
Published: (2019)
Sistem Kripto Luc Untuk Pengesahan Aplikasi Telnet
by: Sibo, Siti Jauyah
Published: (1999)
by: Sibo, Siti Jauyah
Published: (1999)
Johnson noise of CdX-P3HT nanocomposite
by: Naning @ Zin, Fatin Hana, et al.
Published: (2019)
by: Naning @ Zin, Fatin Hana, et al.
Published: (2019)
Spectral expansions of laplace-beltrami operator on unit sphere
by: Rasedee, Ahmad Fadly Nurullah
Published: (2015)
by: Rasedee, Ahmad Fadly Nurullah
Published: (2015)
A review on type of attacks on fingerprint image and watermarking techniques
by: Lebcir, Mohamed, et al.
Published: (2019)
by: Lebcir, Mohamed, et al.
Published: (2019)
The solution of Riccati type differential equation by means of variable step size backward difference methods
by: Rasedee, Ahmad Fadly Nurullah, et al.
Published: (2016)
by: Rasedee, Ahmad Fadly Nurullah, et al.
Published: (2016)
Students' understanding of equal and equality symbols in mathematics
by: Izzatul Nabila, Sarbini
Published: (2009)
by: Izzatul Nabila, Sarbini
Published: (2009)
Development of a luciferase/luciferin cell proliferation (XenoLuc) assay for real-time measurements of Gfp-Luc2-modified cells in a co-culture system
by: Teow, Sin Yeang *, et al.
Published: (2019)
by: Teow, Sin Yeang *, et al.
Published: (2019)
Similar Items
-
Security analysis on luc-type cryptosystems using common modulus attack
by: Sarbini, Izzatul Nabila, et al.
Published: (2023) -
Security analysis of Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field using two types of GMITM attacks
by: Sarbini, Izzatul Nabila, et al.
Published: (2018) -
Cryptographic attack on Lucas based cryptosystems using chinese remainder theorem
by: Wong, Tze Jin, et al.
Published: (2019) -
On the hastad's attack to LUC4,6 cryptosystem and compared with other RSA-type cryptosystem
by: Wong, Tze Jin, et al.
Published: (2013) -
An analysis for chosen plaintext attack in elliptic curve cryptosystem based on second order lucas sequence
by: Koo, Lee Feng, et al.
Published: (2019)