Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field

Garbage-man-in-the-middle (type 2) attack is one of the various homomorphic attacks based on its homomorphism nature of cryptosystem. The idea of this attack relies on the possibility to access to the “bin” of recipient. This type of attack requires an access to the “bin” in order to recover the ori...

Full description

Bibliographic Details
Main Authors: Sarbini, Izzatul Nabila, Wong, Tze Jin, Koo, Lee Feng, Othman, Mohamed, Md. Said, Mohamad Rushdan, Yiu, Pang Hung
Format: Conference or Workshop Item
Language:English
Published: Institute for Mathematical Research, Universiti Putra Malaysia 2018
Online Access:http://psasir.upm.edu.my/id/eprint/66527/1/Cryptology2018-2.pdf
_version_ 1825933152746471424
author Sarbini, Izzatul Nabila
Wong, Tze Jin
Koo, Lee Feng
Othman, Mohamed
Md. Said, Mohamad Rushdan
Yiu, Pang Hung
author_facet Sarbini, Izzatul Nabila
Wong, Tze Jin
Koo, Lee Feng
Othman, Mohamed
Md. Said, Mohamad Rushdan
Yiu, Pang Hung
author_sort Sarbini, Izzatul Nabila
collection UPM
description Garbage-man-in-the-middle (type 2) attack is one of the various homomorphic attacks based on its homomorphism nature of cryptosystem. The idea of this attack relies on the possibility to access to the “bin” of recipient. This type of attack requires an access to the “bin” in order to recover the original plaintext. In this paper, an investigation was carried out to evaluate the nature of a homomorphic attack on the Lucas based El-Gamal Cryptosystem in the Elliptic Curve Group over finite field. The result shows that the cryptanalyst is able to obtain the plaintext without knowing the secret number, a, b and R, providing that the receiver decrypts the ciphertexts with a faulty decryption key.
first_indexed 2024-03-06T09:52:54Z
format Conference or Workshop Item
id upm.eprints-66527
institution Universiti Putra Malaysia
language English
last_indexed 2024-03-06T09:52:54Z
publishDate 2018
publisher Institute for Mathematical Research, Universiti Putra Malaysia
record_format dspace
spelling upm.eprints-665272019-03-03T23:55:47Z http://psasir.upm.edu.my/id/eprint/66527/ Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field Sarbini, Izzatul Nabila Wong, Tze Jin Koo, Lee Feng Othman, Mohamed Md. Said, Mohamad Rushdan Yiu, Pang Hung Garbage-man-in-the-middle (type 2) attack is one of the various homomorphic attacks based on its homomorphism nature of cryptosystem. The idea of this attack relies on the possibility to access to the “bin” of recipient. This type of attack requires an access to the “bin” in order to recover the original plaintext. In this paper, an investigation was carried out to evaluate the nature of a homomorphic attack on the Lucas based El-Gamal Cryptosystem in the Elliptic Curve Group over finite field. The result shows that the cryptanalyst is able to obtain the plaintext without knowing the secret number, a, b and R, providing that the receiver decrypts the ciphertexts with a faulty decryption key. Institute for Mathematical Research, Universiti Putra Malaysia 2018 Conference or Workshop Item PeerReviewed text en http://psasir.upm.edu.my/id/eprint/66527/1/Cryptology2018-2.pdf Sarbini, Izzatul Nabila and Wong, Tze Jin and Koo, Lee Feng and Othman, Mohamed and Md. Said, Mohamad Rushdan and Yiu, Pang Hung (2018) Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field. In: 6th International Cryptology and Information Security Conference 2018 (CRYPTOLOGY2018), 9-11 July 2018, Port Dickson, Negeri Sembilan, Malaysia. (pp. 35-41).
spellingShingle Sarbini, Izzatul Nabila
Wong, Tze Jin
Koo, Lee Feng
Othman, Mohamed
Md. Said, Mohamad Rushdan
Yiu, Pang Hung
Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field
title Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field
title_full Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field
title_fullStr Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field
title_full_unstemmed Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field
title_short Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field
title_sort garbage man in the middle type 2 attack on the lucas based el gamal cryptosystem in the elliptic curve group over finite field
url http://psasir.upm.edu.my/id/eprint/66527/1/Cryptology2018-2.pdf
work_keys_str_mv AT sarbiniizzatulnabila garbagemaninthemiddletype2attackonthelucasbasedelgamalcryptosystemintheellipticcurvegroupoverfinitefield
AT wongtzejin garbagemaninthemiddletype2attackonthelucasbasedelgamalcryptosystemintheellipticcurvegroupoverfinitefield
AT kooleefeng garbagemaninthemiddletype2attackonthelucasbasedelgamalcryptosystemintheellipticcurvegroupoverfinitefield
AT othmanmohamed garbagemaninthemiddletype2attackonthelucasbasedelgamalcryptosystemintheellipticcurvegroupoverfinitefield
AT mdsaidmohamadrushdan garbagemaninthemiddletype2attackonthelucasbasedelgamalcryptosystemintheellipticcurvegroupoverfinitefield
AT yiupanghung garbagemaninthemiddletype2attackonthelucasbasedelgamalcryptosystemintheellipticcurvegroupoverfinitefield