Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field
Garbage-man-in-the-middle (type 2) attack is one of the various homomorphic attacks based on its homomorphism nature of cryptosystem. The idea of this attack relies on the possibility to access to the “bin” of recipient. This type of attack requires an access to the “bin” in order to recover the ori...
Main Authors: | , , , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
Institute for Mathematical Research, Universiti Putra Malaysia
2018
|
Online Access: | http://psasir.upm.edu.my/id/eprint/66527/1/Cryptology2018-2.pdf |
_version_ | 1825933152746471424 |
---|---|
author | Sarbini, Izzatul Nabila Wong, Tze Jin Koo, Lee Feng Othman, Mohamed Md. Said, Mohamad Rushdan Yiu, Pang Hung |
author_facet | Sarbini, Izzatul Nabila Wong, Tze Jin Koo, Lee Feng Othman, Mohamed Md. Said, Mohamad Rushdan Yiu, Pang Hung |
author_sort | Sarbini, Izzatul Nabila |
collection | UPM |
description | Garbage-man-in-the-middle (type 2) attack is one of the various homomorphic attacks based on its homomorphism nature of cryptosystem. The idea of this attack relies on the possibility to access to the “bin” of recipient. This type of attack requires an access to the “bin” in order to recover the original plaintext. In this paper, an investigation was carried out to evaluate the nature of a homomorphic attack on the Lucas based El-Gamal Cryptosystem in the Elliptic Curve Group over finite field. The result shows that the cryptanalyst is able to obtain the plaintext without knowing the secret number, a, b and R, providing that the receiver decrypts the ciphertexts with a faulty decryption key. |
first_indexed | 2024-03-06T09:52:54Z |
format | Conference or Workshop Item |
id | upm.eprints-66527 |
institution | Universiti Putra Malaysia |
language | English |
last_indexed | 2024-03-06T09:52:54Z |
publishDate | 2018 |
publisher | Institute for Mathematical Research, Universiti Putra Malaysia |
record_format | dspace |
spelling | upm.eprints-665272019-03-03T23:55:47Z http://psasir.upm.edu.my/id/eprint/66527/ Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field Sarbini, Izzatul Nabila Wong, Tze Jin Koo, Lee Feng Othman, Mohamed Md. Said, Mohamad Rushdan Yiu, Pang Hung Garbage-man-in-the-middle (type 2) attack is one of the various homomorphic attacks based on its homomorphism nature of cryptosystem. The idea of this attack relies on the possibility to access to the “bin” of recipient. This type of attack requires an access to the “bin” in order to recover the original plaintext. In this paper, an investigation was carried out to evaluate the nature of a homomorphic attack on the Lucas based El-Gamal Cryptosystem in the Elliptic Curve Group over finite field. The result shows that the cryptanalyst is able to obtain the plaintext without knowing the secret number, a, b and R, providing that the receiver decrypts the ciphertexts with a faulty decryption key. Institute for Mathematical Research, Universiti Putra Malaysia 2018 Conference or Workshop Item PeerReviewed text en http://psasir.upm.edu.my/id/eprint/66527/1/Cryptology2018-2.pdf Sarbini, Izzatul Nabila and Wong, Tze Jin and Koo, Lee Feng and Othman, Mohamed and Md. Said, Mohamad Rushdan and Yiu, Pang Hung (2018) Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field. In: 6th International Cryptology and Information Security Conference 2018 (CRYPTOLOGY2018), 9-11 July 2018, Port Dickson, Negeri Sembilan, Malaysia. (pp. 35-41). |
spellingShingle | Sarbini, Izzatul Nabila Wong, Tze Jin Koo, Lee Feng Othman, Mohamed Md. Said, Mohamad Rushdan Yiu, Pang Hung Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field |
title | Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field |
title_full | Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field |
title_fullStr | Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field |
title_full_unstemmed | Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field |
title_short | Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field |
title_sort | garbage man in the middle type 2 attack on the lucas based el gamal cryptosystem in the elliptic curve group over finite field |
url | http://psasir.upm.edu.my/id/eprint/66527/1/Cryptology2018-2.pdf |
work_keys_str_mv | AT sarbiniizzatulnabila garbagemaninthemiddletype2attackonthelucasbasedelgamalcryptosystemintheellipticcurvegroupoverfinitefield AT wongtzejin garbagemaninthemiddletype2attackonthelucasbasedelgamalcryptosystemintheellipticcurvegroupoverfinitefield AT kooleefeng garbagemaninthemiddletype2attackonthelucasbasedelgamalcryptosystemintheellipticcurvegroupoverfinitefield AT othmanmohamed garbagemaninthemiddletype2attackonthelucasbasedelgamalcryptosystemintheellipticcurvegroupoverfinitefield AT mdsaidmohamadrushdan garbagemaninthemiddletype2attackonthelucasbasedelgamalcryptosystemintheellipticcurvegroupoverfinitefield AT yiupanghung garbagemaninthemiddletype2attackonthelucasbasedelgamalcryptosystemintheellipticcurvegroupoverfinitefield |