Security analysis of Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field using two types of GMITM attacks
The success of Garbage-man-in-the-middle (GMITM) attack relies on the possibility to access to the ”bin” of recipient in the cryptosystem. It is capable to recover the original plaintext by granting an entry to the ”bin”. There are basically two types of GMITM attacks, a polynomial attack and a hom...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Malaysian Society for Cryptology Research
2018
|
Online Access: | http://psasir.upm.edu.my/id/eprint/73841/1/LUCAS.pdf |