Security analysis of Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field using two types of GMITM attacks

The success of Garbage-man-in-the-middle (GMITM) attack relies on the possibility to access to the ”bin” of recipient in the cryptosystem. It is capable to recover the original plaintext by granting an entry to the ”bin”. There are basically two types of GMITM attacks, a polynomial attack and a hom...

Full description

Saved in:
Bibliographic Details
Main Authors: Sarbini, Izzatul Nabila, Wong, Tze Jin, Koo, Lee Feng, Othman, Mohamed, Md Said, Mohamad Rushdan, Yiu, Pang Hung
Format: Article
Language:English
Published: Malaysian Society for Cryptology Research 2018
Online Access:http://psasir.upm.edu.my/id/eprint/73841/1/LUCAS.pdf
http://psasir.upm.edu.my/id/eprint/73841/
https://mscr.org.my/journal/journal-volume
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first