Browsing by Author "Lee Feng Koo"
Now showing 1 - 5 of 5
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication A Cubic El-Gamal Encryption Scheme Based On Lucas Sequence And Elliptic Curve(Union of researchers of Macedonia, 2021) ;Tze Jin Wong ;Lee Feng Koo ;Fatin Hana Naning ;Ahmad Fadly Nurullah Bin Rasedee ;Mohamad Maulana MagimanMohammad Hasan Abdul SatharThe public key cryptosystem is fundamental in safeguard communication in cyberspace. This paper described a new cryptosystem analogous to El-Gamal encryption scheme, which utilizing the Lucas sequence and Elliptic Curve. Similar to Elliptic Curve Cryptography (ECC) and Rivest-Shamir-Adleman (RSA), the proposed cryptosystem requires a precise hard mathematical problem as the essential part of security strength. The chosen plaintext attack (CPA) was employed to investigate the security of this cryptosystem. The result shows that the system is vulnerable against the CPA when the sender decrypts a plaintext with modified public key, where the cryptanalyst able to break the security of the proposed cryptosystem by recovering the plaintext even without knowing the secret key from either the sender or receiver. - Some of the metrics are blocked by yourconsent settings
Publication On The Security Comparison Of Luc-Type Cryptosystems Using Chosen Message Attack(Union of researchers of Macedonia, 2020) ;Tze Jin Wong ;Lee Feng Koo ;Fatin Hana Naning ;Pang Hung Yiu ;Ahmad Fadly Nurullah Rasedee ;Mohamad Maulana MagimanMohammad Hasan Abdul SatharThe security of LUC type cryptosystems was investigated. In this study, chosen message attack was employed to analyze the security of LUC, LUC3 and LUC4,6 cryptosystems. The cryptanalyst invades the system by obtaining a signature without the sender’s consent, and use it to break the system. Finding shows that LUC4,6 cryptosystem is more resilient against chosen message attack compare with LUC and LUC3 cryptosystems. - Some of the metrics are blocked by yourconsent settings
Publication Security Analysis On Elliptic Curve Cryptosystem Based On Second Order Lucas Sequence Using Faults Based Attack(Union of researchers of Macedonia, 2020) ;Lee Feng Koo ;Tze Jin Wong ;Fatin Hana Naning ;Pang Hung Yiu ;Mohammad Hasan Abdul SatharAhmad Fadly Nurullah RasedeeElliptic Curve Cryptosystem based on second order Lucas sequenceis a cryptosystem using elliptic curves over finite fields as a mask and incorporate with second order of Lucas sequence. The security of the Elliptic Curve Cryptography cryptosystem depends on the discrete logarithms. In this cryptosystem, Lucas sequence is employed to compute the ciphertext or recover the plaintext. The Elliptic Curve Cryptosystem based on second order Lucas sequence is vulnerable when the bit of the decryption key, $d$ flips by using fault based attack. - Some of the metrics are blocked by yourconsent settings
Publication Security Analysis on LUC-type Cryptosystems Using Common Modulus Attack(Semarak Ilmu Publishing, 2023) ;Izzatul Nabila Sarbin ;Tze Jin Wong ;Lee Feng Koo ;Ahmad Fadly Nurullah Rasedee ;Fatin Hana NaningMohammad Hasan Abdul SatharLUC-type cryptosystems are asymmetric key cryptosystems based on the Lucas sequence that is extended from RSA. The security challenge is comparable to RSA, which is based on the intractability of factoring a large number. This paper analysed the security of LUC, LUC3, and LUC4,6 cryptosystems using a common modulus attack.For a common modulus attack to be successful, a message must be transmitted to two distinct receivers with the same modulus. The strengths and limitations of the LUC, LUC3, and LUC4,6 cryptosystems when subjected to a common modulus attack were discussed as well. The results reveal that the LUC4,6 cryptosystem provides greater security than the LUC and LUC3. - Some of the metrics are blocked by yourconsent settings
Publication Two-Point Block Variable Order Step Size Multistep Method for Solving Higher Order Ordinary Differential Equations Directly(Elsevier, 2021-03) ;Ahmad Fadly Nurullah Rasedee ;Mohammad Hasan Abdul Sathar ;Siti Raihana Hamzah ;Norizarina Ishak ;Tze Jin Wong ;Lee Feng KooSiti Nur Iqmal IbrahimThe current research aims to provide a viable numerical method for solving difficult engineering and science problems which are in the form of higher order ordinary differential equations. The proposed method approximates these ordinary differential equations using Newton-Gregory backward difference polynomial in predictor–corrector mode. The predictor–corrector algorithm is then fitted with a variable order step size algorithm to reduce computational cost. The variable order stepsize algorithm allows the method to predetermine the preferred level of accuracy with the added advantage of less computational cost. The method is subsequently programmed with a two-point block formulation which can be altered for parallel programming. This research also discusses order and stepsize strategies of the variable order stepsize algorithm. Stability and convergence estimations of the method are also established. Numerical results obtained will validate the accuracy and efficiency of the method using various types of linear and nonlinear higher order ordinary differential equations