Browsing by Author "Pang Hung Yiu"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication On The Security Comparison Of Luc-Type Cryptosystems Using Chosen Message Attack(Union of researchers of Macedonia, 2020) ;Tze Jin Wong ;Lee Feng Koo ;Fatin Hana Naning ;Pang Hung Yiu ;Ahmad Fadly Nurullah Rasedee ;Mohamad Maulana MagimanMohammad Hasan Abdul SatharThe security of LUC type cryptosystems was investigated. In this study, chosen message attack was employed to analyze the security of LUC, LUC3 and LUC4,6 cryptosystems. The cryptanalyst invades the system by obtaining a signature without the sender’s consent, and use it to break the system. Finding shows that LUC4,6 cryptosystem is more resilient against chosen message attack compare with LUC and LUC3 cryptosystems. - Some of the metrics are blocked by yourconsent settings
Publication Security Analysis On Elliptic Curve Cryptosystem Based On Second Order Lucas Sequence Using Faults Based Attack(Union of researchers of Macedonia, 2020) ;Lee Feng Koo ;Tze Jin Wong ;Fatin Hana Naning ;Pang Hung Yiu ;Mohammad Hasan Abdul SatharAhmad Fadly Nurullah RasedeeElliptic Curve Cryptosystem based on second order Lucas sequenceis a cryptosystem using elliptic curves over finite fields as a mask and incorporate with second order of Lucas sequence. The security of the Elliptic Curve Cryptography cryptosystem depends on the discrete logarithms. In this cryptosystem, Lucas sequence is employed to compute the ciphertext or recover the plaintext. The Elliptic Curve Cryptosystem based on second order Lucas sequence is vulnerable when the bit of the decryption key, $d$ flips by using fault based attack.