Lee Feng KooTze Jin WongFatin Hana NaningPang Hung YiuMohammad Hasan Abdul SatharAhmad Fadly Nurullah Rasedee2024-05-282024-05-28202021/12/20201857-8365https://doi.org/10.37418/amsj.9.12.69https://research-publication.com/wp-content/uploads/2020/vol-9-n12/AMSJ-2020-N12-69.pdfhttps://oarep.usim.edu.my/handle/123456789/5660Volume :9 No: 12Elliptic Curve Cryptosystem based on second order Lucas sequenceis a cryptosystem using elliptic curves over finite fields as a mask and incorporate with second order of Lucas sequence. The security of the Elliptic Curve Cryptography cryptosystem depends on the discrete logarithms. In this cryptosystem, Lucas sequence is employed to compute the ciphertext or recover the plaintext. The Elliptic Curve Cryptosystem based on second order Lucas sequence is vulnerable when the bit of the decryption key, $d$ flips by using fault based attack.en-USdecryption, elliptic curve, encryption, keys, Lucas sequenceSecurity Analysis On Elliptic Curve Cryptosystem Based On Second Order Lucas Sequence Using Faults Based AttackArticle1084510854912