VLSI system design using asynchronous wave pipelines: a 0.35 μm CMOS 1.5 GHz elliptic curve public key cryptosystem chip

Author(s):  
O. Hauck ◽  
A. Katoch ◽  
S.A. Huss
2021 ◽  
Vol 10 (11) ◽  
pp. 3439-3447
Author(s):  
T. J. Wong ◽  
L. F. Koo ◽  
F. H. Naning ◽  
A. F. N. Rasedee ◽  
M. M. Magiman ◽  
...  

The public key cryptosystem is fundamental in safeguard communication in cyberspace. This paper described a new cryptosystem analogous to El-Gamal encryption scheme, which utilizing the Lucas sequence and Elliptic Curve. Similar to Elliptic Curve Cryptography (ECC) and Rivest-Shamir-Adleman (RSA), the proposed cryptosystem requires a precise hard mathematical problem as the essential part of security strength. The chosen plaintext attack (CPA) was employed to investigate the security of this cryptosystem. The result shows that the system is vulnerable against the CPA when the sender decrypts a plaintext with modified public key, where the cryptanalyst able to break the security of the proposed cryptosystem by recovering the plaintext even without knowing the secret key from either the sender or receiver.


2021 ◽  
Vol 10 (11) ◽  
pp. 3439-3447
Author(s):  
T. J. Wong ◽  
L. F. Koo ◽  
F. H. Naning ◽  
A. F. N. Rasedee ◽  
M. M. Magiman ◽  
...  

The public key cryptosystem is fundamental in safeguard communication in cyberspace. This paper described a new cryptosystem analogous to El-Gamal encryption scheme, which utilizing the Lucas sequence and Elliptic Curve. Similar to Elliptic Curve Cryptography (ECC) and Rivest-Shamir-Adleman (RSA), the proposed cryptosystem requires a precise hard mathematical problem as the essential part of security strength. The chosen plaintext attack (CPA) was employed to investigate the security of this cryptosystem. The result shows that the system is vulnerable against the CPA when the sender decrypts a plaintext with modified public key, where the cryptanalyst able to break the security of the proposed cryptosystem by recovering the plaintext even without knowing the secret key from either the sender or receiver.


IEEE Spectrum ◽  
1985 ◽  
Vol 22 (2) ◽  
pp. 44-50
Author(s):  
Gaetano Borriello ◽  
Randy H. Katz ◽  
Alan G. Bell ◽  
Lynn Conway

2012 ◽  
Author(s):  
Rajanish K. Kamat ◽  
Santosh A. Shinde ◽  
Pawan K. Gaikwad ◽  
Hansraj Guhilot

1983 ◽  
Vol 15 (5) ◽  
pp. 304
Author(s):  
Manfred A. Ward

2005 ◽  
Vol 168 (1) ◽  
pp. 40-46 ◽  
Author(s):  
Pin-Chang Su ◽  
Erl-Huei Lu ◽  
Henry Ker-Chang Chang

Sign in / Sign up

Export Citation Format

Share Document