2019
DOI: 10.5373/jardcs/v11sp12/20193279
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Attack on LUC-Type Cryptosystems Using GMITM (Type 1)

Abstract: Garbage-man-in-the-middle (type 1) attack is an attack exploit the polynomial structure of LUC-type cryptosystems and depends on the possibility to get the faulty plaintext in the bin of the receiver. This paper reports an investigation for LUC-type cryptosystems under garbage-man-in-the middle (type 1) attack. Among all LUC-type cryptosystems, LUC, LUC3, and LUC4, 6 are selected to analyze their security. Results show that the attack fully success into the selected LUC-type cryptosystems under certain conditi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The PSO method outperforms the Weighted Rendezvous Planning algorithm, according to experimental findings. In similar study, Sarbini et al, [40] used a well-known modulus attack to assess LUC, LUC3, and LUC4,6 cryptosystems security factors.…”
Section: Literature Surveymentioning
confidence: 99%
“…The PSO method outperforms the Weighted Rendezvous Planning algorithm, according to experimental findings. In similar study, Sarbini et al, [40] used a well-known modulus attack to assess LUC, LUC3, and LUC4,6 cryptosystems security factors.…”
Section: Literature Surveymentioning
confidence: 99%
“…The advancement in cloud security has allowed computation on the encrypted data, however, requires them in a dynamic state. This is different from traditional encryption which has a static ciphertext such as RSA [1] and LUC-type cryptosystem [2]. Fortunately, a breakthrough Fully Homomorphic Encryption (FHE) by Gentry & Halevi [3] offers flexibility to allow unlimited arbitrary computation on the ciphertext without the need for decryption.…”
Section: Introductionmentioning
confidence: 99%