Cryptanalysis and improvement of an encryption scheme that uses elliptic curves over finite fields

被引:0
|
作者
Bashir, Malik Zia Ullah [1 ]
Ali, Rashid [1 ]
机构
[1] Capital Univ Sci & Technol, Dept Math, Islamabad, Pakistan
关键词
Cryptanalysis; elliptic curve cryptography; encryption; finite field; information security; AUTHENTICATION; SIGNCRYPTION;
D O I
10.48129/kjs.v49i1.8325
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In this paper, we cryptanalyzed a recently proposed encryption scheme that uses elliptic curves over a finite field. The security of the proposed scheme depends upon the elliptic curve discrete logarithm problem. Two secret keys are used to increase the security strength of the scheme as compared to traditionally used schemes that are based on one secret key. In this scheme, if an adversary gets one secret key then he is unable to get the contents of the original message without the second secret key. Our analysis shows that the proposed scheme is not secure and unable to provide the basic security requirements of the encryption scheme. Due to our successful cryptanalysis, an adversary can get the contents of the original message without the knowledge of the secret keys of the receiver. To mount the attack, Mallory first gets the transmitted ciphertext and then uses public keys of the receiver and global parameters of the scheme to recover the associated plaintext message. To overcome the security flaws, we introduced an improved version of the scheme.
引用
收藏
页数:11
相关论文
共 50 条
  • [41] Constructions of LDPCs From Elliptic Curves Over Finite Fields
    Saouter, Yannick
    IEEE COMMUNICATIONS LETTERS, 2017, 21 (12) : 2558 - 2561
  • [42] Small discriminants of complex multiplication fields of elliptic curves over finite fields
    Igor E. Shparlinski
    Czechoslovak Mathematical Journal, 2015, 65 : 381 - 388
  • [43] Small discriminants of complex multiplication fields of elliptic curves over finite fields
    Shparlinski, Igor E.
    CZECHOSLOVAK MATHEMATICAL JOURNAL, 2015, 65 (02) : 381 - 388
  • [44] A Simple Encryption Scheme for Binary Elliptic Curves
    King, Brian
    SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 273 - 280
  • [45] Towers of function fields over finite fields corresponding to elliptic modular curves
    Hasegawa, Takehiro
    Inuzuka, Miyoko
    Suzuki, Takafumi
    FINITE FIELDS AND THEIR APPLICATIONS, 2012, 18 (01) : 1 - 18
  • [46] Cryptanalysis and improvement of a certificateless encryption scheme in the standard model
    Cheng, Lin
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    FRONTIERS OF COMPUTER SCIENCE, 2014, 8 (01) : 163 - 173
  • [47] Cryptanalysis and improvement of a certificateless encryption scheme in the standard model
    Lin CHENG
    Qiaoyan WEN
    Zhengping JIN
    Hua ZHANG
    Frontiers of Computer Science, 2014, 8 (01) : 163 - 173
  • [48] Cryptanalysis and improvement of a certificateless encryption scheme in the standard model
    Lin Cheng
    Qiaoyan Wen
    Zhengping Jin
    Hua Zhang
    Frontiers of Computer Science, 2014, 8 : 163 - 173
  • [49] On a class of pseudorandom sequences from elliptic curves over finite fields
    Hu, Honggang
    Hu, Lei
    Feng, Dengguo
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2007, 53 (07) : 2598 - 2605
  • [50] Montgomery algorithm on elliptic curves over finite fields of character three
    State Key Laboratory of Information Security, Graduate University, Chinese Academy of Sciences, Beijing 100049, China
    不详
    Tongxin Xuebao, 2008, 10 (25-29+36):