Determination of a good indicator for estimated prime factor and its modification in Fermat's factoring algorithm

RRM Tahir, MA Asbullah, MRK Ariffin, Z Mahad - Symmetry, 2021 - mdpi.com
Fermat's Factoring Algorithm (FFA) is an integer factorisation methods factoring the modulus
N using exhaustive search. The appearance of the Estimated Prime Factor (EPF) method …

Effect of self-invertible matrix on cipher hexagraphic polyfunction

SLP Ching, F Yunos - Cryptography, 2019 - mdpi.com
A cryptography system was developed previously based on Cipher Polygraphic Polyfunction
transformations, C i× j (t)≡ A i× it P i× jmod N where C i× j, P i× j, A i× i are cipher text, plain …

On the insecurity of generalized (Rivest-Shamir-Adleman)-advance and adaptable cryptosystem

MAM Isa, NNA Rahmany, MA Asbullah… - Journal of Physics …, 2019 - iopscience.iop.org
This paper explores the security claims of the Generalized (Rivest-Shamir-Adleman)-
Advance and Adaptable Cryptosystem, in short the GRSA-AA cryptosystem. In the GRSA-AA …

[PDF][PDF] A New Improved Bound for Short Decryption Exponent on RSA Modulus using Wiener's Method

SI Abubakar, MRK Ariffin… - Malaysian Journal of …, 2019 - mjms.upm.edu.my
A New Improved Bound for Short Decryption Exponent on RSA Modulus N = pq using
Wiener’s Method Page 1 Malaysian Journal of Mathematical Sciences 13(S) April: 89–99 (2019) …

CRYPTANALYSIS OF RSA KEY EQUATION OF N= p^ 2q FOR SMALL| 2q –p| USING CONTINUED FRACTION

MA Asbullah, NN Abd Rahman… - … Journal of Science, 2020 - samudera.um.edu.my
This paper presents a new factoring technique on the modulus, where and are large prime
numbers. Suppose there exists an integer satisfies the equation, for some unknown integer …

[PDF][PDF] Use of the CFEA Lossless Data Compression Method in Transmitting Encrypted Modified Baptista Symmetric Chaotic Cryptosystem Data

MA Daud, Z Mahad, MRA Rasit, MA Asbullah - scholar.archive.org
To confirm applicability of a modified Baptista symmetric cryptosystem that is based on the
chaotic dynamical system, the CFEA compression algorithm was used. Various ciphers that …

[PDF][PDF] Successful Cryptanalysis upon a Generalized RSA Key Equation

NN Abd Rahman, MRK Ariffin, MA Asbullah - akademisains.gov.my
The idea to utilize key e to encrypt and key d to decrypt came from the seminal work by Diffie
and Hellman, 1976 where e= d. This idea radicalized the secure communication concept …