Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Muhammad Asyraf Asbullah is active.

Publication


Featured researches published by Muhammad Asyraf Asbullah.


Journal of Physics: Conference Series | 2015

New attacks on RSA with modulus N = p2q using continued fractions

Muhammad Asyraf Asbullah; Muhammad Rezal Kamel Ariffin

In this paper, we propose two new attacks on RSA with modulus N = p2q using continued fractions. Our first attack is based on the RSA key equation ed – (N)k = 1 where (N) = p(p – 1)(q – 1). Assuming that and , we show that can be recovered among the convergents of the continued fraction expansion of . Our second attack is based on the equation eX – (N – (ap2 + bq2)) Y = Z where a,b are positive integers satisfying gcd(a,b) = 1, |ap2 – bq2| < N1/2 and ap2 + bq2 = N2/3+α with 0 < α < 1/3. Given the conditions , we show that one can factor N = p2q in polynomial time.


INNOVATIONS THROUGH MATHEMATICAL AND STATISTICAL RESEARCH: Proceedings of the 2nd International Conference on Mathematical Sciences and Statistics (ICMSS2016) | 2016

Provably secure Rabin-p cryptosystem in hybrid setting

Muhammad Asyraf Asbullah; Muhammad Rezal Kamel Ariffin

In this work, we design an efficient and provably secure hybrid cryptosystem depicted by a combination of the Rabin-p cryptosystem with an appropriate symmetric encryption scheme. We set up a hybrid structure which is proven secure in the sense of indistinguishable against the chosen-ciphertext attack. We presume that the integer factorization problem is hard and the hash function that modeled as a random function.


4TH INTERNATIONAL CONFERENCE ON FUNDAMENTAL AND APPLIED SCIENCES (ICFAS2016) | 2016

Analysis on the Rabin-p cryptosystem

Muhammad Asyraf Asbullah; Muhammad Rezal Kamel Ariffin; Zahari Mahad

This paper presents an analysis toward estimating the algorithm running time on the Rabin-p cryptosystem. Next, we evaluate the memory cost for system parameters and accumulators for the Rabin-p encryption and decryption procedure, respectively. We then conduct a comparative analysis between three Rabin-like cryptosystems, namely the Rabin-p, the Rabin-Takagi and the HIME(R) cryptosystem. In summation, we conclude that Rabin-p cryptosystem performs faster and used less storage in comparison to the other two Rabin-like cryptosystems in consideration.


arXiv: Cryptography and Security | 2013

A new efficient asymmetric cryptosystem based on the integer factorization problem of N=p2q

M. R. K. Ariffin; Muhammad Asyraf Asbullah; N. A. Abu; Z. Mahad; Al-Kindi Cryptography


arXiv: Information Theory | 2012

A New Efficient Asymmetric Cryptosystem Based on the Square Root Problem

Muhammad Rezal Kamel Ariffin; Muhammad Asyraf Asbullah; Nor Azman Abu


Archive | 2014

Fast Decryption Method for a Rabin Primitive-based Cryptosystem

Muhammad Asyraf Asbullah; Muhammad Rezal; Kamel Ariffin; Al-Kindi Cryptography


Archive | 2010

A New Approach to Estimate the Mix Efficiency in Data Envelopment Analysis

Muhammad Asyraf Asbullah; Azmi Jaafar


Archive | 2016

Design of Rabin-like cryptosystem without decryption failure

Muhammad Asyraf Asbullah; Muhammad Rezal Kamel Ariffin


arXiv: Cryptography and Security | 2014

Rabin-

Muhammad Asyraf Asbullah; Muhammad Rezal Kamel Ariffin


arXiv: Cryptography and Security | 2011

p

Muhammad Rezal Kamel Ariffin; Muhammad Asyraf Asbullah; Nor Azman Abu

Collaboration


Dive into the Muhammad Asyraf Asbullah's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zahari Mahad

Universiti Putra Malaysia

View shared research outputs
Top Co-Authors

Avatar

Kamel Ariffin

Universiti Teknologi MARA

View shared research outputs
Top Co-Authors

Avatar

Muhammad Rezal

Universiti Putra Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge