Muhammad Asyraf Asbullah
Universiti Putra Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Muhammad Asyraf Asbullah.
Journal of Physics: Conference Series | 2015
Muhammad Asyraf Asbullah; Muhammad Rezal Kamel Ariffin
In this paper, we propose two new attacks on RSA with modulus N = p2q using continued fractions. Our first attack is based on the RSA key equation ed – (N)k = 1 where (N) = p(p – 1)(q – 1). Assuming that and , we show that can be recovered among the convergents of the continued fraction expansion of . Our second attack is based on the equation eX – (N – (ap2 + bq2)) Y = Z where a,b are positive integers satisfying gcd(a,b) = 1, |ap2 – bq2| < N1/2 and ap2 + bq2 = N2/3+α with 0 < α < 1/3. Given the conditions , we show that one can factor N = p2q in polynomial time.
INNOVATIONS THROUGH MATHEMATICAL AND STATISTICAL RESEARCH: Proceedings of the 2nd International Conference on Mathematical Sciences and Statistics (ICMSS2016) | 2016
Muhammad Asyraf Asbullah; Muhammad Rezal Kamel Ariffin
In this work, we design an efficient and provably secure hybrid cryptosystem depicted by a combination of the Rabin-p cryptosystem with an appropriate symmetric encryption scheme. We set up a hybrid structure which is proven secure in the sense of indistinguishable against the chosen-ciphertext attack. We presume that the integer factorization problem is hard and the hash function that modeled as a random function.
4TH INTERNATIONAL CONFERENCE ON FUNDAMENTAL AND APPLIED SCIENCES (ICFAS2016) | 2016
Muhammad Asyraf Asbullah; Muhammad Rezal Kamel Ariffin; Zahari Mahad
This paper presents an analysis toward estimating the algorithm running time on the Rabin-p cryptosystem. Next, we evaluate the memory cost for system parameters and accumulators for the Rabin-p encryption and decryption procedure, respectively. We then conduct a comparative analysis between three Rabin-like cryptosystems, namely the Rabin-p, the Rabin-Takagi and the HIME(R) cryptosystem. In summation, we conclude that Rabin-p cryptosystem performs faster and used less storage in comparison to the other two Rabin-like cryptosystems in consideration.
arXiv: Cryptography and Security | 2013
M. R. K. Ariffin; Muhammad Asyraf Asbullah; N. A. Abu; Z. Mahad; Al-Kindi Cryptography
arXiv: Information Theory | 2012
Muhammad Rezal Kamel Ariffin; Muhammad Asyraf Asbullah; Nor Azman Abu
Archive | 2014
Muhammad Asyraf Asbullah; Muhammad Rezal; Kamel Ariffin; Al-Kindi Cryptography
Archive | 2010
Muhammad Asyraf Asbullah; Azmi Jaafar
Archive | 2016
Muhammad Asyraf Asbullah; Muhammad Rezal Kamel Ariffin
arXiv: Cryptography and Security | 2014
Muhammad Asyraf Asbullah; Muhammad Rezal Kamel Ariffin
arXiv: Cryptography and Security | 2011
Muhammad Rezal Kamel Ariffin; Muhammad Asyraf Asbullah; Nor Azman Abu