[vc_empty_space][vc_empty_space]
Attack Vulnerabilities Analysis of Elgamal Elliptical Curve Based Stegocrypt Using Attack Trees
Rabbani S.A.a, Rahardjo B.a, Wuryandari A.I.a
a Department of Electrical Engineering, Institut Teknologi Bandung, Bandung, Indonesia
[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2018 IEEE.In this modern era, privacy is necessary aspect in security of information exchange. For advanced security of privacy, there is a technique that combine cryptography and steganography, called as stegocrypt. The latest research of stegocrypt has been conducted by combining Elliptical Curve Cryptography (ECC) with Elgamal protocol and steganography technique with noise as the medium. To ensure the system security, vulnerabilities data of the system need to be analyzed. In this research, we propose to analyze the vulnerabilities of this stegocrypt system toward attacks by using attack trees. There are some attacks and the scenarios that can be executed to stegocrypt generated from attack trees model, included the attacks that can be simulated. Simulation of the attacks produce some vulnerabilities in stegocrypt. Stegocrypt technique have vulnerabilities in frequency and distribution of the stegocipher, and these data can be used to broke the steganography system in stegocrypt. In other hand, stegocrypt is vulnerable to proposed integrity attacks and the attacks with location in the beginning of stegonoise have the most impact. From this result, we hope that these vulnerabilties data can be used for the further development of stegocrypt system.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Attack tree,ElGamal,Elliptical curve cryptographies,Elliptical curves,Integrity attacks,Noise,Stegocrypt,System security[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Attack trees,ECC,Elgamal,Noise,Stegocrypt[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICITSI.2018.8695915[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]