5. Conclusion
The encryption scheme presented by Tawalbeh et al. depends on ECDLP but the parameters chosen for performing the encryption operation has got a small order size , not large enough to provide efficient security. The BSGS approach took around 13 s and Pollard’s Rho attack around 1 s to solve the private key from a given public key. Simulation results of the cryptanalysis of Tawalbeh et al. encryption scheme is presented in this paper. If recommended elliptic curve parameter supplied by organizations like NIST or Brainpool are used then the attack using naive approach, BSGS or Pollard’s Rho would be practically infeasible.