Orhio Mark Creado, Xianping Wu, Yiling Wang, P. D. Le
{"title":"Probabilistic Encryption--A Comparative Analysis against RSA and ECC","authors":"Orhio Mark Creado, Xianping Wu, Yiling Wang, P. D. Le","doi":"10.1109/ICCIT.2009.217","DOIUrl":null,"url":null,"abstract":"This paper aims to provide a comparative analysis of the probabilistic versus the deterministic security models. We provide a benchmark by practically implementing and comparing three ciphers - Probabilistic Cipher (PC), RSA, and ECC. This paper provides the algorithms to implement these ciphers as well as highlights the operating time and performance of our implementation for varying key sizes of 128/1024, 160/2048, and 192/4096 bits. We target our implementation to justify if the probabilistic model can perform equivalently against the deterministic model so as to be considered to be used in more practical scenarios today.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIT.2009.217","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
This paper aims to provide a comparative analysis of the probabilistic versus the deterministic security models. We provide a benchmark by practically implementing and comparing three ciphers - Probabilistic Cipher (PC), RSA, and ECC. This paper provides the algorithms to implement these ciphers as well as highlights the operating time and performance of our implementation for varying key sizes of 128/1024, 160/2048, and 192/4096 bits. We target our implementation to justify if the probabilistic model can perform equivalently against the deterministic model so as to be considered to be used in more practical scenarios today.