Orhio Mark Creado, Xianping Wu, Yiling Wang, P. D. Le
{"title":"概率加密——RSA和ECC的比较分析","authors":"Orhio Mark Creado, Xianping Wu, Yiling Wang, P. D. Le","doi":"10.1109/ICCIT.2009.217","DOIUrl":null,"url":null,"abstract":"This paper aims to provide a comparative analysis of the probabilistic versus the deterministic security models. We provide a benchmark by practically implementing and comparing three ciphers - Probabilistic Cipher (PC), RSA, and ECC. This paper provides the algorithms to implement these ciphers as well as highlights the operating time and performance of our implementation for varying key sizes of 128/1024, 160/2048, and 192/4096 bits. We target our implementation to justify if the probabilistic model can perform equivalently against the deterministic model so as to be considered to be used in more practical scenarios today.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Probabilistic Encryption--A Comparative Analysis against RSA and ECC\",\"authors\":\"Orhio Mark Creado, Xianping Wu, Yiling Wang, P. D. Le\",\"doi\":\"10.1109/ICCIT.2009.217\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper aims to provide a comparative analysis of the probabilistic versus the deterministic security models. We provide a benchmark by practically implementing and comparing three ciphers - Probabilistic Cipher (PC), RSA, and ECC. This paper provides the algorithms to implement these ciphers as well as highlights the operating time and performance of our implementation for varying key sizes of 128/1024, 160/2048, and 192/4096 bits. We target our implementation to justify if the probabilistic model can perform equivalently against the deterministic model so as to be considered to be used in more practical scenarios today.\",\"PeriodicalId\":112416,\"journal\":{\"name\":\"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology\",\"volume\":\"68 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-11-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCIT.2009.217\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIT.2009.217","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Probabilistic Encryption--A Comparative Analysis against RSA and ECC
This paper aims to provide a comparative analysis of the probabilistic versus the deterministic security models. We provide a benchmark by practically implementing and comparing three ciphers - Probabilistic Cipher (PC), RSA, and ECC. This paper provides the algorithms to implement these ciphers as well as highlights the operating time and performance of our implementation for varying key sizes of 128/1024, 160/2048, and 192/4096 bits. We target our implementation to justify if the probabilistic model can perform equivalently against the deterministic model so as to be considered to be used in more practical scenarios today.