Title :
Probabilistic Encryption--A Comparative Analysis against RSA and ECC
Author :
Creado, Orhio Mark ; Wu, Xianping ; Wang, Yiling ; Le, Phu Dung
Author_Institution :
Caulfield Sch. of Inf. Technol., Monash Univ., Melbourne, VIC, Australia
Abstract :
This paper aims to provide a comparative analysis of the probabilistic versus the deterministic security models. We provide a benchmark by practically implementing and comparing three ciphers - probabilistic cipher (PC), RSA, and ECC. This paper provides the algorithms to implement these ciphers as well as highlights the operating time and performance of our implementation for varying key sizes of 128/1024, 160/2048, and 192/4096 bits. We target our implementation to justify if the probabilistic model can perform equivalently against the deterministic model so as to be considered to be used in more practical scenarios today.
Keywords :
probability; public key cryptography; ECC; RSA; deterministic model; deterministic security models; probabilistic cipher; probabilistic encryption; Communication effectiveness; Computer security; Costs; Digital signatures; Elliptic curve cryptography; Information analysis; Information security; Information technology; Internet; Protocols; Atkin Morain; Cipher Implementation; Comparative Analysis; Probabilistic Cipher; Probabilistic Encryption;
Conference_Titel :
Computer Sciences and Convergence Information Technology, 2009. ICCIT '09. Fourth International Conference on
Conference_Location :
Seoul
Print_ISBN :
978-1-4244-5244-6
Electronic_ISBN :
978-0-7695-3896-9
DOI :
10.1109/ICCIT.2009.217