Probabilistic Encryption--A Comparative Analysis against RSA and ECC

@article{Creado2009ProbabilisticEC,
  title={Probabilistic Encryption--A Comparative Analysis against RSA and ECC},
  author={Orhio Mark Creado and Xianping Wu and Yiling Wang and Phu Dung Le},
  journal={2009 Fourth International Conference on Computer Sciences and Convergence Information Technology},
  year={2009},
  pages={1123-1129}
}
This paper aims to provide a comparative analysis of the probabilistic versus the deterministic security models. We provide a benchmark by practically implementing and comparing three ciphers - Probabilistic Cipher (PC), RSA, and ECC. This paper provides the algorithms to implement these ciphers as well as highlights the operating time and performance of our implementation for varying key sizes of 128/1024, 160/2048, and 192/4096 bits. We target our implementation to justify if the… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-3 OF 3 CITATIONS

AAβ public key cryptosystem - A comparative analysis against RSA and ECC

  • 2012 7th International Conference on Computing and Convergence Technology (ICCCT)
  • 2012
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Implementation of Public Key Crypto Processor with Probabilistic Encryption on FPGA for Nodes in Wireless Sensor Networks

  • 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
  • 2018
VIEW 5 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

References

Publications referenced by this paper.
SHOWING 1-10 OF 20 REFERENCES

Probabilistic Encryption

  • J. Comput. Syst. Sci.
  • 1984
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Elliptic curves and primality proving

VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Cryptographic Key Length Revommendations

D. 24. Giry
  • BlueKrypt - NIST, [cited July 10,
  • 2009
VIEW 1 EXCERPT

A new probabilistic public key algorithm based on elliptic logarithms

15. Neto, R.F.A.C.d.A
  • Brazilian Symposium on Information Security and Computing Systems, [cited Dec 20,
  • 2006
VIEW 2 EXCERPTS

A public-key cryptographic processor for RSA and ECC

  • Proceedings. 15th IEEE International Conference on Application-Specific Systems, Architectures and Processors, 2004.
  • 2004

Atkin’s ECPP (Elliptic Curve Primality Proving) Algorithm, in Department of Mathematics

O. 20. Uzunkol
  • Technical University of Kaiserslautern
  • 2004
VIEW 1 EXCERPT

Similar Papers

Loading similar papers…