AAβ Public Key Cryptosystem - A Comparative Analysis Against RSA and ECC

被引:0
|
作者
Ariffin, M. R. K. [1 ]
Mahad, Z. [1 ]
机构
[1] Univ Putra Malaysia, Inst Math Res, Al Kindi Cryptog Res Labarotary, Kuala Lumpur, Malaysia
关键词
probabilistic cipher; public-key cryptosystem; AA(beta) cryptosystem; comparative analysis; cipher implementation;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper aims to provide a comparative analysis between probabilistic and deterministic security models. We provide a benchmark by practically implementing and comparing three ciphers - AA(beta), RSA and ECC. This paper provides the algorithms to implement these ciphers as well as highlights the operating time and performance for varying key sizes of 128/1024/3072, 160/2048/6144 and 192/4096/12288 bits. We target our implementation to justify if the probabilistic model - AA(beta), can perform equivalently against deterministic models so as to be considered to be used in practical scenarios today.
引用
收藏
页码:589 / 594
页数:6
相关论文
共 50 条
  • [41] An improved Montgomery's algorithm for high-speed RSA public-key cryptosystem
    Su, CY
    Hwang, SA
    Chen, PS
    Wu, CW
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 1999, 7 (02) : 280 - 284
  • [42] A database record encryption scheme using the RSA public key cryptosystem and its master keys
    Chang, CC
    Chan, CW
    2003 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2003, : 345 - 348
  • [43] Unified signed-digit number adder for RSA and ECC public-key cryptosystems
    Wang, Yi
    Maskell, Douglas L.
    Leiwo, Jussipekka
    Srikanthan, Thambipillai
    2006 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS, 2006, : 1655 - +
  • [44] Performance Analysis of Montgomery Multiplier for Public Key Cryptosystem
    Kakde, Sandeep
    Somulu, G.
    Zode, Pravin
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [45] Security Analysis of an Improved MFE Public Key Cryptosystem
    Nie, Xuyun
    Xu, Zhaohu
    Lu, Li
    Liao, Yongjian
    CRYPTOLOGY AND NETWORK SECURITY, 2011, 7092 : 118 - 125
  • [46] A NONLINEAR PUBLIC KEY CRYPTOSYSTEM
    WEBB, WA
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1988, 15 (02) : 81 - 84
  • [47] Power analysis and countermeasure of RSA cryptosystem
    Kaminaga, M
    Watanabe, T
    Endo, T
    Okochi, T
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART III-FUNDAMENTAL ELECTRONIC SCIENCE, 2006, 89 (08): : 10 - 20
  • [48] A PUBLIC KEY ANALOG CRYPTOSYSTEM
    DAVIDA, GI
    WALTER, GG
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 304 : 143 - 147
  • [49] An efficient public key cryptosystem secure against chosen ciphertext attack
    Ghodosi, Hossein
    Information Systems Security, Proceedings, 2006, 4332 : 303 - 314
  • [50] Fault Analysis Detection in Public Key Cryptosystems (RSA)
    Mamathashree, A. M.
    Remya, K.
    Kumar, Santhosh B. J.
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 505 - 508