Limit search to available items
CD-ROM
Author Creado, Orhio Mark, author

Title Probabilistic cipher : theoretical analysis through practical implementation and comparison against RSA & ECC / Orhio Mark Creado
Published South Melbourne, Vic. : AMS Imaging, [20--]

Copies

Location Call no. Vol. Availability
 MELB  005.82 Cre/Pct  AVAILABLE
Description 1 CD-ROM ; 12 cm
4 3/4 in
Summary Complete security is a vital component of modern day public key cryptosystems alongside the requirement for complete secrecy. Traditional encryption algorithms of RSA and ECC are deterministic and hence have not provided complete semantic security. The data protected by these algorithms can be subject to various attacks and could potentially be decrypted just by random guessing or poorly selected field parameters. To alleviate this possibility, we have researched on the fundamental aspects behind Goldwasser and Micali's proposal of a probabilistic encryption model; which they claimed to be offering complete semantic security. However, despite the benefits, the probabilistic encryption model has been deemed impractical and has not received much attention in practice. This thesis has provided an in-depth insight into the design and implementation of a probabilistic cipher based on its original algorithm proposed and has also provided a statistical analysis of the operating time of the cipher for various key sizes and message spaces. To compensate for the lack of a published benchmark in term of literature or software, we have also implemented a working model of two commonplace ciphers of RSA and ECC which are frequently used in commercial applications. We then provide a comparative analysis of the three ciphers to provide a better understanding of the behavior and characteristics of the ciphers for the encryption and decryption operations. This thesis has strived to pioneer in an area not thoroughly researched and might be the first of its kind to actually provide a comparison of three ciphers. We use the results obtained not to generalize and make a comment as to which cipher is better, but instead target our results to assist in making the decision of the choice of cipher for any application. We have provided an analysis of the ciphers not just by benchmarking performance in terms of operating time for encryption and decryption; we also ensure the same level of security has been offered by each cipher. It is essential to incorporate security in any cryptosystem, but without the knowledge of the cipher characteristics and its performance against similar alternatives, the justification behind the choice of cipher used is made purely due to the lack of a better option. This thesis has practically implemented a working model of three ciphers - Probabilistic Cipher, RSA and ECC. The implementation has been implemented on the Windows Vista and Ubuntu Linux operating systems and performs the key generation, encryption, and decryption operations for key sizes of 128/1024, 160/2048, and 192/4096 bits operating on message spaces of 750, 1500, 3000, and 5000 bits respectively. We have accounted for the variations amongst the ciphers and hence modify our implementation to accommodate for these variations. We target our comparative analysis primarily towards the encryption and decryption operations. In this sense, the thesis has tried to answer the question if the theory behind the probabilistic encryption model by Goldwasser and Micali is practically implementable and, if so, how does it actually compare to other commercial alternatives?
Notes Published on demand
Bibliography Includes bibliographical references: pages 187-190
Notes Thesis presented in partial fulfillment of the requirements for the degree of Master of Information Technology (Professional)
Thesis (M.I.T.) -- Monash University, 2009
File Type Electronic reproduction in PDF form
Notes Original version: xi, 190 pages
Subject Data encryption (Computer science)
Computer security.
Coding theory.
Cryptography.
Genre/Form Academic theses.
Author Monash University, degree granting institution