
This paper aims to provide a comparative analysis of the probabilistic versus the deterministic security models. We provide a benchmark by practically implementing and comparing three ciphers - Probabilistic Cipher (PC), RSA, and ECC. This paper provides the algorithms to implement these ciphers as well as highlights the operating time and performance of our implementation for varying key sizes of 128/1024, 160/2048, and 192/4096 bits. We target our implementation to justify if the probabilistic model can perform equivalently against the deterministic model so as to be considered to be used in more practical scenarios today.
| citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 4 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
