Criptografia de curvas elípticas

Detalhes bibliográficos
Autor(a) principal: Angulo, Rigo Julian Osorio
Data de Publicação: 2017
Tipo de documento: Dissertação
Idioma: por
Título da fonte: Biblioteca Digital de Teses e Dissertações da UFG
Texto Completo: http://repositorio.bc.ufg.br/tede/handle/tede/6976
Resumo: According to history, the main objective of cryptography was always to provide security in communications, to keep them out of the reach of unauthorized entities. However, with the advent of the era of computing and telecommunications, applications of encryption expanded to offer security, to the ability to: verify if a message was not altered by a third party, to be able to verify if a user is who claims to be, among others. In this sense, the cryptography of elliptic curves, offers certain advantages over their analog systems, referring to the size of the keys used, which results in the storage capacity of the devices with certain memory limitations. Thus, the objective of this work is to offer the necessary mathematical tools for the understanding of how elliptic curves are used in public key cryptography.
id UFG_8ad6f7f35c2be5b28a174187f4a77aae
oai_identifier_str oai:repositorio.bc.ufg.br:tede/6976
network_acronym_str UFG
network_name_str Biblioteca Digital de Teses e Dissertações da UFG
repository_id_str 3208
spelling Chaves, Ana Paula de Araújohttp://lattes.cnpq.br/2332073500640724Chaves, Ana Paula de Araújohttp://lattes.cnpq.br/2332073500640724Rodrigues, Paulo Henrique de AzevedoGodinho, Hemar Teixeirahttp://lattes.cnpq.br/3433250017883225Angulo, Rigo Julian Osorio2017-03-21T12:06:48Z2017-03-15ANGULO, R. J. O. Criptografia de curvas elípticas. 2017. 100 f. Dissertação (Mestrado em Matemática) - Universidade Federal de Goiás, Goiânia, 2017.http://repositorio.bc.ufg.br/tede/handle/tede/6976According to history, the main objective of cryptography was always to provide security in communications, to keep them out of the reach of unauthorized entities. However, with the advent of the era of computing and telecommunications, applications of encryption expanded to offer security, to the ability to: verify if a message was not altered by a third party, to be able to verify if a user is who claims to be, among others. In this sense, the cryptography of elliptic curves, offers certain advantages over their analog systems, referring to the size of the keys used, which results in the storage capacity of the devices with certain memory limitations. Thus, the objective of this work is to offer the necessary mathematical tools for the understanding of how elliptic curves are used in public key cryptography.Segundo a história, o objetivo principal da criptografia sempre foi oferecer segurança nas comunicações, para mantê-las fora do alcance de entidades não autorizadas. No entanto, com o advento da era da computação e as telecomunicações, as aplicações da criptografia se expandiram para oferecer além de segurança, a capacidade de: verificar que uma mensagem não tenha sido alterada por um terceiro, poder verificar que um usuário é quem diz ser, entre outras. Neste sentido, a criptografia de curvas elípticas, oferece certas ventagens sobre seu sistemas análogos, referentes ao tamanho das chaves usadas, redundando isso na capacidade de armazenamento dos dispositivos com certas limitações de memória. Assim, o objetivo deste trabalho é fornecer ao leitor as ferramentas matemáticas necessá- rias para a compreensão de como as curvas elípticas são usadas na criptografia de chave pública.Submitted by JÚLIO HEBER SILVA (julioheber@yahoo.com.br) on 2017-03-20T17:15:17Z No. of bitstreams: 2 Dissertação - Rigo Julian Osorio Angulo - 2017.pdf: 1795543 bytes, checksum: 4342f624ff7c02485e9e888135bcbc18 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)Approved for entry into archive by Luciana Ferreira (lucgeral@gmail.com) on 2017-03-21T12:06:48Z (GMT) No. of bitstreams: 2 Dissertação - Rigo Julian Osorio Angulo - 2017.pdf: 1795543 bytes, checksum: 4342f624ff7c02485e9e888135bcbc18 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)Made available in DSpace on 2017-03-21T12:06:48Z (GMT). No. of bitstreams: 2 Dissertação - Rigo Julian Osorio Angulo - 2017.pdf: 1795543 bytes, checksum: 4342f624ff7c02485e9e888135bcbc18 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2017-03-15Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPESapplication/pdfporUniversidade Federal de GoiásPrograma de Pós-graduação em Matemática (IME)UFGBrasilInstituto de Matemática e Estatística - IME (RG)http://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/openAccessCriptografiaCorpos finitosCurvas elípticasCryptographyFinite fieldsElliptic curvesMATEMATICA::ALGEBRACriptografia de curvas elípticasCryptography of elliptic curvesinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/masterThesis6600717948137941247600600600600-4268777512335152015-63833683577339415522075167498588264571reponame:Biblioteca Digital de Teses e Dissertações da UFGinstname:Universidade Federal de Goiás (UFG)instacron:UFGLICENSElicense.txtlicense.txttext/plain; charset=utf-82165http://repositorio.bc.ufg.br/tede/bitstreams/6f71bd9d-8586-4028-a8fc-b706c796f616/downloadbd3efa91386c1718a7f26a329fdcb468MD51CC-LICENSElicense_urllicense_urltext/plain; charset=utf-849http://repositorio.bc.ufg.br/tede/bitstreams/87592e20-de07-440d-b2b3-9a48a216ad7b/download4afdbb8c545fd630ea7db775da747b2fMD52license_textlicense_texttext/html; charset=utf-80http://repositorio.bc.ufg.br/tede/bitstreams/f724bec0-7fa3-49a9-b632-06c54ee89333/downloadd41d8cd98f00b204e9800998ecf8427eMD53license_rdflicense_rdfapplication/rdf+xml; charset=utf-80http://repositorio.bc.ufg.br/tede/bitstreams/96ea9f66-e4c1-439a-b6a9-eb1c133e5b9f/downloadd41d8cd98f00b204e9800998ecf8427eMD54ORIGINALDissertação - Rigo Julian Osorio Angulo - 2017.pdfDissertação - Rigo Julian Osorio Angulo - 2017.pdfapplication/pdf1795543http://repositorio.bc.ufg.br/tede/bitstreams/a07c2799-f8d1-4f3b-a2b3-b1c69f0cf847/download4342f624ff7c02485e9e888135bcbc18MD55tede/69762017-03-21 09:06:48.564http://creativecommons.org/licenses/by-nc-nd/4.0/Acesso Abertoopen.accessoai:repositorio.bc.ufg.br:tede/6976http://repositorio.bc.ufg.br/tedeBiblioteca Digital de Teses e Dissertaçõeshttp://repositorio.bc.ufg.br/PUBhttps://repositorio.bc.ufg.br/tede_oai/requesttesesdissertacoes.bc@ufg.br ||tesesdissertacoes.bc@ufg.bropendoar:32082017-03-21T12:06:48Biblioteca Digital de Teses e Dissertações da UFG - Universidade Federal de Goiás (UFG)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
dc.title.por.fl_str_mv Criptografia de curvas elípticas
dc.title.alternative.eng.fl_str_mv Cryptography of elliptic curves
title Criptografia de curvas elípticas
spellingShingle Criptografia de curvas elípticas
Angulo, Rigo Julian Osorio
Criptografia
Corpos finitos
Curvas elípticas
Cryptography
Finite fields
Elliptic curves
MATEMATICA::ALGEBRA
title_short Criptografia de curvas elípticas
title_full Criptografia de curvas elípticas
title_fullStr Criptografia de curvas elípticas
title_full_unstemmed Criptografia de curvas elípticas
title_sort Criptografia de curvas elípticas
author Angulo, Rigo Julian Osorio
author_facet Angulo, Rigo Julian Osorio
author_role author
dc.contributor.advisor1.fl_str_mv Chaves, Ana Paula de Araújo
dc.contributor.advisor1Lattes.fl_str_mv http://lattes.cnpq.br/2332073500640724
dc.contributor.referee1.fl_str_mv Chaves, Ana Paula de Araújo
dc.contributor.referee1Lattes.fl_str_mv http://lattes.cnpq.br/2332073500640724
dc.contributor.referee2.fl_str_mv Rodrigues, Paulo Henrique de Azevedo
dc.contributor.referee3.fl_str_mv Godinho, Hemar Teixeira
dc.contributor.authorLattes.fl_str_mv http://lattes.cnpq.br/3433250017883225
dc.contributor.author.fl_str_mv Angulo, Rigo Julian Osorio
contributor_str_mv Chaves, Ana Paula de Araújo
Chaves, Ana Paula de Araújo
Rodrigues, Paulo Henrique de Azevedo
Godinho, Hemar Teixeira
dc.subject.por.fl_str_mv Criptografia
Corpos finitos
Curvas elípticas
topic Criptografia
Corpos finitos
Curvas elípticas
Cryptography
Finite fields
Elliptic curves
MATEMATICA::ALGEBRA
dc.subject.eng.fl_str_mv Cryptography
Finite fields
Elliptic curves
dc.subject.cnpq.fl_str_mv MATEMATICA::ALGEBRA
description According to history, the main objective of cryptography was always to provide security in communications, to keep them out of the reach of unauthorized entities. However, with the advent of the era of computing and telecommunications, applications of encryption expanded to offer security, to the ability to: verify if a message was not altered by a third party, to be able to verify if a user is who claims to be, among others. In this sense, the cryptography of elliptic curves, offers certain advantages over their analog systems, referring to the size of the keys used, which results in the storage capacity of the devices with certain memory limitations. Thus, the objective of this work is to offer the necessary mathematical tools for the understanding of how elliptic curves are used in public key cryptography.
publishDate 2017
dc.date.accessioned.fl_str_mv 2017-03-21T12:06:48Z
dc.date.issued.fl_str_mv 2017-03-15
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/masterThesis
format masterThesis
status_str publishedVersion
dc.identifier.citation.fl_str_mv ANGULO, R. J. O. Criptografia de curvas elípticas. 2017. 100 f. Dissertação (Mestrado em Matemática) - Universidade Federal de Goiás, Goiânia, 2017.
dc.identifier.uri.fl_str_mv http://repositorio.bc.ufg.br/tede/handle/tede/6976
identifier_str_mv ANGULO, R. J. O. Criptografia de curvas elípticas. 2017. 100 f. Dissertação (Mestrado em Matemática) - Universidade Federal de Goiás, Goiânia, 2017.
url http://repositorio.bc.ufg.br/tede/handle/tede/6976
dc.language.iso.fl_str_mv por
language por
dc.relation.program.fl_str_mv 6600717948137941247
dc.relation.confidence.fl_str_mv 600
600
600
600
dc.relation.department.fl_str_mv -4268777512335152015
dc.relation.cnpq.fl_str_mv -6383368357733941552
dc.relation.sponsorship.fl_str_mv 2075167498588264571
dc.rights.driver.fl_str_mv http://creativecommons.org/licenses/by-nc-nd/4.0/
info:eu-repo/semantics/openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc-nd/4.0/
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv Universidade Federal de Goiás
dc.publisher.program.fl_str_mv Programa de Pós-graduação em Matemática (IME)
dc.publisher.initials.fl_str_mv UFG
dc.publisher.country.fl_str_mv Brasil
dc.publisher.department.fl_str_mv Instituto de Matemática e Estatística - IME (RG)
publisher.none.fl_str_mv Universidade Federal de Goiás
dc.source.none.fl_str_mv reponame:Biblioteca Digital de Teses e Dissertações da UFG
instname:Universidade Federal de Goiás (UFG)
instacron:UFG
instname_str Universidade Federal de Goiás (UFG)
instacron_str UFG
institution UFG
reponame_str Biblioteca Digital de Teses e Dissertações da UFG
collection Biblioteca Digital de Teses e Dissertações da UFG
bitstream.url.fl_str_mv http://repositorio.bc.ufg.br/tede/bitstreams/6f71bd9d-8586-4028-a8fc-b706c796f616/download
http://repositorio.bc.ufg.br/tede/bitstreams/87592e20-de07-440d-b2b3-9a48a216ad7b/download
http://repositorio.bc.ufg.br/tede/bitstreams/f724bec0-7fa3-49a9-b632-06c54ee89333/download
http://repositorio.bc.ufg.br/tede/bitstreams/96ea9f66-e4c1-439a-b6a9-eb1c133e5b9f/download
http://repositorio.bc.ufg.br/tede/bitstreams/a07c2799-f8d1-4f3b-a2b3-b1c69f0cf847/download
bitstream.checksum.fl_str_mv bd3efa91386c1718a7f26a329fdcb468
4afdbb8c545fd630ea7db775da747b2f
d41d8cd98f00b204e9800998ecf8427e
d41d8cd98f00b204e9800998ecf8427e
4342f624ff7c02485e9e888135bcbc18
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
MD5
repository.name.fl_str_mv Biblioteca Digital de Teses e Dissertações da UFG - Universidade Federal de Goiás (UFG)
repository.mail.fl_str_mv tesesdissertacoes.bc@ufg.br ||tesesdissertacoes.bc@ufg.br
_version_ 1800237058451570688