Criptografia de curvas elípticas
Autor(a) principal: | |
---|---|
Data de Publicação: | 2017 |
Tipo de documento: | Dissertação |
Idioma: | por |
Título da fonte: | Biblioteca Digital de Teses e Dissertações da UFG |
Texto Completo: | http://repositorio.bc.ufg.br/tede/handle/tede/6976 |
Resumo: | According to history, the main objective of cryptography was always to provide security in communications, to keep them out of the reach of unauthorized entities. However, with the advent of the era of computing and telecommunications, applications of encryption expanded to offer security, to the ability to: verify if a message was not altered by a third party, to be able to verify if a user is who claims to be, among others. In this sense, the cryptography of elliptic curves, offers certain advantages over their analog systems, referring to the size of the keys used, which results in the storage capacity of the devices with certain memory limitations. Thus, the objective of this work is to offer the necessary mathematical tools for the understanding of how elliptic curves are used in public key cryptography. |
id |
UFG_8ad6f7f35c2be5b28a174187f4a77aae |
---|---|
oai_identifier_str |
oai:repositorio.bc.ufg.br:tede/6976 |
network_acronym_str |
UFG |
network_name_str |
Biblioteca Digital de Teses e Dissertações da UFG |
repository_id_str |
3208 |
spelling |
Chaves, Ana Paula de Araújohttp://lattes.cnpq.br/2332073500640724Chaves, Ana Paula de Araújohttp://lattes.cnpq.br/2332073500640724Rodrigues, Paulo Henrique de AzevedoGodinho, Hemar Teixeirahttp://lattes.cnpq.br/3433250017883225Angulo, Rigo Julian Osorio2017-03-21T12:06:48Z2017-03-15ANGULO, R. J. O. Criptografia de curvas elípticas. 2017. 100 f. Dissertação (Mestrado em Matemática) - Universidade Federal de Goiás, Goiânia, 2017.http://repositorio.bc.ufg.br/tede/handle/tede/6976According to history, the main objective of cryptography was always to provide security in communications, to keep them out of the reach of unauthorized entities. However, with the advent of the era of computing and telecommunications, applications of encryption expanded to offer security, to the ability to: verify if a message was not altered by a third party, to be able to verify if a user is who claims to be, among others. In this sense, the cryptography of elliptic curves, offers certain advantages over their analog systems, referring to the size of the keys used, which results in the storage capacity of the devices with certain memory limitations. Thus, the objective of this work is to offer the necessary mathematical tools for the understanding of how elliptic curves are used in public key cryptography.Segundo a história, o objetivo principal da criptografia sempre foi oferecer segurança nas comunicações, para mantê-las fora do alcance de entidades não autorizadas. No entanto, com o advento da era da computação e as telecomunicações, as aplicações da criptografia se expandiram para oferecer além de segurança, a capacidade de: verificar que uma mensagem não tenha sido alterada por um terceiro, poder verificar que um usuário é quem diz ser, entre outras. Neste sentido, a criptografia de curvas elípticas, oferece certas ventagens sobre seu sistemas análogos, referentes ao tamanho das chaves usadas, redundando isso na capacidade de armazenamento dos dispositivos com certas limitações de memória. Assim, o objetivo deste trabalho é fornecer ao leitor as ferramentas matemáticas necessá- rias para a compreensão de como as curvas elípticas são usadas na criptografia de chave pública.Submitted by JÚLIO HEBER SILVA (julioheber@yahoo.com.br) on 2017-03-20T17:15:17Z No. of bitstreams: 2 Dissertação - Rigo Julian Osorio Angulo - 2017.pdf: 1795543 bytes, checksum: 4342f624ff7c02485e9e888135bcbc18 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)Approved for entry into archive by Luciana Ferreira (lucgeral@gmail.com) on 2017-03-21T12:06:48Z (GMT) No. of bitstreams: 2 Dissertação - Rigo Julian Osorio Angulo - 2017.pdf: 1795543 bytes, checksum: 4342f624ff7c02485e9e888135bcbc18 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)Made available in DSpace on 2017-03-21T12:06:48Z (GMT). No. of bitstreams: 2 Dissertação - Rigo Julian Osorio Angulo - 2017.pdf: 1795543 bytes, checksum: 4342f624ff7c02485e9e888135bcbc18 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2017-03-15Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPESapplication/pdfporUniversidade Federal de GoiásPrograma de Pós-graduação em Matemática (IME)UFGBrasilInstituto de Matemática e Estatística - IME (RG)http://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/openAccessCriptografiaCorpos finitosCurvas elípticasCryptographyFinite fieldsElliptic curvesMATEMATICA::ALGEBRACriptografia de curvas elípticasCryptography of elliptic curvesinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/masterThesis6600717948137941247600600600600-4268777512335152015-63833683577339415522075167498588264571reponame:Biblioteca Digital de Teses e Dissertações da UFGinstname:Universidade Federal de Goiás (UFG)instacron:UFGLICENSElicense.txtlicense.txttext/plain; charset=utf-82165http://repositorio.bc.ufg.br/tede/bitstreams/6f71bd9d-8586-4028-a8fc-b706c796f616/downloadbd3efa91386c1718a7f26a329fdcb468MD51CC-LICENSElicense_urllicense_urltext/plain; charset=utf-849http://repositorio.bc.ufg.br/tede/bitstreams/87592e20-de07-440d-b2b3-9a48a216ad7b/download4afdbb8c545fd630ea7db775da747b2fMD52license_textlicense_texttext/html; charset=utf-80http://repositorio.bc.ufg.br/tede/bitstreams/f724bec0-7fa3-49a9-b632-06c54ee89333/downloadd41d8cd98f00b204e9800998ecf8427eMD53license_rdflicense_rdfapplication/rdf+xml; charset=utf-80http://repositorio.bc.ufg.br/tede/bitstreams/96ea9f66-e4c1-439a-b6a9-eb1c133e5b9f/downloadd41d8cd98f00b204e9800998ecf8427eMD54ORIGINALDissertação - Rigo Julian Osorio Angulo - 2017.pdfDissertação - Rigo Julian Osorio Angulo - 2017.pdfapplication/pdf1795543http://repositorio.bc.ufg.br/tede/bitstreams/a07c2799-f8d1-4f3b-a2b3-b1c69f0cf847/download4342f624ff7c02485e9e888135bcbc18MD55tede/69762017-03-21 09:06:48.564http://creativecommons.org/licenses/by-nc-nd/4.0/Acesso Abertoopen.accessoai:repositorio.bc.ufg.br:tede/6976http://repositorio.bc.ufg.br/tedeBiblioteca Digital de Teses e Dissertaçõeshttp://repositorio.bc.ufg.br/PUBhttps://repositorio.bc.ufg.br/tede_oai/requesttesesdissertacoes.bc@ufg.br ||tesesdissertacoes.bc@ufg.bropendoar:32082017-03-21T12:06:48Biblioteca Digital de Teses e Dissertações da UFG - Universidade Federal de Goiás (UFG)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 |
dc.title.por.fl_str_mv |
Criptografia de curvas elípticas |
dc.title.alternative.eng.fl_str_mv |
Cryptography of elliptic curves |
title |
Criptografia de curvas elípticas |
spellingShingle |
Criptografia de curvas elípticas Angulo, Rigo Julian Osorio Criptografia Corpos finitos Curvas elípticas Cryptography Finite fields Elliptic curves MATEMATICA::ALGEBRA |
title_short |
Criptografia de curvas elípticas |
title_full |
Criptografia de curvas elípticas |
title_fullStr |
Criptografia de curvas elípticas |
title_full_unstemmed |
Criptografia de curvas elípticas |
title_sort |
Criptografia de curvas elípticas |
author |
Angulo, Rigo Julian Osorio |
author_facet |
Angulo, Rigo Julian Osorio |
author_role |
author |
dc.contributor.advisor1.fl_str_mv |
Chaves, Ana Paula de Araújo |
dc.contributor.advisor1Lattes.fl_str_mv |
http://lattes.cnpq.br/2332073500640724 |
dc.contributor.referee1.fl_str_mv |
Chaves, Ana Paula de Araújo |
dc.contributor.referee1Lattes.fl_str_mv |
http://lattes.cnpq.br/2332073500640724 |
dc.contributor.referee2.fl_str_mv |
Rodrigues, Paulo Henrique de Azevedo |
dc.contributor.referee3.fl_str_mv |
Godinho, Hemar Teixeira |
dc.contributor.authorLattes.fl_str_mv |
http://lattes.cnpq.br/3433250017883225 |
dc.contributor.author.fl_str_mv |
Angulo, Rigo Julian Osorio |
contributor_str_mv |
Chaves, Ana Paula de Araújo Chaves, Ana Paula de Araújo Rodrigues, Paulo Henrique de Azevedo Godinho, Hemar Teixeira |
dc.subject.por.fl_str_mv |
Criptografia Corpos finitos Curvas elípticas |
topic |
Criptografia Corpos finitos Curvas elípticas Cryptography Finite fields Elliptic curves MATEMATICA::ALGEBRA |
dc.subject.eng.fl_str_mv |
Cryptography Finite fields Elliptic curves |
dc.subject.cnpq.fl_str_mv |
MATEMATICA::ALGEBRA |
description |
According to history, the main objective of cryptography was always to provide security in communications, to keep them out of the reach of unauthorized entities. However, with the advent of the era of computing and telecommunications, applications of encryption expanded to offer security, to the ability to: verify if a message was not altered by a third party, to be able to verify if a user is who claims to be, among others. In this sense, the cryptography of elliptic curves, offers certain advantages over their analog systems, referring to the size of the keys used, which results in the storage capacity of the devices with certain memory limitations. Thus, the objective of this work is to offer the necessary mathematical tools for the understanding of how elliptic curves are used in public key cryptography. |
publishDate |
2017 |
dc.date.accessioned.fl_str_mv |
2017-03-21T12:06:48Z |
dc.date.issued.fl_str_mv |
2017-03-15 |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/masterThesis |
format |
masterThesis |
status_str |
publishedVersion |
dc.identifier.citation.fl_str_mv |
ANGULO, R. J. O. Criptografia de curvas elípticas. 2017. 100 f. Dissertação (Mestrado em Matemática) - Universidade Federal de Goiás, Goiânia, 2017. |
dc.identifier.uri.fl_str_mv |
http://repositorio.bc.ufg.br/tede/handle/tede/6976 |
identifier_str_mv |
ANGULO, R. J. O. Criptografia de curvas elípticas. 2017. 100 f. Dissertação (Mestrado em Matemática) - Universidade Federal de Goiás, Goiânia, 2017. |
url |
http://repositorio.bc.ufg.br/tede/handle/tede/6976 |
dc.language.iso.fl_str_mv |
por |
language |
por |
dc.relation.program.fl_str_mv |
6600717948137941247 |
dc.relation.confidence.fl_str_mv |
600 600 600 600 |
dc.relation.department.fl_str_mv |
-4268777512335152015 |
dc.relation.cnpq.fl_str_mv |
-6383368357733941552 |
dc.relation.sponsorship.fl_str_mv |
2075167498588264571 |
dc.rights.driver.fl_str_mv |
http://creativecommons.org/licenses/by-nc-nd/4.0/ info:eu-repo/semantics/openAccess |
rights_invalid_str_mv |
http://creativecommons.org/licenses/by-nc-nd/4.0/ |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
Universidade Federal de Goiás |
dc.publisher.program.fl_str_mv |
Programa de Pós-graduação em Matemática (IME) |
dc.publisher.initials.fl_str_mv |
UFG |
dc.publisher.country.fl_str_mv |
Brasil |
dc.publisher.department.fl_str_mv |
Instituto de Matemática e Estatística - IME (RG) |
publisher.none.fl_str_mv |
Universidade Federal de Goiás |
dc.source.none.fl_str_mv |
reponame:Biblioteca Digital de Teses e Dissertações da UFG instname:Universidade Federal de Goiás (UFG) instacron:UFG |
instname_str |
Universidade Federal de Goiás (UFG) |
instacron_str |
UFG |
institution |
UFG |
reponame_str |
Biblioteca Digital de Teses e Dissertações da UFG |
collection |
Biblioteca Digital de Teses e Dissertações da UFG |
bitstream.url.fl_str_mv |
http://repositorio.bc.ufg.br/tede/bitstreams/6f71bd9d-8586-4028-a8fc-b706c796f616/download http://repositorio.bc.ufg.br/tede/bitstreams/87592e20-de07-440d-b2b3-9a48a216ad7b/download http://repositorio.bc.ufg.br/tede/bitstreams/f724bec0-7fa3-49a9-b632-06c54ee89333/download http://repositorio.bc.ufg.br/tede/bitstreams/96ea9f66-e4c1-439a-b6a9-eb1c133e5b9f/download http://repositorio.bc.ufg.br/tede/bitstreams/a07c2799-f8d1-4f3b-a2b3-b1c69f0cf847/download |
bitstream.checksum.fl_str_mv |
bd3efa91386c1718a7f26a329fdcb468 4afdbb8c545fd630ea7db775da747b2f d41d8cd98f00b204e9800998ecf8427e d41d8cd98f00b204e9800998ecf8427e 4342f624ff7c02485e9e888135bcbc18 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Biblioteca Digital de Teses e Dissertações da UFG - Universidade Federal de Goiás (UFG) |
repository.mail.fl_str_mv |
tesesdissertacoes.bc@ufg.br ||tesesdissertacoes.bc@ufg.br |
_version_ |
1800237058451570688 |