Uncertainty-based key agreement protocol.
Autor(a) principal: | |
---|---|
Data de Publicação: | 2007 |
Tipo de documento: | Dissertação |
Idioma: | eng |
Título da fonte: | Biblioteca Digital de Teses e Dissertações do ITA |
Texto Completo: | http://www.bd.bibl.ita.br/tde_busca/arquivo.php?codArquivo=398 |
Resumo: | This work introduces a new encryption algorithm. The main motivation to the suggested algorithm is to attempt to open new ways and alternative visions that may be eventually integrated into well established cryptography algorithms being used today. When RSA, DES, and several other algorithms are compared, at least a common and central point can be identified; the majority of the known algorithms provides security based on the concept of one-way mathematical functions that are "easy" to be used but "hard" to be broken. The trust on this mathematical statement is fair enough for now; but in a mid-term future, as a foresight act, new technologies can indeed emerge and shake this belief. This work highlights the threat that the Quantum Computers can bring to the current cryptographic algorithms and it proposes a new encryption technique that might be used in conjunction with the current technology. The new algorithm is solely based on low processing power, efficient network communication and uncertainty of the discovery of information. |
id |
ITA_61a2bebead94041a30580f33496e8276 |
---|---|
oai_identifier_str |
oai:agregador.ibict.br.BDTD_ITA:oai:ita.br:398 |
network_acronym_str |
ITA |
network_name_str |
Biblioteca Digital de Teses e Dissertações do ITA |
spelling |
Uncertainty-based key agreement protocol.Criptografia quânticaCriptografia de chave públicaSegurança da informação de computadoresRedes de comunicaçãoProtocolos criptográficosFunções (Matemática)ComunicaçõesMatemáticaThis work introduces a new encryption algorithm. The main motivation to the suggested algorithm is to attempt to open new ways and alternative visions that may be eventually integrated into well established cryptography algorithms being used today. When RSA, DES, and several other algorithms are compared, at least a common and central point can be identified; the majority of the known algorithms provides security based on the concept of one-way mathematical functions that are "easy" to be used but "hard" to be broken. The trust on this mathematical statement is fair enough for now; but in a mid-term future, as a foresight act, new technologies can indeed emerge and shake this belief. This work highlights the threat that the Quantum Computers can bring to the current cryptographic algorithms and it proposes a new encryption technique that might be used in conjunction with the current technology. The new algorithm is solely based on low processing power, efficient network communication and uncertainty of the discovery of information.Instituto Tecnológico de AeronáuticaNei Yoshihiro SomaLuciano Godoy Fagundes2007-05-23info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/masterThesishttp://www.bd.bibl.ita.br/tde_busca/arquivo.php?codArquivo=398reponame:Biblioteca Digital de Teses e Dissertações do ITAinstname:Instituto Tecnológico de Aeronáuticainstacron:ITAenginfo:eu-repo/semantics/openAccessapplication/pdf2019-02-02T14:01:48Zoai:agregador.ibict.br.BDTD_ITA:oai:ita.br:398http://oai.bdtd.ibict.br/requestopendoar:null2020-05-28 19:33:13.343Biblioteca Digital de Teses e Dissertações do ITA - Instituto Tecnológico de Aeronáuticatrue |
dc.title.none.fl_str_mv |
Uncertainty-based key agreement protocol. |
title |
Uncertainty-based key agreement protocol. |
spellingShingle |
Uncertainty-based key agreement protocol. Luciano Godoy Fagundes Criptografia quântica Criptografia de chave pública Segurança da informação de computadores Redes de comunicação Protocolos criptográficos Funções (Matemática) Comunicações Matemática |
title_short |
Uncertainty-based key agreement protocol. |
title_full |
Uncertainty-based key agreement protocol. |
title_fullStr |
Uncertainty-based key agreement protocol. |
title_full_unstemmed |
Uncertainty-based key agreement protocol. |
title_sort |
Uncertainty-based key agreement protocol. |
author |
Luciano Godoy Fagundes |
author_facet |
Luciano Godoy Fagundes |
author_role |
author |
dc.contributor.none.fl_str_mv |
Nei Yoshihiro Soma |
dc.contributor.author.fl_str_mv |
Luciano Godoy Fagundes |
dc.subject.por.fl_str_mv |
Criptografia quântica Criptografia de chave pública Segurança da informação de computadores Redes de comunicação Protocolos criptográficos Funções (Matemática) Comunicações Matemática |
topic |
Criptografia quântica Criptografia de chave pública Segurança da informação de computadores Redes de comunicação Protocolos criptográficos Funções (Matemática) Comunicações Matemática |
dc.description.none.fl_txt_mv |
This work introduces a new encryption algorithm. The main motivation to the suggested algorithm is to attempt to open new ways and alternative visions that may be eventually integrated into well established cryptography algorithms being used today. When RSA, DES, and several other algorithms are compared, at least a common and central point can be identified; the majority of the known algorithms provides security based on the concept of one-way mathematical functions that are "easy" to be used but "hard" to be broken. The trust on this mathematical statement is fair enough for now; but in a mid-term future, as a foresight act, new technologies can indeed emerge and shake this belief. This work highlights the threat that the Quantum Computers can bring to the current cryptographic algorithms and it proposes a new encryption technique that might be used in conjunction with the current technology. The new algorithm is solely based on low processing power, efficient network communication and uncertainty of the discovery of information. |
description |
This work introduces a new encryption algorithm. The main motivation to the suggested algorithm is to attempt to open new ways and alternative visions that may be eventually integrated into well established cryptography algorithms being used today. When RSA, DES, and several other algorithms are compared, at least a common and central point can be identified; the majority of the known algorithms provides security based on the concept of one-way mathematical functions that are "easy" to be used but "hard" to be broken. The trust on this mathematical statement is fair enough for now; but in a mid-term future, as a foresight act, new technologies can indeed emerge and shake this belief. This work highlights the threat that the Quantum Computers can bring to the current cryptographic algorithms and it proposes a new encryption technique that might be used in conjunction with the current technology. The new algorithm is solely based on low processing power, efficient network communication and uncertainty of the discovery of information. |
publishDate |
2007 |
dc.date.none.fl_str_mv |
2007-05-23 |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/publishedVersion info:eu-repo/semantics/masterThesis |
status_str |
publishedVersion |
format |
masterThesis |
dc.identifier.uri.fl_str_mv |
http://www.bd.bibl.ita.br/tde_busca/arquivo.php?codArquivo=398 |
url |
http://www.bd.bibl.ita.br/tde_busca/arquivo.php?codArquivo=398 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
Instituto Tecnológico de Aeronáutica |
publisher.none.fl_str_mv |
Instituto Tecnológico de Aeronáutica |
dc.source.none.fl_str_mv |
reponame:Biblioteca Digital de Teses e Dissertações do ITA instname:Instituto Tecnológico de Aeronáutica instacron:ITA |
reponame_str |
Biblioteca Digital de Teses e Dissertações do ITA |
collection |
Biblioteca Digital de Teses e Dissertações do ITA |
instname_str |
Instituto Tecnológico de Aeronáutica |
instacron_str |
ITA |
institution |
ITA |
repository.name.fl_str_mv |
Biblioteca Digital de Teses e Dissertações do ITA - Instituto Tecnológico de Aeronáutica |
repository.mail.fl_str_mv |
|
subject_por_txtF_mv |
Criptografia quântica Criptografia de chave pública Segurança da informação de computadores Redes de comunicação Protocolos criptográficos Funções (Matemática) Comunicações Matemática |
_version_ |
1706809257893036032 |