Projetos de sistemas criptográficos utilizando códigos lineares

Detalhes bibliográficos
Autor(a) principal: Freitas Júnior, José Luiz de
Data de Publicação: 1998
Tipo de documento: Dissertação
Idioma: por
Título da fonte: Repositório Institucional da UFU
Texto Completo: https://repositorio.ufu.br/handle/123456789/29774
http://doi.org/10.14393/ufu.di.1998.19
Resumo: This work aims to study and develop classical and public key cryptographic systems, using algebraic theory of linear codes, in order to better understand the subject and verify the viability of such systems in relation to DES [Luc, 1986] and RSA [Sal, 1990], The interest in this topic comes from the fact that I am a professor and economist and work with disciplines and tasks that require knowledge related to data security; there are several applications of cryptographic systems, both in computer science and in engineering, and, mainly, in several other areas such as military, diplomatic, electronic commerce, with regard to data security. Cryptographic protection techniques are necessary for the transmission and storage of information that travels in data communications environments. To develop such cryptographic systems essential theoretical bases will be exposed for their production and understanding, having as reference the works cited in the bibliography, as well as the orientations of the guiding teachers. The word Cryptography comes from the Greek (kryptós = hidden + grapho = spelling) - it is, therefore, the art or science of writing in cipher or in code, in order to make a2 written message understandable only to its recipient, to decipher it, almost always requires the knowledge of a key, secret information. It is one of the most widely used security mechanisms today and arose from the need to send “sensitive” information through unreliable media [Sal, 1990] and [Luc, 1986]. But, through art or science called cryptanalysis, from the Greek kryptós + análysis = decomposition; third parties can break the system and determine the original text, even without knowing the key - in possession of the encrypted message. From the union between cryptography and cryptanalysis came cryptology (from the Greek kryptós = occult + logos = study) which has been used since the hieroglyphic writing of the Egyptians - for almost four thousand years, it has been widely used, mainly for military purposes and diplomatic, as an example, its use in the Second War, and the consequent breaking of the German and Japanese codes, which was fundamental for the success of the Allies [Luc, 1986]. Regarding the type, the encryption can be: * Secret key - which uses the same key to encrypt (secret method of writing, through which the original text is transformed into a code) and decrypt (reverse process of encrypting) a message. In this case, sender and recipient combine the secret key to be used in the transmission, as a result of which there is a great possibility of violation. * Public key - designed by Diffie and Hellman [Sal, 1990], it makes it difficult to break through two keys: the public key - known to everyone; and the private one - known only to its owner. Then, the sender uses the recipient's public key to encrypt the message and sends it, the recipient, in turn, uses his private key to decrypt the message. Public key cryptography has many advantages over key3 including verification of signatures using authentication methods. However, speed is a major disadvantage, since encryption and decryption operations require calculations with very large numbers. The concept of private key cryptosystems, based on error correction codes, has attracted the interest of researchers working in the area of ​​Information Theory and, since the emergence of the first cryptosystem of this type, in 1978 [Van, 1988], until the today, important contributions have been made to cryptography through the design of new encryption schemes that employ code theory1. s Code theory started in 1940 with the work of Golay, Hamming and Shannon [Hol, 1992], although the problem dealt with was engineering, it developed through more sophisticated mathematical techniques, giving rise to code families - for example, codes Hamming, Cyclic and BCH codes, as well as more advanced codes, such as Golay, Goppa, Altemant, Kerdock and Preparata codes [Hol, 1992]. Codes were invented to correct errors on the communication channel with noise [Hol, 1992]. The transmission / storage of data on a communication channel occurs only in one direction, from source to destination. Therefore, error controls for this type of system must be performed using an error correction code that automatically corrects errors detected at the destination. As for the type, the codes can be: block codes and convolutional codes. Linear block codes (linear codes) are a subclass of the block codes - the object of the present study. * Block codes - the coding of a block code divides the information sequence into k bit message blocks. A message block is represented by the binary utuple u = [u \, u2, ..., wk) called message. Coding transforms each message u into a zz-tuple v = (vb v2, ..., vn) of discrete symbols, called a code word. Therefore, corresponding to 2 different possible messages, there are 2 different possible code words. This set of 2k code words of size n is called a block code (n, k). The R = k / n ratio is called the code ratio and can be interpreted as the number of bits of information entering the coding channel by transmitted symbol. In a binary block code (binary code), each code word v is also binary. Consequently, for a binary code to be useful (that is, to have a different code word associated with each message), k <n or R <1. When k <n, nk bits of redundancy can be added to each message to form a word code. These redundancy bits allow, eventually, the correction of errors caused by the channel. * Linear codes - A block code of size n and 2k code words is called a linear code (n, k \ se and only if, these 2k code words form a ^ -space subspace of the vector space of all / z-tuples on the body GF (2) [Lin, 1983j. A binary block code is linear, if and only if, the sum of two code words in module-2 is also a code word. A linear code C is called cyclic, if for every code word v = (v0, U. ■■■, bi-2, v „. |) EC, there is also a code word v <n = (v„ .i, v0, vi ..., v „.2) eC [Wic, 1995], 5 It must be considered as the basis of the theory of information linked to communications and transmissions with confidentiality: in communications, noise must be eliminated, restoring the original information; in cryptography, noise introduced through encryption must be eliminated in order to restore the original information.
id UFU_19020891d228b53a53224ae48d7905dd
oai_identifier_str oai:repositorio.ufu.br:123456789/29774
network_acronym_str UFU
network_name_str Repositório Institucional da UFU
repository_id_str
spelling Projetos de sistemas criptográficos utilizando códigos linearesProjects of cryptographic systems using linear codesSistemas criptográficosTeoria algébrica dos códigos linearesCNPQ::ENGENHARIASCriptografiaThis work aims to study and develop classical and public key cryptographic systems, using algebraic theory of linear codes, in order to better understand the subject and verify the viability of such systems in relation to DES [Luc, 1986] and RSA [Sal, 1990], The interest in this topic comes from the fact that I am a professor and economist and work with disciplines and tasks that require knowledge related to data security; there are several applications of cryptographic systems, both in computer science and in engineering, and, mainly, in several other areas such as military, diplomatic, electronic commerce, with regard to data security. Cryptographic protection techniques are necessary for the transmission and storage of information that travels in data communications environments. To develop such cryptographic systems essential theoretical bases will be exposed for their production and understanding, having as reference the works cited in the bibliography, as well as the orientations of the guiding teachers. The word Cryptography comes from the Greek (kryptós = hidden + grapho = spelling) - it is, therefore, the art or science of writing in cipher or in code, in order to make a2 written message understandable only to its recipient, to decipher it, almost always requires the knowledge of a key, secret information. It is one of the most widely used security mechanisms today and arose from the need to send “sensitive” information through unreliable media [Sal, 1990] and [Luc, 1986]. But, through art or science called cryptanalysis, from the Greek kryptós + análysis = decomposition; third parties can break the system and determine the original text, even without knowing the key - in possession of the encrypted message. From the union between cryptography and cryptanalysis came cryptology (from the Greek kryptós = occult + logos = study) which has been used since the hieroglyphic writing of the Egyptians - for almost four thousand years, it has been widely used, mainly for military purposes and diplomatic, as an example, its use in the Second War, and the consequent breaking of the German and Japanese codes, which was fundamental for the success of the Allies [Luc, 1986]. Regarding the type, the encryption can be: * Secret key - which uses the same key to encrypt (secret method of writing, through which the original text is transformed into a code) and decrypt (reverse process of encrypting) a message. In this case, sender and recipient combine the secret key to be used in the transmission, as a result of which there is a great possibility of violation. * Public key - designed by Diffie and Hellman [Sal, 1990], it makes it difficult to break through two keys: the public key - known to everyone; and the private one - known only to its owner. Then, the sender uses the recipient's public key to encrypt the message and sends it, the recipient, in turn, uses his private key to decrypt the message. Public key cryptography has many advantages over key3 including verification of signatures using authentication methods. However, speed is a major disadvantage, since encryption and decryption operations require calculations with very large numbers. The concept of private key cryptosystems, based on error correction codes, has attracted the interest of researchers working in the area of ​​Information Theory and, since the emergence of the first cryptosystem of this type, in 1978 [Van, 1988], until the today, important contributions have been made to cryptography through the design of new encryption schemes that employ code theory1. s Code theory started in 1940 with the work of Golay, Hamming and Shannon [Hol, 1992], although the problem dealt with was engineering, it developed through more sophisticated mathematical techniques, giving rise to code families - for example, codes Hamming, Cyclic and BCH codes, as well as more advanced codes, such as Golay, Goppa, Altemant, Kerdock and Preparata codes [Hol, 1992]. Codes were invented to correct errors on the communication channel with noise [Hol, 1992]. The transmission / storage of data on a communication channel occurs only in one direction, from source to destination. Therefore, error controls for this type of system must be performed using an error correction code that automatically corrects errors detected at the destination. As for the type, the codes can be: block codes and convolutional codes. Linear block codes (linear codes) are a subclass of the block codes - the object of the present study. * Block codes - the coding of a block code divides the information sequence into k bit message blocks. A message block is represented by the binary utuple u = [u \, u2, ..., wk) called message. Coding transforms each message u into a zz-tuple v = (vb v2, ..., vn) of discrete symbols, called a code word. Therefore, corresponding to 2 different possible messages, there are 2 different possible code words. This set of 2k code words of size n is called a block code (n, k). The R = k / n ratio is called the code ratio and can be interpreted as the number of bits of information entering the coding channel by transmitted symbol. In a binary block code (binary code), each code word v is also binary. Consequently, for a binary code to be useful (that is, to have a different code word associated with each message), k <n or R <1. When k <n, nk bits of redundancy can be added to each message to form a word code. These redundancy bits allow, eventually, the correction of errors caused by the channel. * Linear codes - A block code of size n and 2k code words is called a linear code (n, k \ se and only if, these 2k code words form a ^ -space subspace of the vector space of all / z-tuples on the body GF (2) [Lin, 1983j. A binary block code is linear, if and only if, the sum of two code words in module-2 is also a code word. A linear code C is called cyclic, if for every code word v = (v0, U. ■■■, bi-2, v „. |) EC, there is also a code word v <n = (v„ .i, v0, vi ..., v „.2) eC [Wic, 1995], 5 It must be considered as the basis of the theory of information linked to communications and transmissions with confidentiality: in communications, noise must be eliminated, restoring the original information; in cryptography, noise introduced through encryption must be eliminated in order to restore the original information.Dissertação (Mestrado)Este trabalho tem por objetivo o estudo e desenvolvimento de sistemas criptográficos clássicos e de chave pública, utilizando teoria algébrica dos códigos lineares, com o intuito de conhecer melhor o assunto e verificar a viabilidade de tais sistemas em relação ao DES [Luc,1986] e RSA [Sal, 1990], O interesse por este tema, advém do fato de eu ser professor e economiário e atuar com disciplinas e tarefas que requerem conhecimentos relativos à segurança de dados; são várias as aplicações de sistemas criptográficos, tanto em ciência da computação quanto em engenharia, e, principalmente, em várias outras áreas como aplicações militares, diplomáticas, comércio eletrônico, no tocante à segurança de dados. Técnicas de proteção criptográficas são necessárias para transmissão e armazenamento de informações que transitam em ambientes de comunicações de dados. Para desenvolver tais sistemas criptográficos serão expostos bases teóricas imprescindíveis para produção e compreensão dos mesmos, tendo como referência as obras citadas na bibliografia, bem como as orientações dos professores orientadores. A palavra Criptografia vem do grego (kryptós = escondido + grapho = grafia) - é, portanto, a arte ou ciência de escrever em cifra ou em código, a fim de tornar a2 mensagem escrita compreensível apenas a seu destinatário, para decifrá-la, quase sempre requer o conhecimento de uma chave, uma informação secreta. É um dos mecanismos de segurança mais utilizados atualmente e surgiu da necessidade de enviar informações “sensíveis” através de meios de comunicação não confiáveis [Sal, 1990] e [Luc,1986]. Mas, através da arte ou ciência chamada criptoanálise, do grego kryptós + análysis = decomposição; terceiros podem quebrar o sistema e determinar o texto original, mesmo desconhecendo a chave - de posse da mensagem cifrada. Da união entre criptografia e criptoanálise surgiu a criptologia (do grego kryptós = oculto + lógos = estudo) que é uma ciência usada desde a escrita hieroglífica dos Egípcios - há quase quatro mil anos, a mesma vem sendo muito utilizada, principalmente para fins militares e diplomáticos, como exemplo, pode-se citar sua utilização na Segunda Guerra, e a consequente quebra dos códigos alemão e japonês, que foi fundamental para o sucesso dos Aliados [Luc,1986]. Quanto ao tipo, a criptografia pode ser de: * Chave secreta - a qual utiliza a mesma chave para cifrar (método secreto de escrita, através do qual transforma-se o texto original em código) e decifrar (processo inverso de cifrar) uma mensagem. Neste caso, emissor e destinatário combinam a chave secreta a ser usada na transmissão, em conseqüência é grande a possibilidade de violação. * Chave pública - projetada por Diffie e Hellman [Sal,1990], ela dificulta a violação, através de duas chaves: a pública - de conhecimento de todos; e a privada - conhecida apenas pelo seu dono. Então, o emissor utiliza a chave pública do destinatário para cifrar a mensagem e a envia, o destinatário, por sua vez, utiliza sua chave privada para decifrar a mensagem. A criptografia de chave pública possui muitas vantagens em relação a de chave3 privada, dentre elas, a verificação de assinaturas através de métodos de autenticação. Entretanto, a velocidade é uma desvantagem grande, devido às operações de cifragem e decifiagem requererem cálculos com números muito grandes. A concepção de criptosistemas de chave privada, baseados em códigos corretores de erros, tem atraído o interesse de pesquisadores que atuam na área de Teoria da Informação e, desde o surgimento do primeiro criptosistema deste tipo, em 1978 [Van,1988], até os dias de hoje, contribuições importantes têm sido dadas a criptografia através da concepção de novos esquemas de cifragem que empregam teoria dos códigos1. s Teoria dos códigos começou em 1940 com o trabalho de Golay, Hamming e Shannon [Hol,1992], apesar do problema tratado ser de engenharia, desenvolveu-se através de técnicas matemáticas mais sofisticadas, dando origem a famílias de códigos - por exemplo, códigos de Hamming, Cíclicos e BCH, como também códigos mais avançados, tais como códigos Golay, Goppa, Altemant, Kerdock e Preparata [Hol,1992]. Códigos foram inventados para corrigir erros sobre o canal de comunicação com ruído [Hol,1992], A transmissão/armazenamento de dados em um canal de comunicação ocorre apenas em uma direção, da origem para o destino. Logo, controles de erros para este tipo de sistema, devem ser realizados utilizando código de correção de erros que corrige automaticamente os erros detectados no destino. Quanto ao tipo, os códigos podem ser: códigos de blocos e códigos convolucionais. Códigos de blocos lineares (códigos lineares) são uma subclasse dos códigos de blocos - objeto do presente estudo. * Códigos de blocos - a codificação de um código de bloco divide a seqüência de informação em blocos de mensagem de k bits. Um bloco de mensagem é representado pela Utupla binária u = [u\, u2, ..., wk) chamada mensagem. A codificação transforma cada mensagem u em uma zz-tupla v = (vb v2,..., vn) de símbolos discretos, chamado de palavra código. Logo, correspondendo a 2k possíveis mensagens diferentes, existem 2Â possíveis palavras códigos diferentes. Este conjunto de 2k palavras códigos de tamanho n é chamado um código de blocos (n,k). A razão R= k/n é chamada razão do código e pode ser interpretada como o número de bits de informação entrando no canal de codificação por símbolo transmitido. Em um código de bloco binário (código binário), cada palavra código v é também binária. Consequentemente, para um código binário ser útil (isto é, ter uma palavra código diferente associada a cada mensagem), k < n ou R < 1. Quando k< n, n-k bits de redundância podem ser adicionados a cada mensagem para formar uma palavra código. Estes bits de redundância permitem, eventual mente, a correção de erros provocados pelo canal. * Códigos lineares - Um código de bloco de tamanho n e 2k palavras código é denominado um código linear (n,k\ se e somente se, estas 2k palavras códigos formar um subespaço de ^-dimensão do espaço vetorial de todas as /z-tuplas sobre o corpo GF(2) [Lin,1983j. Um código de bloco binário é linear, se e somente se, a soma de duas palavras código em módulo-2 for também uma palavra código. Um código linear C é denominado cíclico, se para toda palavra código v=(v0, U. ■■■, bi-2, v„.|)eC, existir também uma palavra código v<n=(v„.i, v0, vi ..., v„.2)eC [Wic,1995],5 Deve-se considerar como base da teoria da informação ligada às comunicações e às transmissões com sigilo: nas comunicações deve-se eliminar o ruído restaurando a informação original; na criptografia deve-se eliminar o ruído introduzido através de ciframento de forma a restaurar a informação original.Universidade Federal de UberlândiaBrasilPrograma de Pós-graduação em Engenharia ElétricaSouza, João Nunes dehttp://lattes.cnpq.br/2125942405817598Fernandes, Márcia AparecidaCarrijo, Gilberto ArantesLoureiro, Antônio Alfredo FerreiraFreitas Júnior, José Luiz de2020-08-28T19:56:00Z2020-08-28T19:56:00Z1998info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/masterThesisapplication/pdfFREITAS JÚNIOR, José Luiz de. Projetos de sistemas criptográficos utilizando códigos lineares. 1998. 121 f. Dissertação (Mestrado em Engenharia Elétrica) - Universidade Federal de Uberlândia, Uberlândia, 2020. DOI http://doi.org/10.14393/ufu.di.1998.19https://repositorio.ufu.br/handle/123456789/29774http://doi.org/10.14393/ufu.di.1998.19porhttp://creativecommons.org/licenses/by-nc-nd/3.0/us/info:eu-repo/semantics/openAccessreponame:Repositório Institucional da UFUinstname:Universidade Federal de Uberlândia (UFU)instacron:UFU2020-08-29T06:18:46Zoai:repositorio.ufu.br:123456789/29774Repositório InstitucionalONGhttp://repositorio.ufu.br/oai/requestdiinf@dirbi.ufu.bropendoar:2020-08-29T06:18:46Repositório Institucional da UFU - Universidade Federal de Uberlândia (UFU)false
dc.title.none.fl_str_mv Projetos de sistemas criptográficos utilizando códigos lineares
Projects of cryptographic systems using linear codes
title Projetos de sistemas criptográficos utilizando códigos lineares
spellingShingle Projetos de sistemas criptográficos utilizando códigos lineares
Freitas Júnior, José Luiz de
Sistemas criptográficos
Teoria algébrica dos códigos lineares
CNPQ::ENGENHARIAS
Criptografia
title_short Projetos de sistemas criptográficos utilizando códigos lineares
title_full Projetos de sistemas criptográficos utilizando códigos lineares
title_fullStr Projetos de sistemas criptográficos utilizando códigos lineares
title_full_unstemmed Projetos de sistemas criptográficos utilizando códigos lineares
title_sort Projetos de sistemas criptográficos utilizando códigos lineares
author Freitas Júnior, José Luiz de
author_facet Freitas Júnior, José Luiz de
author_role author
dc.contributor.none.fl_str_mv Souza, João Nunes de
http://lattes.cnpq.br/2125942405817598
Fernandes, Márcia Aparecida
Carrijo, Gilberto Arantes
Loureiro, Antônio Alfredo Ferreira
dc.contributor.author.fl_str_mv Freitas Júnior, José Luiz de
dc.subject.por.fl_str_mv Sistemas criptográficos
Teoria algébrica dos códigos lineares
CNPQ::ENGENHARIAS
Criptografia
topic Sistemas criptográficos
Teoria algébrica dos códigos lineares
CNPQ::ENGENHARIAS
Criptografia
description This work aims to study and develop classical and public key cryptographic systems, using algebraic theory of linear codes, in order to better understand the subject and verify the viability of such systems in relation to DES [Luc, 1986] and RSA [Sal, 1990], The interest in this topic comes from the fact that I am a professor and economist and work with disciplines and tasks that require knowledge related to data security; there are several applications of cryptographic systems, both in computer science and in engineering, and, mainly, in several other areas such as military, diplomatic, electronic commerce, with regard to data security. Cryptographic protection techniques are necessary for the transmission and storage of information that travels in data communications environments. To develop such cryptographic systems essential theoretical bases will be exposed for their production and understanding, having as reference the works cited in the bibliography, as well as the orientations of the guiding teachers. The word Cryptography comes from the Greek (kryptós = hidden + grapho = spelling) - it is, therefore, the art or science of writing in cipher or in code, in order to make a2 written message understandable only to its recipient, to decipher it, almost always requires the knowledge of a key, secret information. It is one of the most widely used security mechanisms today and arose from the need to send “sensitive” information through unreliable media [Sal, 1990] and [Luc, 1986]. But, through art or science called cryptanalysis, from the Greek kryptós + análysis = decomposition; third parties can break the system and determine the original text, even without knowing the key - in possession of the encrypted message. From the union between cryptography and cryptanalysis came cryptology (from the Greek kryptós = occult + logos = study) which has been used since the hieroglyphic writing of the Egyptians - for almost four thousand years, it has been widely used, mainly for military purposes and diplomatic, as an example, its use in the Second War, and the consequent breaking of the German and Japanese codes, which was fundamental for the success of the Allies [Luc, 1986]. Regarding the type, the encryption can be: * Secret key - which uses the same key to encrypt (secret method of writing, through which the original text is transformed into a code) and decrypt (reverse process of encrypting) a message. In this case, sender and recipient combine the secret key to be used in the transmission, as a result of which there is a great possibility of violation. * Public key - designed by Diffie and Hellman [Sal, 1990], it makes it difficult to break through two keys: the public key - known to everyone; and the private one - known only to its owner. Then, the sender uses the recipient's public key to encrypt the message and sends it, the recipient, in turn, uses his private key to decrypt the message. Public key cryptography has many advantages over key3 including verification of signatures using authentication methods. However, speed is a major disadvantage, since encryption and decryption operations require calculations with very large numbers. The concept of private key cryptosystems, based on error correction codes, has attracted the interest of researchers working in the area of ​​Information Theory and, since the emergence of the first cryptosystem of this type, in 1978 [Van, 1988], until the today, important contributions have been made to cryptography through the design of new encryption schemes that employ code theory1. s Code theory started in 1940 with the work of Golay, Hamming and Shannon [Hol, 1992], although the problem dealt with was engineering, it developed through more sophisticated mathematical techniques, giving rise to code families - for example, codes Hamming, Cyclic and BCH codes, as well as more advanced codes, such as Golay, Goppa, Altemant, Kerdock and Preparata codes [Hol, 1992]. Codes were invented to correct errors on the communication channel with noise [Hol, 1992]. The transmission / storage of data on a communication channel occurs only in one direction, from source to destination. Therefore, error controls for this type of system must be performed using an error correction code that automatically corrects errors detected at the destination. As for the type, the codes can be: block codes and convolutional codes. Linear block codes (linear codes) are a subclass of the block codes - the object of the present study. * Block codes - the coding of a block code divides the information sequence into k bit message blocks. A message block is represented by the binary utuple u = [u \, u2, ..., wk) called message. Coding transforms each message u into a zz-tuple v = (vb v2, ..., vn) of discrete symbols, called a code word. Therefore, corresponding to 2 different possible messages, there are 2 different possible code words. This set of 2k code words of size n is called a block code (n, k). The R = k / n ratio is called the code ratio and can be interpreted as the number of bits of information entering the coding channel by transmitted symbol. In a binary block code (binary code), each code word v is also binary. Consequently, for a binary code to be useful (that is, to have a different code word associated with each message), k <n or R <1. When k <n, nk bits of redundancy can be added to each message to form a word code. These redundancy bits allow, eventually, the correction of errors caused by the channel. * Linear codes - A block code of size n and 2k code words is called a linear code (n, k \ se and only if, these 2k code words form a ^ -space subspace of the vector space of all / z-tuples on the body GF (2) [Lin, 1983j. A binary block code is linear, if and only if, the sum of two code words in module-2 is also a code word. A linear code C is called cyclic, if for every code word v = (v0, U. ■■■, bi-2, v „. |) EC, there is also a code word v <n = (v„ .i, v0, vi ..., v „.2) eC [Wic, 1995], 5 It must be considered as the basis of the theory of information linked to communications and transmissions with confidentiality: in communications, noise must be eliminated, restoring the original information; in cryptography, noise introduced through encryption must be eliminated in order to restore the original information.
publishDate 1998
dc.date.none.fl_str_mv 1998
2020-08-28T19:56:00Z
2020-08-28T19:56:00Z
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/masterThesis
format masterThesis
status_str publishedVersion
dc.identifier.uri.fl_str_mv FREITAS JÚNIOR, José Luiz de. Projetos de sistemas criptográficos utilizando códigos lineares. 1998. 121 f. Dissertação (Mestrado em Engenharia Elétrica) - Universidade Federal de Uberlândia, Uberlândia, 2020. DOI http://doi.org/10.14393/ufu.di.1998.19
https://repositorio.ufu.br/handle/123456789/29774
http://doi.org/10.14393/ufu.di.1998.19
identifier_str_mv FREITAS JÚNIOR, José Luiz de. Projetos de sistemas criptográficos utilizando códigos lineares. 1998. 121 f. Dissertação (Mestrado em Engenharia Elétrica) - Universidade Federal de Uberlândia, Uberlândia, 2020. DOI http://doi.org/10.14393/ufu.di.1998.19
url https://repositorio.ufu.br/handle/123456789/29774
http://doi.org/10.14393/ufu.di.1998.19
dc.language.iso.fl_str_mv por
language por
dc.rights.driver.fl_str_mv http://creativecommons.org/licenses/by-nc-nd/3.0/us/
info:eu-repo/semantics/openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc-nd/3.0/us/
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv Universidade Federal de Uberlândia
Brasil
Programa de Pós-graduação em Engenharia Elétrica
publisher.none.fl_str_mv Universidade Federal de Uberlândia
Brasil
Programa de Pós-graduação em Engenharia Elétrica
dc.source.none.fl_str_mv reponame:Repositório Institucional da UFU
instname:Universidade Federal de Uberlândia (UFU)
instacron:UFU
instname_str Universidade Federal de Uberlândia (UFU)
instacron_str UFU
institution UFU
reponame_str Repositório Institucional da UFU
collection Repositório Institucional da UFU
repository.name.fl_str_mv Repositório Institucional da UFU - Universidade Federal de Uberlândia (UFU)
repository.mail.fl_str_mv diinf@dirbi.ufu.br
_version_ 1805569733539397632