Criptografía simétrica vs. asimétrica

Loading...
Thumbnail Image
Identifiers

Publication date

Advisors

Editors

Journal Title

Journal ISSN

Volume Title

Publisher

Metrics
Google Scholar
lacobus
Export

Research Projects

Organizational Units

Journal Issue

Abstract

[GL] A criptografía clásica xorde no século V a.C. ligada ao mundo militar e co único fin de ocultar mensaxes dun xeito rudimentario. Non é ata arredor do 1948, cando esta se sitúa nun contexto computacional e matemático grazas ao científico Claude Shannon, nacendo así a criptografía moderna. Esta última clasifícase en simétrica e asimétrica. Na primeira tanto quen emite como quen recibe empregan unha mesma e única clave previamente compartida por unha canle segura, para cifrar e descifrar a mensaxe, con algoritmos como o DES ou o AES. A necesidade de que exista unha canle segura pode supor unha desvantaxe, á cal veu dar resposta a criptografía asimétrica, proposta por Diffie e Hellman. Nela, cada usuario posúe dúas claves, unha pública, coñecida por todos e que o emisor utilizará para ocultar a mensaxe, e outra privada que permitirá soamente a dito usuario recuperar o texto orixinal, con cifrados como o RSA ou ElGamal. A única criptografía que aporta confidencialidade e non repudio as mensaxes é a asimétrica, facendo uso da sinatura dixital. Non obstante, a moi superior velocidade de cifra da simétrica fronte a esta fai que na maioría das aplicacións resulten necesarios e útiles os cifrados híbridos. Estes empregan a asimétrica para levar a cabo o intercambio da clave, co algoritmo de Diffie-Hellman, entre outros, e logo farase uso desa clave para cifrar a mensaxe con métodos simétricos. Un exemplo é o protocolo SSL.
[EN] Classical cryptography arises in the 5th century B.C. linked to the military world and with the sole purpose of hiding messages in a rudimentary way. It was not until around 1948, when it was placed in a computational and mathematical context thanks to scientist Claude Shannon, that modern cryptography was born. The latter is classified as symmetric and asymmetric. In the first, both the sender and the receiver use the same and unique key previously shared through a secure channel, to encrypt and decrypt the message, with algorithms such as DES or AES. The need for a secure channel can be a disadvantage, to which the asymmetric approach proposed by Diffie and Hellman offers a solution. In it, each user has two keys, a public one, known by everyone and that the sender will use to hide the message, and a private one that will allow only that user to retrieve the original text, with encryption systems such as RSA or ElGamal. The only type of cryptography that provides confidentiality and non-repudiation messages is asymmetric, making use of the digital signature. However, the much higher encryption speed of the symmetric makes hybrid encryption necessary and useful in most applications. It uses the asymmetric to share the keys, precisely with the Diffie-Hellman algorithm, or any other, and then this key is used to encrypt the message with symmetric methods. An example is the SSL protocol.

Description

Traballo Fin de Grao en Matemáticas. Curso 2020-2021

Bibliographic citation

Relation

Has part

Has version

Is based on

Is part of

Is referenced by

Is version of

Requires

Sponsors

Rights

Atribución-NoComercial-CompartirIgual 4.0 Internacional