Criptografía simétrica vs. asimétrica

dc.contributor.affiliationUniversidade de Santiago de Compostela. Facultade de Matemáticasgl
dc.contributor.authorRodríguez Gómez, Sara
dc.contributor.tutorGago Couso, Felipe
dc.contributor.tutorPáez Guillán, María Pilar
dc.date.accessioned2022-08-05T10:38:52Z
dc.date.available2022-08-05T10:38:52Z
dc.date.issued2021-07
dc.descriptionTraballo Fin de Grao en Matemáticas. Curso 2020-2021gl
dc.description.abstract[GL] A criptografía clásica xorde no século V a.C. ligada ao mundo militar e co único fin de ocultar mensaxes dun xeito rudimentario. Non é ata arredor do 1948, cando esta se sitúa nun contexto computacional e matemático grazas ao científico Claude Shannon, nacendo así a criptografía moderna. Esta última clasifícase en simétrica e asimétrica. Na primeira tanto quen emite como quen recibe empregan unha mesma e única clave previamente compartida por unha canle segura, para cifrar e descifrar a mensaxe, con algoritmos como o DES ou o AES. A necesidade de que exista unha canle segura pode supor unha desvantaxe, á cal veu dar resposta a criptografía asimétrica, proposta por Diffie e Hellman. Nela, cada usuario posúe dúas claves, unha pública, coñecida por todos e que o emisor utilizará para ocultar a mensaxe, e outra privada que permitirá soamente a dito usuario recuperar o texto orixinal, con cifrados como o RSA ou ElGamal. A única criptografía que aporta confidencialidade e non repudio as mensaxes é a asimétrica, facendo uso da sinatura dixital. Non obstante, a moi superior velocidade de cifra da simétrica fronte a esta fai que na maioría das aplicacións resulten necesarios e útiles os cifrados híbridos. Estes empregan a asimétrica para levar a cabo o intercambio da clave, co algoritmo de Diffie-Hellman, entre outros, e logo farase uso desa clave para cifrar a mensaxe con métodos simétricos. Un exemplo é o protocolo SSL.gl
dc.description.abstract[EN] Classical cryptography arises in the 5th century B.C. linked to the military world and with the sole purpose of hiding messages in a rudimentary way. It was not until around 1948, when it was placed in a computational and mathematical context thanks to scientist Claude Shannon, that modern cryptography was born. The latter is classified as symmetric and asymmetric. In the first, both the sender and the receiver use the same and unique key previously shared through a secure channel, to encrypt and decrypt the message, with algorithms such as DES or AES. The need for a secure channel can be a disadvantage, to which the asymmetric approach proposed by Diffie and Hellman offers a solution. In it, each user has two keys, a public one, known by everyone and that the sender will use to hide the message, and a private one that will allow only that user to retrieve the original text, with encryption systems such as RSA or ElGamal. The only type of cryptography that provides confidentiality and non-repudiation messages is asymmetric, making use of the digital signature. However, the much higher encryption speed of the symmetric makes hybrid encryption necessary and useful in most applications. It uses the asymmetric to share the keys, precisely with the Diffie-Hellman algorithm, or any other, and then this key is used to encrypt the message with symmetric methods. An example is the SSL protocol.gl
dc.identifier.urihttp://hdl.handle.net/10347/29021
dc.language.isoglggl
dc.rightsAtribución-NoComercial-CompartirIgual 4.0 Internacional
dc.rights.accessRightsopen accessgl
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/
dc.subjectCriptografíagl
dc.subjectSimétricagl
dc.subjectAsimétricagl
dc.subjectCifradogl
dc.subjectAlgoritmogl
dc.subjectClavegl
dc.subjectMensaxegl
dc.subjectCryptographygl
dc.subjectSymmetricgl
dc.subjectAsymmetricgl
dc.subjectEncryptiongl
dc.subjectAlgorithmgl
dc.subjectKeygl
dc.subjectMessagegl
dc.titleCriptografía simétrica vs. asimétricagl
dc.typebachelor thesisgl
dspace.entity.typePublication
relation.isAdvisorOfPublication42c20e13-e43e-4f50-bf82-5a920037e0b7
relation.isTutorOfPublication42c20e13-e43e-4f50-bf82-5a920037e0b7
relation.isTutorOfPublication115ec4ed-d4a5-4b96-8cc3-3ebf66f451ab
relation.isTutorOfPublication.latestForDiscovery42c20e13-e43e-4f50-bf82-5a920037e0b7

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Rodríguez_Gómez_Sara.pdf
Size:
3.52 MB
Format:
Adobe Portable Document Format
Description: