Universidade do Minho  

       
 
  Autenticação/Login
 
Contacts
Site Map
   
  print
 
back 
Elements of cryptology : an algebra aplication
Author: Ana Margarida da Gama Correia Martins
Advisor: Pedro Patrício
Local: University of Minho

Abstract:
In this monograph, our goal is to write about some cryptographic systems. It is divided into six chapters. In chapter one, not only do we develop a historical approach to Cryptology, but also enumerate some of its applications in the recent past. In chapter two, we present several definitions and basic results of Number Theory, Algebra and Linear Algebra, which shall be used on chapters 3, 4 e 5. In chapter three, classical or symmetrical cryptosystems, as well as their cryptanalysis, are subject to a study. These systems enable the exchange of secret messages between two entities, which requires that a previous distribution of the key has taken place, in order to maintain the security of the communication. It is also necessary that the encryption function is one-to-one, so that the decryption shall be taken forth leaving no room for mistake. In chapter four, public-key or asymmetrical cryptosystems are studied, namely RSA and ElGamal. The arithmetic of the Elliptic Curves and its applications to the ElGamal system are also briefly referred to. The security of these systems lies on the elaboration of one-way functions, based on the difficulty in solving mathematical problems that until this moment are considered "computationally infeasible". That is the case of the integers factorization problem, used in RSA, and the discrete logarithm, used in ElGamal. Throughout this chapter, we also analyse some algorithms necessary to the systems' implementation. Concerning RSA, we shall analyse probabilistic primality tests, factorization algorithms and possible attacks to the systems; regarding ElGamal, we will analyse algorithms that provide the solution for the discrete logarithm problem. In chapter five, digital signature systems are studied. We shall lean solely upon the RSA digital signature - with a brief mention to "hash" functions - and the ElGamal signature. This method of authentication has been largely applied on the internet, particularly the signature that uses the "hash" SHA-1 function, with RSA encryption. Any digital signature involves two algorithms: one to sign and another to verify. In chapters 3, 4 e 5 several examples will be laid out, in order to illustrate the outcome of algorithms. Finally, some conclusions and comments are presented, emphasizing some of the problems that remain open.

Elementos de Criptologia: uma aplicação da Álgebra (pdf) »»

back 
 
 
  © 2019 Universidade do Minho  - Legal Terms  - updated by DMA Símbolo de Acessibilidade na Web D.