Cryptographic Protocol
Mostrando 1-6 de 6 artigos, teses e dissertações.
-
1. O problema da dedução do intruso para um protocolo criptográfico especificado via reescrita módulo AC / O problema da dedução do intruso para um protocolo criptográfico especificado via reescrita módulo AC
O ponto inicial deste trabalho é um caso de estudo de um protocolo de carteira eletrônica modelado por uma teoria equacional de um fragmento da aritmética, que inclui exponenciação. Foi estudado um procedimento de decisão para o problema da dedução do intruso, proposto recentemente por Bursuc, Comon-Lundh e Delaune. O intruso tem as mesmas capacidade
Publicado em: 2009
-
2. Verificação formal de protocolos criptográficos : o caso dos protocolos em cascata
Ensuring the security of cryptographic protocols is not a simple task. The Dolev-Yao model, proposed in the early 80s, is an important mathematical modeling method of cryptographic protocols, enabling the analysis and verification of the safety of these protocols. But the analytical verification does not guarantee that implementations are not error-prone. In
Publicado em: 2008
-
3. Criptografia quântica em redes de informação crítica - aplicação a telecomunicações aeronáuticas. / Quantum cryptography in critical information networks - application to aeronautical telecommunications.
The importance of security maintenance in critical information networks has been rising in recent times. Over the past decades, the utilization of cryptography tools, mainly those based on computationally intractable problems, was enough to ensure the security of communications systems. The development of the new information processing technique known as qua
Publicado em: 2008
-
4. DHA :um esquema de acordo de chaves baseado em matrizes para o protocolo Diffie-Hellman
In this work is proposed an annonimous cryptographic key agreement protocol by secure way based on Diffe-Hellman protocol. Actually key agreement protocols like Diffe-Hellman, ElGamal and other work with modular exponentiation operations and the complexity of such protocols are based on apparent diffcult to deal DLP (Discrete Logarithm Problems). The propose
Publicado em: 2007
-
5. Uncertainty-based key agreement protocol.
This work introduces a new encryption algorithm. The main motivation to the suggested algorithm is to attempt to open new ways and alternative visions that may be eventually integrated into well established cryptography algorithms being used today. When RSA, DES, and several other algorithms are compared, at least a common and central point can be identified
Publicado em: 2007
-
6. REDES VIRTUAIS PRIVADAS / PRIVATE VIRTUAL NETWORK.
Along with the computers networks emerges the possibility of managing remotely the intelligent organizations although the safe change of information has become a problem to the institutions which transport structured data through nets of computers. One of the largest challenges is the search for safe and economically viable solutions. Protocols of safety, cr
Publicado em: 2005