Esquemas de criptografia de chave pública: elementos comuns e diferenciais
Public key cryptography has been contributed some important functionality to computer systems security. Each pubic key scheme is based in some mathematics or computational problem, easy to solve in one way (an intended recipient) but hard to solve the inverse problem (an adversary). This paper prese...
Guardado en:
| Autores principales: | , |
|---|---|
| Formato: | Objeto de conferencia |
| Lenguaje: | Español |
| Publicado: |
2004
|
| Materias: | |
| Acceso en línea: | http://sedici.unlp.edu.ar/handle/10915/22345 |
| Aporte de: |
| Sumario: | Public key cryptography has been contributed some important functionality to computer systems security. Each pubic key scheme is based in some mathematics or computational problem, easy to solve in one way (an intended recipient) but hard to solve the inverse problem (an adversary). This paper presents a comparative study about computational problems, which is employed by public key cryptography schemes. It is reported a brief description of these problems, and a new public key scheme, called Rafaella, is presented. A comparative table containing the main features of the most commonly used public key methods is also presented. |
|---|