dissertacao.pdf
dissertacao.pdf
dissertacao.pdf
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
1 Introduction<br />
1.1 Cryptography<br />
Cryptography is a science practised for over four thousand years. It regards,<br />
in a rather simple way, the finding and improvement of methods for sending<br />
messages between two chosen parts without risk that an unauthorized third<br />
party can understand the sent messages.<br />
While in the beginning this process was achieved by sending the messages<br />
personally, i.e., from mouth to hear, with the increasing of the communca-<br />
tions’ distance this has become impossible. So cryptographers started devel-<br />
oping methods of sending messages from a sender, Alice, to a receiver, Bob,<br />
without a malicious eavesdropper, Marvin, being able to understand the mes-<br />
sages unless he knows exactly how they were encrypted. Such a method is called<br />
a cryptosystem. Its mathematical description is given below:<br />
Definition 1. Cryptosystem is a tuple < M, C, K, e, d > where:<br />
M is the set of plaintext messages<br />
C is the set of cypher text messages<br />
K is the set of keys<br />
e is the encryption function, e : M × K → C such that e(m|k) = c<br />
d is the decryption function, d : C × K → M such that d(e(m|k)|k) = m<br />
To send a plaintext m, Alice encrypts it with an a-priori defined key k, obtaining<br />
the cypher text c = e(m|k), which she sends to the Bob, who decrypts it using<br />
the same key k obtaining m = d(e(m|k)|k).<br />
The key k should be known only by Alice and Bob, otherwise Marvin could<br />
decrypt c just by knowing the decryption function. For this reason, this kind of<br />
cryptosystems are called Private Key Cryptosystems or Symmetric Key<br />
Cryptosystems, as the same key is used for encryption and decryption.<br />
Throughout the years, numerous private key cryptosystems were created,<br />
with ever increasing complexity. Eventually, they were considered insufficient.<br />
What made them insufficient was the requirement that the secret key had to be<br />
known both to Alice and Bob. This means that before exchanging the encrypted<br />
1