14.07.2013 Views

dissertacao.pdf

dissertacao.pdf

dissertacao.pdf

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1 Introduction<br />

1.1 Cryptography<br />

Cryptography is a science practised for over four thousand years. It regards,<br />

in a rather simple way, the finding and improvement of methods for sending<br />

messages between two chosen parts without risk that an unauthorized third<br />

party can understand the sent messages.<br />

While in the beginning this process was achieved by sending the messages<br />

personally, i.e., from mouth to hear, with the increasing of the communca-<br />

tions’ distance this has become impossible. So cryptographers started devel-<br />

oping methods of sending messages from a sender, Alice, to a receiver, Bob,<br />

without a malicious eavesdropper, Marvin, being able to understand the mes-<br />

sages unless he knows exactly how they were encrypted. Such a method is called<br />

a cryptosystem. Its mathematical description is given below:<br />

Definition 1. Cryptosystem is a tuple < M, C, K, e, d > where:<br />

M is the set of plaintext messages<br />

C is the set of cypher text messages<br />

K is the set of keys<br />

e is the encryption function, e : M × K → C such that e(m|k) = c<br />

d is the decryption function, d : C × K → M such that d(e(m|k)|k) = m<br />

To send a plaintext m, Alice encrypts it with an a-priori defined key k, obtaining<br />

the cypher text c = e(m|k), which she sends to the Bob, who decrypts it using<br />

the same key k obtaining m = d(e(m|k)|k).<br />

The key k should be known only by Alice and Bob, otherwise Marvin could<br />

decrypt c just by knowing the decryption function. For this reason, this kind of<br />

cryptosystems are called Private Key Cryptosystems or Symmetric Key<br />

Cryptosystems, as the same key is used for encryption and decryption.<br />

Throughout the years, numerous private key cryptosystems were created,<br />

with ever increasing complexity. Eventually, they were considered insufficient.<br />

What made them insufficient was the requirement that the secret key had to be<br />

known both to Alice and Bob. This means that before exchanging the encrypted<br />

1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!