Porque Bob necesita de la criptografia?
Prime Factorization
Frecuency Stability Property
Leak of information
Encryption Machines
Equally Likely, Random, Pseudo-random
Y = E(K, X)
OneTimePad Encript = X^K = Y
X = D(K, Y)
OneTimePad Dencript = Y^K = X
Tiempo medio necesario para la búsqueda exhaustiva clave
Data Encryption Standard
64bit
X
56bit
K
Y
?
T
T = Transposicion
...
16 Submodulos
56bits
48bits
*
One Way Function, Diffie-Hellman
By Mijail Paz