Content uploaded by Diego F. Aranha
Author content
All content in this area was uploaded by Diego F. Aranha on Feb 17, 2019
Content may be subject to copyright.
O que é criptograa m-a-m e o que devemos fazer a respeito
!"#$ % #$
&""#'
&" ! " !(
"
( % ( )
( "#
"
'" * +
( #$ " " ,%
$ " "
# "( ( #$
#$ $-& " .
(("/")%
" ( 0 % ")#$
#1(/(
#$#$(#(
%$ 2/
(!")(% "
#"%0%3%
" 4 ")#$ " '
"05%
") ()
677
% % 8
" %( (
#$ " simétricas /
#$ ( ( 9:
% ("
% ";
4 ( $
assimétrica chave pública % #$
" " 6 (
#$ &" 4 < ( $
chave privada = ( &"
8"( > # (
&"8")"
"!#$%
( ( 8 ("
&
" " 5
" 5 4 #$
' '"% ?
?# " "
" 4 @ % ( "
#$(""%#$
%(("#$
$(4#$
%"-% "
#$# #
< # %
( ( ( % "
" " 4
%("( %
( " < ! %
"( ("(
#$ " " " "
#$ %
8"(/<#%
" &
#("1/""1
#$ # % "4
$ (1 #
() A B"
4 ( (
" ?> 57 ? "# #
"(6
"#$
153C',?A53C',?
!"#$%&'()*)+@
@DDEEEFFD5F-3DG-E-F-HH9HIJIKK"
2
" % %L "
' / ="#$
" ""(
" 3")#1 $ "
#(""
" "; ") B"2
" $ " #1 =
"(&"
4( 3#14
A " %
%#$5("#1M
H:NO8-"40"4A?'E
?E " #$ % "
&#$#$"'
!( # "
("6 ' #$" " 1
&
" %
""#$>
4 ( ("
(#$ " ("( ;
" ( * %+ !
")1
23A2PC355"5P'503A%P?3'L"
,!-%"./NDH:NJ@M#'""NN9-NOO
H:NJ
3<L0Q'03,)P3A2PLR>'SM"P3<3T7'S-2'A3TU'S
0"0@NI0"VF
G2E'?G2'?H:NO?LA?K:KWONN-OO:
?B?H:NOBest paper award
4,0?0X'"?0(%12"
)*+3@DDEEE-DD-H::I"
5LAYNHIZKH:NH@
@DDEEE""(D("[:OD[H:NN-H:NJDH:NHDLDLNHIZK
3
4%
> %
#%
'"" computacionalmente difícil
"") #
algoritmo 0" $ ") "
= % " "#$
""!")(((%
("""&
#$
' criptograa simétrica" ! %
8(@ ( (
( !
Criptograa assimétrica ")"
##$
A/
#1$""#$
('(%
( ( #$
""& %
&'%
(""(" ( 4
" " 6 " ! "#$
"1")
""("#$
/#$""#$"
) ""#%
protocolo criptográco<"%$
" &"" "
"!#$&""
8""("
$ ( " < "
( ( &"
( #$ "
( #$
4
>" $ $ )
" " #$
8 "
# % )
("("
' " #$ (""
!""# @
"#$"-""
(
#$ ("" "
!
#$ ' 8% ")
4 "4
% $ (
contornar "
D >" 84 8(" (""
E () "8
?#") superfície de ataque
("%
"((#$"""
#$ )#$ "
"#1
")
%" -"8(","
""#(#$%(
(""("#$#$>!%
! #$ $ ! ("
%)
2%55&&5
"" ) (
#$ " "#$ (
$8#$)#
5
atacantes internos (#
(" #$
"(
V ?" V "
" m-a-m> 8"
@"??LD,L?"
0""(
!("8$"(
" (#$ A
"#1 -- #
")
.("#$)
( )
!(#">4""(
N
8 ") %
#$ #($( "
)-
#$(#A($%
"4#
!"("#1
Figura 1
Sistema criptográco para comunicação condencial entre duas
entidades na presença de adversários
@5'A'S'?"PQA<<3?2<,>"PQA?,<A'
?62%H::NB3@3>NZZW
6
>8) # 4 #$ --
-#$@(&"$")
""8 %
Q""")
( &" % " ( #
#$(&"
"!((
"!
" #1
> - "
"""
" " ' "
(&"
%ataque de interceptação ,&&&-
# ("
(&"
) "
" ( &" ( " "
( "" 8$A(
0") (#$
" # " ! '
"#1 ( &" $
) " ( (# (
#$ ( &" " #$
) $ #$ H #$
" ' (
"#$"((#$((
" ( (
#$( #$(&"
(
7
Figura 2
Código de segurança para vericação de chave pública no
aplicativo Signal.
@
@DD"D"DG-
-D
."""((
" = #$
" ) (
( (
= #$ - )
8")#$
( ! ( (
" ( (
/(-)("
& ,% %
#/#)((#
#$ ( ( &
(( ")
8
!.7%8"9
<!" -- "
!(#48#$
' 4 ( /
(%"
&
= ""
( " (# #$
/$ ( #$
) #
% ("6 " 0
# !( % @
#$(" "
#$"("0
" -- !
" 1 #$ " $ #$
% $ =
) $
(
#$ #$ $ %
( #$ --
("#$humanos
$
-- ( "=(#1
" < #
(#$ ()
% " ) "
((&5"#1*+
$"8"#!
" ("
# -- #$)#$=
""";31(4
" 4
9
# < ,-
(
/($")
(/ 2
( #$ "" ";
"!1#6
,#$""
(8#/
(#(#
" / '
%"(0)(
" #$ # / (
)#$
" "
"%#$
( (#$ (" ("
% ' (
(#$%("""!)
#$""$!(
#""%
(""E"
"##$
" " %
$ 8 (# "
-- % "8
"#1("1
" 1 "
")#1#%#$
8
("%-
"" "(
"""
/$(#$)"
$ (
" (
6B'L?<A2"P": ;%"8"%
%"-5@?0LD50,H:NI
10
"/#("6""2
")#
/ ( ( 7
("
?"8$8("
# "( < "
" (#$
! ( #
) ! (
" ("
< $ *+
%
(# '8" / $ #$ !"
( "%"
"&"%((
>#$""
)"!#$/(
/ % ("
!((#$("6
" $ \ \ # &"
( $ "
&"("6""(
"( #
#$"8
(# !( # "
#$ inócuo
> ")
4 " !
4(#$/$
(" (#$ ((
("##$
""@)!(
# " (" 4
(> ) #
#$ "" (
72'C<V]?P"?G"GM"'02
22"2""QH:NWJWK-J9Z("@
@DD " D ^ _HZ9W9JZHZ9KOZI P@NKD:JDH:N9
11
!"#$(
( #
"'%(""
#$ " ()
( (" #$ ""
(/""
2#$""
"!(
#$ %! $ ) 4 (%
""(" (#$
(" ? #$ %
"() ")
#$ "" % " 8
( )4-" ? " #$ %
($ # "
("(")"""
#$
#$((?" #$%
(("$/""-"
#$ #$ " (" A$
" %(" # ) (
%! $ % "(/
" % --
" ") -
/ "
#$""")
"#"
"("!(#$
>(""(#$
" #$ " '
$ 8 <(# "
#$ ( % %
" ( "( "
% ?" $ % ("
"/ "#1
)(" ""
12
>#"&" "
#(""8
#$ (# 0 !( "
#$ (#1 U" "#$
! 1 ! = "#$
#" "
("("
, " " 8$
"" "#$ !#$ %
8$
>("(
"("
<8"=>
.!("(""
="#(("(
") $ (
> % $ (
( # #
#$!)"((
(" % #$ "
#$"" $ " #$
!"#(#$"
(#$((A(#(#$
(="#$
8 " ' " #$
%"%((
'")"(#$(
()'(#$(
#1 " #$ ! ! ( =
" "#$ "
$ / #
)(##$(Q(
("6%( "
(# "#(#$@
#$&"("("
13
< *+ # (#$ $
(
"$"$
14