• JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
 
  Bookmark and Share
 
 
Master's Dissertation
DOI
https://doi.org/10.11606/D.55.2019.tde-22082019-110952
Document
Author
Full name
Evelyn Gomes da Silva
E-mail
Institute/School/College
Knowledge Area
Date of Defense
Published
São Carlos, 2019
Supervisor
Committee
Oliveira, Regilene Delazari dos Santos (President)
Dias, Ires
Itikawa, Jackson
Manoel, Miriam Garcia
Title in Portuguese
Criptografia RSA: da teoria à aplicação em sala de aula
Keywords in Portuguese
Criptografia RSA
Números primos
Teorema de Fermat
Teoria de números
Abstract in Portuguese
Esta dissertação tem por objetivo apresentar a Criptografia RSA, que é o método de criptografia mais utilizado no mundo atualmente. Iniciamos a dissertação com um breve histórico sobre a criptografia e em seguida introduzimos a teoria matemática empregada no método pertencente a teoria dos números. Finalizamos a dissertação com a descrição de uma aplicação simples do método levado para uma sala de aula do ensino médio. Este texto pretende introduzir o tema de maneira simples e por esta razão, fazemos uso de muitos exemplos. Esperamos ainda que o leitor compreenda o que torna este método eficiente e seguro.
Title in English
RSA Cryptografy: from the theory to a classroom aplication
Keywords in English
Numbers theory
Prime numbers
RSA Cryptografy
Theorem of Fermat
Abstract in English
The main goal of this work is to introduce the RSA Criptography that is the most used method in Criptography nowadays. We begin the dissertation with a brief introduction about criptography and then we discuss concepts from number theory used in the method. Finally we present a description of a simple application of Criptography made in a High school classroom. This text intend to introduce the subject in a simple way for this reason we present several examples. We hope that the reader have the comprehension of the methods and of its security.
 
WARNING - Viewing this document is conditioned on your acceptance of the following terms of use:
This document is only for private use for research and teaching activities. Reproduction for commercial use is forbidden. This rights cover the whole data about this document as well as its contents. Any uses or copies of this document in whole or in part must include the author's name.
Publishing Date
2019-08-22
 
WARNING: Learn what derived works are clicking here.
All rights of the thesis/dissertation are from the authors
CeTI-SC/STI
Digital Library of Theses and Dissertations of USP. Copyright © 2001-2024. All rights reserved.