Héctor David Ramírez-Hernández, Roberto Contreras-Juárez, Nelva Betzabel Espinoza-Hernández, Eduardo Sánchez-Mendoza
{"title":"Criptografía basada en curvas elípticas","authors":"Héctor David Ramírez-Hernández, Roberto Contreras-Juárez, Nelva Betzabel Espinoza-Hernández, Eduardo Sánchez-Mendoza","doi":"10.35429/jca.2019.11.3.28.35","DOIUrl":null,"url":null,"abstract":"Cryptography incorporates the techniques with which it seeks to guarantee protection of information, in front of unauthorized persons. This way of protecting information has existed since ancient times, where there were elements that only certain people were able to understand and interpret. In the beginning, cryptography was used for the purposes of war and power, but thanks to the great technological advances developed at the end of the last century, we have seen the need to safeguard the information that everyone manages and shares through the internet. That is why cryptography takes on greater importance. Current cryptography is based on two types of protocols, one of symmetric cryptography and the other corresponding to asymmetric cryptography. In this paper, an asymmetric type protocol based on elliptic curves on the finite field GF(p) was analyzed, proposing a library developed in PHP that allows to encrypt and decrypt information, which aims to provide security services, authentication, integrity and confidentiality of the information.","PeriodicalId":390253,"journal":{"name":"Revista de Computo Aplicado","volume":"207 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Revista de Computo Aplicado","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.35429/jca.2019.11.3.28.35","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cryptography incorporates the techniques with which it seeks to guarantee protection of information, in front of unauthorized persons. This way of protecting information has existed since ancient times, where there were elements that only certain people were able to understand and interpret. In the beginning, cryptography was used for the purposes of war and power, but thanks to the great technological advances developed at the end of the last century, we have seen the need to safeguard the information that everyone manages and shares through the internet. That is why cryptography takes on greater importance. Current cryptography is based on two types of protocols, one of symmetric cryptography and the other corresponding to asymmetric cryptography. In this paper, an asymmetric type protocol based on elliptic curves on the finite field GF(p) was analyzed, proposing a library developed in PHP that allows to encrypt and decrypt information, which aims to provide security services, authentication, integrity and confidentiality of the information.