-
Notifications
You must be signed in to change notification settings - Fork 7
/
apostila.toc
77 lines (77 loc) · 5.51 KB
/
apostila.toc
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
\select@language {portuguese}
\contentsline {chapter}{\numberline {1}Introdu\IeC {\c c}\IeC {\~a}o}{9}
\contentsline {section}{\numberline {1.1}Privacidade}{9}
\contentsline {section}{\numberline {1.2}Vigil\IeC {\^a}ncia}{10}
\contentsline {section}{\numberline {1.3}Marco Regulat\IeC {\'o}rio}{11}
\contentsline {section}{\numberline {1.4}Vigil\IeC {\^a}ncia Digital em Massa}{12}
\contentsline {section}{\numberline {1.5}Seguran\IeC {\c c}a da Informa\IeC {\c c}\IeC {\~a}o}{13}
\contentsline {chapter}{\numberline {2}Cifras Cl\IeC {\'a}ssicas}{15}
\contentsline {section}{\numberline {2.1}Cifra de Deslocamento}{18}
\contentsline {section}{\numberline {2.2}Cifra de Substitui\IeC {\c c}\IeC {\~a}o}{20}
\contentsline {section}{\numberline {2.3}Cifra de Vigen\IeC {\`e}re}{21}
\contentsline {section}{\numberline {2.4}M\IeC {\'a}quinas de Criptografar}{23}
\contentsline {section}{\numberline {2.5}Exerc\IeC {\'\i }cio}{24}
\contentsline {chapter}{\numberline {3}Criptoan\IeC {\'a}lise}{27}
\contentsline {section}{\numberline {3.1}Ataques For\IeC {\c c}a Bruta}{27}
\contentsline {section}{\numberline {3.2}Ataques de Frequ\IeC {\^e}ncia}{28}
\contentsline {section}{\numberline {3.3}Ataques \IeC {\`a} ``Cifra Invenc\IeC {\'\i }vel''}{29}
\contentsline {section}{\numberline {3.4}Exerc\IeC {\'\i }cios}{30}
\contentsline {chapter}{\numberline {4}Sigilo Perfeito}{33}
\contentsline {section}{\numberline {4.1}One Time Pad}{35}
\contentsline {section}{\numberline {4.2}Exerc\IeC {\'\i }cio}{38}
\contentsline {chapter}{\numberline {5}Criptografia Moderna}{39}
\contentsline {section}{\numberline {5.1}Abordagem Assint\IeC {\'o}tica}{41}
\contentsline {section}{\numberline {5.2}Exerc\IeC {\'\i }cios}{42}
\contentsline {chapter}{\numberline {6}Cifras de Fluxo}{43}
\contentsline {section}{\numberline {6.1}Seguran\IeC {\c c}a das Cifras de Fluxo}{45}
\contentsline {section}{\numberline {6.2}Constru\IeC {\c c}\IeC {\~o}es Pr\IeC {\'a}ticas}{46}
\contentsline {subsection}{\numberline {6.2.1}Linear-Feedback Shift Registers}{46}
\contentsline {subsection}{\numberline {6.2.2}Trivium}{47}
\contentsline {section}{\numberline {6.3}Modos de Opera\IeC {\c c}\IeC {\~a}o}{48}
\contentsline {section}{\numberline {6.4}Exercicios}{50}
\contentsline {chapter}{\numberline {7}Cifras de Bloco}{51}
\contentsline {section}{\numberline {7.1}Constru\IeC {\c c}\IeC {\~o}es Pr\IeC {\'a}ticas}{53}
\contentsline {subsection}{\numberline {7.1.1}Data Encryption Standard (DES)}{53}
\contentsline {subsection}{\numberline {7.1.2}Advanced Encryption Standard (AES)}{56}
\contentsline {section}{\numberline {7.2}Modos de Opera\IeC {\c c}\IeC {\~a}o}{57}
\contentsline {section}{\numberline {7.3}Exerc\IeC {\'\i }cios}{62}
\contentsline {chapter}{\numberline {8}Integridade e Autenticidade}{63}
\contentsline {section}{\numberline {8.1}C\IeC {\'o}digo de Autentica\IeC {\c c}\IeC {\~a}o de Mensagem}{64}
\contentsline {subsection}{\numberline {8.1.1}CBC-MAC}{66}
\contentsline {section}{\numberline {8.2}Criptografia Autenticada}{67}
\contentsline {subsection}{\numberline {8.2.1}Comunica\IeC {\c c}\IeC {\~a}o Segura}{70}
\contentsline {section}{\numberline {8.3}Exercicios}{70}
\contentsline {chapter}{\numberline {9}Fun\IeC {\c c}\IeC {\~o}es de Hash}{71}
\contentsline {section}{\numberline {9.1}Constru\IeC {\c c}\IeC {\~o}es}{73}
\contentsline {subsection}{\numberline {9.1.1}SHA-1}{74}
\contentsline {section}{\numberline {9.2}Aplica\IeC {\c c}\IeC {\~o}es}{75}
\contentsline {subsection}{\numberline {9.2.1}HMAC}{75}
\contentsline {subsection}{\numberline {9.2.2}Fingerprints e \IeC {\'A}rvores de Merkle}{76}
\contentsline {subsection}{\numberline {9.2.3}Fun\IeC {\c c}\IeC {\~o}es de Deriva\IeC {\c c}\IeC {\~a}o de Chaves}{77}
\contentsline {section}{\numberline {9.3}Exerc\IeC {\'\i }cios}{78}
\contentsline {chapter}{\numberline {10}Fun\IeC {\c c}\IeC {\~o}es de M\IeC {\~a}o \IeC {\'U}nica*}{79}
\contentsline {section}{\numberline {10.1}Exerc\IeC {\'\i }cios}{85}
\contentsline {chapter}{\numberline {11}Distribui\IeC {\c c}\IeC {\~a}o de Chaves}{87}
\contentsline {section}{\numberline {11.1}Centro de Distribui\IeC {\c c}\IeC {\~a}o de Chaves}{87}
\contentsline {subsection}{\numberline {11.1.1}Kerberos}{88}
\contentsline {section}{\numberline {11.2}Protocolo de Diffie-Hellman}{89}
\contentsline {section}{\numberline {11.3}Exerc\IeC {\'\i }cios}{94}
\contentsline {chapter}{\numberline {12}Criptografia Assim\IeC {\'e}trica}{95}
\contentsline {section}{\numberline {12.1}El Gammal}{96}
\contentsline {section}{\numberline {12.2}RSA}{97}
\contentsline {section}{\numberline {12.3}Exerc\IeC {\'\i }cios}{102}
\contentsline {chapter}{\numberline {13}Sistemas H\IeC {\'\i }bridos}{103}
\contentsline {section}{\numberline {13.1}El Gammal}{104}
\contentsline {section}{\numberline {13.2}RSA}{105}
\contentsline {chapter}{\numberline {14}Assinaturas Digitais}{107}
\contentsline {section}{\numberline {14.1}Esquemas de Identifica\IeC {\c c}\IeC {\~a}o}{108}
\contentsline {section}{\numberline {14.2}Assinatura RSA}{109}
\contentsline {section}{\numberline {14.3}Algoritmo de Assinatura Digital (DSA)}{110}
\contentsline {section}{\numberline {14.4}Infraestrutura de Chaves P\IeC {\'u}blicas}{111}
\contentsline {section}{\numberline {14.5}Exerc\IeC {\'\i }cios}{113}
\contentsline {chapter}{\numberline {15}Protocolos}{115}
\contentsline {section}{\numberline {15.1}Transport Layer Security}{115}
\contentsline {section}{\numberline {15.2}Secure Shell}{116}
\contentsline {section}{\numberline {15.3}Pretty Good Privacy}{117}
\contentsline {section}{\numberline {15.4}Off The Record}{119}
\contentsline {section}{\numberline {15.5}Signal}{120}