12.05.2013 Views

Protocolos Criptográficos - CryptULL

Protocolos Criptográficos - CryptULL

Protocolos Criptográficos - CryptULL

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CS Jerarquizada<br />

Ejemplo: k=81, w=10= 4 Vicerrectores+6 Directores,<br />

Estructura de acceso=2V+3D. El rector escoge<br />

(s v ,s d )=(26,38), (p v ,p d )=(31,43), t.q. k=s 2 v s2 d (mod p v p d )<br />

P v (x)=26+29x(mod 31), P d (x)=38+16x+24x 2 (mod 43)<br />

(x v1 ,x v2 ,x v3 ,x v4 )=(10,25,12,27)<br />

(x d1 ,x d2 ,x d3 ,x d4 ,x d5 ,x d6 )=(40,14,32,26,30,23) y reparte<br />

(x vi ,P v (x vi ))={(10,6),(25,7),(12,2),(27,3)} y<br />

(x di ,P d (x di ))={(40,34),(14,21),(32,14),(26,37),(30,16),(23,30)}<br />

Si se reunen V 3 +V 4 +D 1 +D 5 +D 6 reconstruyen el secreto con<br />

{sv +12x=2, sv +27x=3}(mod 31) y {sd +40y+402z=34, sd +40y+402z=34, sd +40y+402z=34}(mod 43), de donde<br />

(sv ,sd )=(26,38), y k=s2 vs2d =81(mod 1333)<br />

Criptografía-ULL

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!