You are on page 1of 16

c

INSTITUTO TECNOLOGICO SUPERIOR DE COATZACOALCOS

c 
c c  c

©Y cccc 

 c

  c c c c

c  c
INTRODUCCIÓN
c
c   c c  c c   c c c    c c  c c
   c c     c c  c  c c   c   c c  c  c  c
 c c   c c c c  c c c  c  c c c c 
  c
 c 
 c !cc  c cc c c c" c c c
c  c c  c  c  c  c c  c " c  c  c  c   c c
 c  c c  c  c
c   c  c   #c " c c  c  $c
  c%c  c c cc c  cc
c
&cc c cc' cc c' c'c   c cc c   c
c c   c  ( c  c  c   c c     c c    c
  c ccc( )cc   cc   c  ccc
 )c *c c  )c  c   c c c  c c   c c c c  c
 )c  cc''c c) cc  $c+$c' c c  ,c
c
 c c % c  c c c c c c c    c c (c  c c
   cc cc  c   ccc  c cc  c
c    ccc
c
& c c
c% c " c c
  cc)c   cc c
  cc 
*c c  c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
w  PROTOCOLOS DE AUTENTICACION
c
- c  c c   c c  c c   )c c  c c  c c
  c    c c  c   c c  c  c c  c
c   c c  c    c *c c    c c   c
c
 c%c c c  cc 
c c  c
c
& c c c  c .c
c
-c PAP (Protocolo de autenticación de contraseña): c  c  c c
  c c  c c c c ( c c  c %c c   #c c

 c c 
  c c c c c /c c + c   ,c 0c c
 c  c 1&1c %c cc   #c   c c ) c
 c c c c
1 c  c c  c
  ( c   c
c  c c
  c 1&1c c
 c "  c c
  c c 
  c c
c c  c
( c c-0 2cc c  c* c c  c)c cc

-c CHAP (Protocolo de autenticación por desafío mutuo): c c* c c


  c %c  c  c c c c 
c  c    c c c
  #c c c cc c  #c c3&1cc
  c c
c c 
c  c c c  c c c c c  c c
c c c  c  c ''c +(* c    c   c
'',c c c c  c''c c4c
567c+457,c( c cc c%c c  c
''c  c  c c   #c c  c c
 c c c c 
c c  c ''c
457cc
  c cc cc
c
cc 
  c c c c c (* c c cc  c ''c cc
  #c c c ccc)c cc c''c%c c
c  c  c c c 
c c  c c c  c    c c
   c c  c cc c c     c * c c  c
''c   c  c    ccc ccc c cc
 c''c c c(c c c c c) c(c
   cc(c c c  cc  c c  c''c

-c SPAP (Protocolo de autenticación de contraseña de shiva): c  c


 c c   c c c   #c   c (c  c

  c c c c c '
c  c 1&1c c  c c c
c 
c  c   #c   c c 
  c c c c 1&1c
c  c  c c   c (   c c 
  c c c c
 cc  #c%ccc c c  c c  cc c
cc c
c
-c ‰S-CHAP y ‰S-CHAP v2 Protocolo de autenticación por desafío
mutuo de ‰icrosoft: 4 c  c 4 63&1c  c   c  c
c  ($c  c c    c c     c c c c c
 c c  c &0c ) c '( c  c c  c c ''c
 c  c c  c  c c  c  c c c %c
c c  c / c c
 c  #c
c
c c   c+c
  c cc ccc
  c & ,c
c
c c cc c c c  c c c    c c
 c%c c  c c c (  cc
c c  c c c c 
c  c c c   c c
( c c c%c c  c c 
 (c cc  c c c
c    c c c%cc  #cc
c c    c  (c c c %c c c
) c c   c
c   c c cc
c
c c  c 
 c !c  c 4 63&1c
c c    c
  c c c    c c 
c c   c c c  c )c
 c  c   c  c c  c c 4 c +411,c %c  c 
c c
  c  c c c 
 c %c c c ( c 1 c   c c  c c
c c c  c   #c c
c   c   c c (c c c
  c* c)c ccc(c c  #c c4 63&1c
c

-c EAP (Protocolo de autenticación extensible): c  c /  c c


1 c  c c  c +111,c c  c * c c   c
 (  c c  c   (c c    c c    c c
  c  (  c &1c c 'c   c c c c c
  c  c c* c c  cc c 
c c
   c c c  $c   c  $c c    c %c
  c c  cc
c
4  c&1cc  c
  c c c
  c   c
  c c c
&1c   c c
c c  % cc
 $c c    c
  #c c  c c
c   c  c 
c "(c   c  $c   c %c   c
&1c $ c  c c c c &1c  c c  c   c  c  c
 cc / c c  c 
 c
 c+10,c cc
c
cc c 
 c !c c cc c&1.c
Ôc &16457c3&1c+
 cc c c  c3&1,c
Ôc &168 c+ c c  c( c c  c c ,cc
&168 c c  c * c c   c c c c  c c  c c
 c c c 
  c ( c   c c     c  c c  c 5  c c
 c c   c c  c c c c 
c c   c c
 c %c c 
  c c c c 
c c   c c c c c
  c cc
cc cc
) cc  cc / c
c
c
-c ’erberos:c c  c  c c   c c  c c     c c
 c c c   c  c  c  c   c   c c     c
 c c   c  c c #  c c      c
   c  c  c  c c  6
  c %c (  c   c
.c  c  c c 
  c
  c c     c  c c  c c
 $c c   c ) c   c  c 
 c 
  c %c
c c9%c
c
: ( c c (c  c   c c 
c * c %c  c  c   c c
  c & )c / c /  c c  c  c   c  c
  c c
c* c
c
c
w   CLAVES SECRETAS CO‰PARTIDAS

c  c c (c  c  c   c     c  c 'c  c c c


  c- c c
c c  c ccc c cc   cc
   c c c cc%c *c  cc  c8c c
c  cc c 6 cc

c (c  c  c 


c  c   c  
 c c c c
 c%c c  ccc c$cc c: ( c7c cc c
 c   c c 
c "(c &(c  c ( c    c 1 c
  c  c  c c 
c   c  
 cc
c
Importante: c c c   c  c 
c   c  
 c c c
 c  c c  c * c c   c 
 c *(c c
  c c
c  c 
 c c c
c ccc
 c  c +%c c  c   c  c  c c   c )c *(,c c c
  c c c  c : ( c7c &c c 
c   c
 
 c c   c  c /c c   c c   c  c 
c
  c  
 c c c  c 
c c    (  c %c  c
(  c cc)  c c 1 c c  cccc
c
 
 c   c  c  (c %c c  c c  c c   c c
: ( c7c c c  c c   cc
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
w  2 CENTRO DE DISTRIBUCION DE CLAVES

  c c  ( c c 


c : ( cc
 c    c c  cc
c ccc c  c c
 c c  c  c c  c c   c : ( c c c  c c

c c c    c c  cc c c ) c  c c cc
 c
c
c cc c cc   c cc  ( c   ) c
c  c *c %c c
 c c  c  c c 
c &c c  )c  c
   cc    c cc  cc    c%c ccc c
c c
c      c 0  c c  c c c  ( c c 
c c

cc(c( ccc  c c  c  cc)c   cc
   c c   c c  ( c c )c %c c     c c
  c  c c  c c 
c  c  c c  c    c c  c   c c
5 ( c c
c+  (c   ,cccc c   c
  c c
c   c +  (c  ,c c  
c c  c  ( c  c
+  ccc c c c c$,c   c c c c
  c

c  ( c c 


c c 
c  c c (c   c  c c  c
 c c c c   c +    c c  $,c %c c c
 c 4'c c c    c c c  c   c c c
  c c c  $c   ( c %c c c c  c   )c
(% c1 ccc (  c cc c 
  c   c
c  c c cc 
c)cc c #cc

c
c  c ( c c   c cc% c   c c cc
c  c  c  c c  c 
  c c c  c c  c  c c
 $c  c  c c c c '( c  c  c  c c *c ( )c  c
(  c   ;c c '( c  c  ( c  c  c 19<4c ( )c
(  ( c"c
c%ccc   (c c19<4c19<4cc $c c
( c  *c ( ) c  c ''c #c +%c #c c   c  ,c  c
  c c 
c  c ( )c ( c c  c c c c

 c
  (c

w  w CLAVES PÚBLICAS

c  c (  c c '  c %c  c c %c    c c
   c c   c c $ c  c   c c   c   )c
cc  cc c ccc c  c c   c  c

c
c"(c c   cc    cc  c c cc c%c
c  ( c c   c  " c c %c c c 
c  c ( c c 
c
 
 c
+c
c 
 c cc   c  cc ( c 
 c c cc

c* c c cc  c cc
c  ,cc
 c ( c c   c    c c    c %c    c c c 
c
"(c ccc  c  cc  c c
c"(cc
c
c   c c  c  c c   c  c %c c c  c
( c  c c  c  cc
 c cc
c c c
  c%c  cc   c
c
c
c
c
c
c
c
c
c
c
c
c
c
c c
w   EJE‰PLOS DE PROTOCOLOS DE AUTENTICACION

DIFFIE-HELL‰AN

c  c 563 c + ( c c' c 5c %c 4  c 3 ,c  c c


  (c c c
c  c c cc c' c  c c 
c
 c c c  c%c c  c  c+ c  ,c

c c    c c  c  c   c 


c * c c  ) c
 c cc  c c c c

 c c   c  c ( c  


c c (c  c
 c  c
  c

c    c  c  c c / c  c + $  c c   ,c c
 c c  c c cc c

c c
c

’ERBEOS

: ( c c  c  c c   c c  c c     c c  c c


c   c  c  c  c   c   c c     c  c c
  c c c #  cc     c   c c c c c
 6
  c%c(  c  c.c c cc
  c
  c
c     c  c c  c c  $c c   c ) c   c  c

 c
  c+Ú c ÚÚÚÚ,c%cc c9%c

: ( c c (c  c   c c 


c * c %c  c  c   c c
  c & )c / c /  c c  c  c   c  c
  c c
c* c

 c  c c    c c c  .c c  c c  c c c c
  c c & c c  c c8= c c )c   c  c ( c  c >c c

c+%cc (,c%c%c c   cc cc'c c ( c c' c
c c
c> (  c

c
w 2 FIR‰AS DIGITALES

- c  c c c  c   c    c c c c c   c  c


 cc c
c 
 c%c  c c c c c
c"(c c

  c c 'c  c c  c    c  c c 
c  
 c
   c c  c c  c  c    c c  c (c    c c
  ccc c  cc
c 
 cc(c
  cc
 c
c
c
c  c c  c  c  c  c
  c c c  $c ( c

 c  c c  c c  c c  c + c c c  c
 cc
c 
 ccc  c cc
c"(c c cc

  ,c &c c c c c   c + c   c c ,c & c
(* c  ) c  c  c   c  c c c c +,c c
 c c   c (c cc  c   cc/ c
 cc c+ c' c c ,c# c
c
c
< c ccc cc c c c c  cc c
c"(c
  c c  c    c  c   c c c 'c   c  c  c
(  c c c 
c "(c %c c    c ( c c   c c c
  c c c  c c c c    cVÚ
 c Úc V  Ú
 c  c  ÚÚÚc VÚ
 c 1 c   c  c  c   c c
  c%cc cc   cc    c cc   c
c
c

c
c
FUNCION HASH

c- c   c ''c c  c   c  c c  c 


 c c  c
(  c c  c cc c  c

c  c c c #c $c     c c


 c c c c
  cc

- c (c  c c c c   c   c  c   c ''c  c %c  c


  c cc''c c cc c  c  c c  cc

c
c

c  c''cc)c c .c

FUNCION HASH DESCRIPCION


‰D5 1 c  $c c  c   c  (  c
 c (c c 7?c (c    c  c
 c c?@c(c
SHA- 8c c    c  c  $c c   c
)/c ABc(c +)c c c c  c c
=(%,c %c   c c  c  c
 c c?A c(c
RIPE‰D- c Ú c c ?A c (c 9 145c +(* c
 c " cc c  $,c c
   c  c c " c
 c'/ cB c c c  c c
 c9 1456?A c c c  c
c

c/c
 c   c  c   c( c cc 
  c
c  c  cc( c c  c cc   cc

 c
 Ú cc  Úccc c c Ú  c Úc cÚ c
c

Objetivos del uso de la firma electrónica

c 1    cc c c    ccc  c c cc


 c%ccc  c  ccc    c cc
c
c  c c    c c  c c  '
c   c  c c
  c .c (  c    c%c    c
c
c
c  c c    c 'c  c c  c  c c  c c
 '
c c    c %c  
 c  c  c   c  c   c c
 c c  c   c  c c c (c c  
  c
(c
c
c ( c%c  cc   c%c )c cc c
c  c c  '
c   c ( c   c c
  c c c  c c   c c   c %c c c
   c c c c cc( cc ( c
c
c
c

Ventajas

c 1   cc)/c  c c   c%c     c c  cc


c
c  ccc ccc  c) cc
c
c 5ccc c $ (c c c
c cc)(c cc c
c  'c c c
c
c &cc c c c
c
c c4$ c%c cc c  c
c
c ccc  c
c
c Ccc c
c
c  c c( c c c c
c
w 2  FIR‰AS DIGITALES DE CLAVE SI‰ETRICA

c
c

 ccccc
c cc  c c  c%c   cc
ccc cc* cc c
c 

-c  c'c)c ) ccc c


c"(c

-c 9 c  c cc  c c  c


" c c cc

 cÚ Ú c

Îc 1 c  cc c cc $c cc c  cc

Îc c c  ( c cc  c cc

1 ccc c cc 5&c97c5 c89 1c5 cccc

c
c
c

Proceso de la firma

Îc c c  cc $cc


 c
c
Îc c cc c  c''c c c   c c  c c
 $c
c
Îc c  c  cc  c cc
c 
 cc
c 
 c
c  c c /c c  c  c  c  c )c c
 c c c cc   c c  c
c

Îc c  c cc c ccc c


c
Îc c  c
c   cc c c%cc $c  c
c   c c  $c  c  c    c  c c c
   c c c c 
c
Îc c   ccc 
c "(c c  c  c
  cc c
cc  c c    cc  c  cc $c
c
Îc c   c c  c  c c  $c  c c c
  c  c c
c

Îc c   c cc c " c cc c c/ c
cc   c(ccc c c' c c  c  c
c  c  cc
c
c

c
c
c
c c
w 2 2 FIR‰AS DIGITALES DE CLAVE ASI‰ETRICA

c   c* c c c * c   )c c c  c c c 
c  c c

c c  $c - c c c 
c c "(c %c c  c    c c
 c  cc c
cc 
 c%cc  c (c  c c c
c  c ccccc* c  )c   ccc c
c
ccc c   c c
c c ccc c cc c
c(cc c  c'% c(  c ccc c c
c
c
cc  ccc
c"(c c   c c  cc $c c
c
  ccc
c 
 c c   c )c   cc $c%cc
c c " c c c c 1 c c  c c  c c      c c 
c c
 $c  c 
c c   c  c   c c  c c c
  c c   c c  $c c c c c c c c c c c c c c c c c c c c c c c c c c c c c c c c c c c c c c c c c c
c
c c   c c  c c 
c c c 
c  
 c  c   c c  $c
 cccc
c"(c )c   c cccc c
 cc   ccc  c c  c%ccc(ccc
 c '( c  c *c  c c c 
c  
 c +
c  c c c '(c
  c ( ,c c  c c c   c c c  c   c c c c
'(c )c ($c c c c c c c c c c c c c c c c c c c c c
c
c c c   c c 
c "(c c c c   c * c c
   c  c c  c c 
 c c  (c c   (c c 
c c c c
c c   c * c  c c 
c "(c c c  c c c
 c %c c   c c   c c  c  cc 
c c  c 8 c c
c c  c c c  c c   c c   c  c c  c
 c  c c c c 
c "(c c   c c )c c c 
c
"(c  c  c  c  c  c c c   c  c c
  c
c
(c    c c  c  c   c   c (  c c 
c "(c c
 c   cc $c   c ccc
cc c   c
 $cc  c c c cc  c cc
c 
 
c c
Proceso de la firma

& c%cD  c  cc c c


c 
cc
c
& c (c c
 $ccD  c
c  cc
D  c c

  cc
 cc& c
 c'c
 cc
 $c1 cc c
& c (c
 c  .c
c
?c9cc $c  c c  c''c
c cc  c cc  c''c cc
c 
 c
cc c( cc c c
!c
ccD  cc $c  c$ c cc c
c
D  c (cc
 $c$ ccc
 c c5( )c
 ( cc
 c
c*c c  c c
( cc $c%c
  cc c
cc+    c
%c  ,c
c
c
Bc5 cc  c c $c  cc
c"(c c& cc
7c&cc $cc  c''c c(  cc  c
Ac cc  c ( c cc(  cc  c cc  c''c c c
c
D  c c c c cc c'c
 cc $cc& c%cc
*c c'c c  c
c