Las matemáticas detrás de la criptografía y buenas prácticas asimétricas

Authors

  • Pedro Alejandro Garza Aguilar Author

DOI:

https://doi.org/10.66170/33k6b612

Keywords:

Cryptography, Quantum Computing, Mathematical Algorithms, Asymmetric Encryption

Abstract

La criptografía es un elemento esencial para proteger la información en la era digital, ya que resguarda transacciones, comunicaciones y datos sensibles. El artículo analiza la evolución y fundamentos matemáticos de la criptografía asimétrica, explicando cómo su aparición resolvió el histórico problema del intercambio seguro de claves que afectaba a los sistemas simétricos. Conceptos como RSA, (Diffie & Hellman, 1976) y la Criptografía de Curva Elíptica (ECC) se describen como pilares tecnológicos que permiten cifrado, autenticación y firma digital mediante el uso de pares de claves vinculadas matemáticamente. Asimismo, se presenta la eficiencia de ECC frente a RSA, así como el uso de esquemas híbridos que combinan cifrado simétrico y asimétrico para optimizar seguridad y rendimiento. El texto también identifica vulnerabilidades derivadas de implementaciones deficientes, como el uso inapropiado de padding en RSA o la mala gestión del valor aleatorio en algoritmos de firma, destacando que la seguridad depende tanto de las matemáticas como de las buenas prácticas. Finalmente, se aborda la amenaza que representa la computación cuántica, capaz de romper los sistemas actuales mediante el algoritmo de Shor (1997) lo que impulsa el desarrollo de la criptografía post-cuántica. Este panorama exige nuevas soluciones, estandarización internacional y la formación de profesionales capaces de enfrentar los retos de seguridad emergentes.

Downloads

Download data is not yet available.

References

Alkhudhayr, F., Moulahi, T., & Alabdulatif, A. (2021). Evaluation Study of Elliptic Curve Cryptography Scalar Multiplication on Raspberry Pi4. International Journal of Advanced Computer Science and Applications, 12(9). https://doi.org/10.14569/ijacsa.2021.0120954

Banerjee, S. (2024). Exploring Cryptographic Algorithms: Techniques, Applications, and Innovations. International Journal of Advanced Research in Science Communication and Technology, 607. https://doi.org/10.48175/ijarsct-18097

Chávez, M. A., & Henríquez, F. R. (2021). Post-Quantum Digital Signature for the Mexican Digital Invoices by Internet. Computación y Sistemas, 25(4). https://doi.org/10.13053/cys-25-4-4048

Clarisse, R. (2021). Elliptic curve design and applications. HAL (Le Centre Pour La Communication Scientifique Directe). https://hal.science/tel-03506116

Diffie, W. (1988). The first ten years of public-key cryptography. Proceedings of the IEEE, 76(5), 560. https://doi.org/10.1109/5.4442

Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654. https://doi.org/10.1109/TIT.1976.1055638

Dorin, M., & Montenegro, S. (2024). Pruebas de cifrado asimétrico en un Laboratorio de Hacking Sostenible. Interfases, 19, 77. https://doi.org/10.26439/interfases2024.n19.7058

Georgieva, M. (2013). Probabilistic analysis of reduced cryptographic Euclidean networks. HAL (Le Centre Pour La Communication Scientifique Directe). https://hal.science/tel-01081679

Housni, Y. E. (2018). Introduction to the Mathematical Foundations of Elliptic Curve Cryptography. HAL (Le Centre Pour La Communication Scientifique Directe). https://hal.archives-ouvertes.fr/hal-01914807

Marrez, J. (2019). Representations adapted to modular arithmetic and fuzzy system resolution. HAL (Le Centre Pour La Communication Scientifique Directe). https://tel.archives-ouvertes.fr/tel-03359401

Mavroeidis, V., Vishi, K., Mateusz, D., & Jøsang, A. (2018). The Impact of Quantum Computing on Present Cryptography. International Journal of Advanced Computer Science and Applications, 9(3). https://doi.org/10.14569/ijacsa.2018.090354

Morić, Z., Milovec, M., & Petrunić, R. (2024). Application of Quantum Cryptography in Securing Network Communications. In Annals of DAAAM for ... & proceedings of the ... International DAAAM Symposium (p. 55). DAAAM International Vienna. https://doi.org/10.2507/35th.daaam.proceedings.008

Neppolian, K., & Kumar, M. (2025). Applying Public Key Cryptography to Enhance Content Protection in Maritime Logistics and E-Commerce. Journal of Internet Services and Information Security, 15(2), 88. https://doi.org/10.58346/jisis.2025.i2.007

Nitulescu, A. (2019). Un recueil de SNARKs : sécurité quantique, extractabilité et confidentialité des données. HAL (Le Centre Pour La Communication Scientifique Directe). https://theses.hal.science/tel-02129544

Rashmi, S. (2024). Advances in Cryptographic Algorithms: The Mathematics behind Secure Communication. International Journal for Research in Applied Science and Engineering Technology, 12(12), 1674. https://doi.org/10.22214/ijraset.2024.66102

Razeghi, B., Rahimi, P., & Marcel, S. (2024). Deep Privacy Funnel Model: From a Discriminative to a Generative Approach with an Application to Face Recognition. arXiv (Cornell University). https://doi.org/10.48550/arxiv.2404.02696

Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126. https://doi.org/10.1145/359340.359342

Sabbry, N. H., & Левина, А. (2025). An optimized elliptic curve digital signature strategy for resource-constrained devices. Scientific Reports, 15(1). https://doi.org/10.1038/s41598-025-05601-0

Sahu, S. K., & Mazumdar, K. (2024). State-of-the-art analysis of quantum cryptography: applications and future prospects. Frontiers in Physics, 12. https://doi.org/10.3389/fphy.2024.1456491

Shor, P. W. (1997). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 26(5), 1484–1509. https://doi.org/10.1137/S0097539795293172

Simmons, G. J. (1979). Symmetric and Asymmetric Encryption [Review of Symmetric and Asymmetric Encryption]. ACM Computing Surveys, 11(4), 305. Association for Computing Machinery. https://doi.org/10.1145/356789.356793

Souza, E. R. L. de, Silva, M. M. da S. M., Xavier, N., & Brandão, O. (2025). Teoria dos números e aplicações criptográficas: A fatoração de primos na segurança digital. Research Society and Development, 14(10). https://doi.org/10.33448/rsd-v14i10.49705

Stanišić, S., Stojanović, H., & Đorđević, I. (2024). The utilization of Solidity programming language in blockchain. Vojnotehnicki Glasnik, 72(1), 363. https://doi.org/10.5937/vojtehg72-47942

Tanksale, V. (2024). Efficient Elliptic Curve Diffie–Hellman Key Exchange for Resource-Constrained IoT Devices. Electronics, 13(18), 3631. https://doi.org/10.3390/electronics13183631

Tolba, Z. (2024). Cryptanalysis and improvement of multimodal data encryption by machine-learning-based system. arXiv (Cornell University). https://doi.org/10.48550/arxiv.2402.15779

Torres, N. N., Carlos, J., & Alexis, E. (2021). Systems Security Affectation with the Implementation of Quantum Computing. International Journal of Advanced Computer Science and Applications, 12(4). https://doi.org/10.14569/ijacsa.2021.0120405

Winn, J. K. (2022). Couriers Without Luggage: Negotiable Instruments and Digital Signatures. In Routledge eBooks (p. 245). Informa. https://doi.org/10.4324/9781315193939-9

Yoon, C. S., Hong, C. H., Kang, M. S., Choi, J.-W., & Yang, H. J. (2023). Quantum asymmetric key crypto scheme using Grover iteration. Scientific Reports, 13(1). https://doi.org/10.1038/s41598-023-30860-0

Downloads

Published

2026-01-12

How to Cite

Las matemáticas detrás de la criptografía y buenas prácticas asimétricas. (2026). Proyectos Y Tendencias Digitales, 1(1). https://doi.org/10.66170/33k6b612