<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>- Linuxbasico</title>
	<atom:link href="https://linuxbasico.com/tag/criptografia/feed" rel="self" type="application/rss+xml" />
	<link>https://linuxbasico.com/tag/criptografia</link>
	<description>Linux básico, tutoriales Linux, informática, aprende Linux básico</description>
	<lastBuildDate>Tue, 11 Oct 2022 07:43:32 +0000</lastBuildDate>
	<language>es</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://linuxbasico.com/wp-content/uploads/2020/04/cropped-icon-32x32.png</url>
	<title>- Linuxbasico</title>
	<link>https://linuxbasico.com/tag/criptografia</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Técnicas de cifrado, cifrado simétrico y asimétrico</title>
		<link>https://linuxbasico.com/tecnicas-cifrado-simetrico-asimetrico</link>
					<comments>https://linuxbasico.com/tecnicas-cifrado-simetrico-asimetrico#respond</comments>
		
		<dc:creator><![CDATA[Iñaki Méndez]]></dc:creator>
		<pubDate>Wed, 19 Aug 2020 21:45:21 +0000</pubDate>
				<category><![CDATA[Análisis]]></category>
		<category><![CDATA[Seguridad]]></category>
		<category><![CDATA[cifrado]]></category>
		<category><![CDATA[criptografia]]></category>
		<category><![CDATA[seguridad]]></category>
		<category><![CDATA[técnicas de cifrado]]></category>
		<guid isPermaLink="false">https://linuxbasico.com/?p=1225</guid>

					<description><![CDATA[<p>La criptografía y la seguridad informática van de la mano. En esta entrada vamos a abordar las técnicas de cifrado o técnicas criptográficas utilizadas para garantizar la confidencialidad e integridad de la información gestionada digitalmente.&#160; Te recomendamos la lectura del...</p>
<p>La entrada <a href="https://linuxbasico.com/tecnicas-cifrado-simetrico-asimetrico">Técnicas de cifrado, cifrado simétrico y asimétrico</a> se publicó primero en <a href="https://linuxbasico.com">Linux Básico</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Flinuxbasico.com%2Ftecnicas-cifrado-simetrico-asimetrico&amp;linkname=T%C3%A9cnicas%20de%20cifrado%2C%20cifrado%20sim%C3%A9trico%20y%20asim%C3%A9trico" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Flinuxbasico.com%2Ftecnicas-cifrado-simetrico-asimetrico&amp;linkname=T%C3%A9cnicas%20de%20cifrado%2C%20cifrado%20sim%C3%A9trico%20y%20asim%C3%A9trico" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Flinuxbasico.com%2Ftecnicas-cifrado-simetrico-asimetrico&amp;linkname=T%C3%A9cnicas%20de%20cifrado%2C%20cifrado%20sim%C3%A9trico%20y%20asim%C3%A9trico" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_flipboard" href="https://www.addtoany.com/add_to/flipboard?linkurl=https%3A%2F%2Flinuxbasico.com%2Ftecnicas-cifrado-simetrico-asimetrico&amp;linkname=T%C3%A9cnicas%20de%20cifrado%2C%20cifrado%20sim%C3%A9trico%20y%20asim%C3%A9trico" title="Flipboard" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Flinuxbasico.com%2Ftecnicas-cifrado-simetrico-asimetrico&amp;linkname=T%C3%A9cnicas%20de%20cifrado%2C%20cifrado%20sim%C3%A9trico%20y%20asim%C3%A9trico" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_telegram" href="https://www.addtoany.com/add_to/telegram?linkurl=https%3A%2F%2Flinuxbasico.com%2Ftecnicas-cifrado-simetrico-asimetrico&amp;linkname=T%C3%A9cnicas%20de%20cifrado%2C%20cifrado%20sim%C3%A9trico%20y%20asim%C3%A9trico" title="Telegram" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_pocket" href="https://www.addtoany.com/add_to/pocket?linkurl=https%3A%2F%2Flinuxbasico.com%2Ftecnicas-cifrado-simetrico-asimetrico&amp;linkname=T%C3%A9cnicas%20de%20cifrado%2C%20cifrado%20sim%C3%A9trico%20y%20asim%C3%A9trico" title="Pocket" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Flinuxbasico.com%2Ftecnicas-cifrado-simetrico-asimetrico&amp;linkname=T%C3%A9cnicas%20de%20cifrado%2C%20cifrado%20sim%C3%A9trico%20y%20asim%C3%A9trico" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<h5 class="wp-block-heading">La criptografía y la <a href="https://linuxbasico.com/seguridad/" target="_blank" rel="noreferrer noopener">seguridad informática</a> van de la mano. En esta entrada vamos a abordar las <strong>técnicas de cifrado </strong>o técnicas criptográficas utilizadas para garantizar la confidencialidad e integridad de la información gestionada digitalmente.&nbsp;</h5>



<p>Te recomendamos la lectura del documento <a href="http://www.dma.fi.upm.es/recursos/aplicaciones/matematica_discreta/web/aritmetica_modular/criptografia.html" target="_blank" rel="noreferrer noopener">Introducción a la Criptología</a> como material de consulta y documentación, el cual aborda los aspectos más fundamentales de la criptografía que veremos con más detalle a lo largo de este capítulo.&nbsp;</p>



<p>Adicionalmente, trataremos aspectos que permitirán mitigar los vectores de ataque que emplean los usuarios malintencionados a la hora de acceder a las organizaciones a través de los endpoints.&nbsp;</p>



<h3 class="wp-block-heading">Cifrado simétrico&nbsp;</h3>



<p>Las técnicas de cifrado consisten en “ofuscar” o hacer inteligible un archivo, convirtiendo su contenido original en otro conocido como <strong>criptograma</strong>.&nbsp;</p>



<p>En el caso del cifrado simétrico, esta basado en un algoritmo reconocido (DES, 3DES, AES, BlowFish, y más).</p>



<p>Esto se suma a una única clave, que se selecciona por el usuario, que se utiliza tanto para cifrar como para descifrar el archivo.</p>



<p>La complejidad y longitud de esta contraseña determinará la fortaleza del proceso.&nbsp;</p>



<p>Como ejemplos de aplicaciones de cifrado simétrico, a continuación se muestra la operativa con los programas Veracrypt así como con la utilidad bitlocker incluido en los sistemas Windows.</p>



<p>El cifrado simétrico es la solución más eficaz para proteger la información confidencial que <strong>NO </strong>queramos compartir con otros usuarios.</p>



<p>Al utilizarse la misma clave para el cifrado y descifrado, será necesario <strong>comunicar al destinatario </strong>la clave que se utiliza, lo que presenta varios problemas:&nbsp;</p>



<p>Si utilizamos siempre la misma clave para cifrar información, el destinatario podría “descifrar” cualquier otro documento que hubiéramos protegido al que tuviera acceso. </p>



<p>No hay garantía de que el destinatario no comunique a otra&nbsp;persona la clave que hemos compartido con él.  </p>



<p>Si necesitamos comunicarnos de forma segura con varios destinatarios, deberíamos de utilizar cuando menos una contraseña diferente para la relación con cada uno de ellos.&nbsp;</p>



<p>Para compartir información confidencial se utilizan en su lugar, los algoritmos de cifrado asimétrico&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img fetchpriority="high" decoding="async" src="https://linuxbasico.com/wp-content/uploads/2020/08/llave_compartida.png" alt="" class="wp-image-1279" width="473" height="290" srcset="https://linuxbasico.com/wp-content/uploads/2020/08/llave_compartida.png 396w, https://linuxbasico.com/wp-content/uploads/2020/08/llave_compartida-300x184.png 300w" sizes="(max-width: 473px) 100vw, 473px" /></figure>
</div>


<h3 class="wp-block-heading">Cifrado asimétrico&nbsp;</h3>



<p>Con el objetivo de posibilitar el intercambio de información confidencial entre usuarios manteniendo la seguridad durante el proceso, se desarrollaron los algoritmos de cifrado asimétricos basados en la creación de de <strong>dos claves diferentes relacionadas entre sí</strong>.&nbsp;</p>



<p>Por ello estos algoritmos de cifrado son conocidos como de <strong>clave pública/privada</strong>. Los más utilizados son los basados en claves RSA. Sus características principales son las siguientes:&nbsp;</p>



<p>Cada usuario posee dos claves, una <strong>privada </strong>y otra <strong>pública</strong>. La clave privada es mantenida en secreto y protegida por una contraseña. </p>



<p>La clave pública es facilitada a cualquier usuario con el que deseamos intercambiar información.</p>



<p>Se utiliza la clave pública del destinatario para cifrar la información confidencial. Esta información solo se podrá descifrar por el usuario que posea la clave privada relacionada. </p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img decoding="async" src="https://linuxbasico.com/wp-content/uploads/2020/08/cifrado_asimetrico.png" alt="" class="wp-image-1277" width="454" height="293" srcset="https://linuxbasico.com/wp-content/uploads/2020/08/cifrado_asimetrico.png 532w, https://linuxbasico.com/wp-content/uploads/2020/08/cifrado_asimetrico-300x193.png 300w" sizes="(max-width: 454px) 100vw, 454px" /></figure>
</div><div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img decoding="async" src="https://linuxbasico.com/wp-content/uploads/2025/08/inakimendez.jpg" width="100"  height="100" alt="" itemprop="image"></div><div class="saboxplugin-authorname"><a href="https://linuxbasico.com/author/inaki" class="vcard author" rel="author"><span class="fn">Iñaki Méndez</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Técnico informático especializado en Linux, redes y ciberseguridad. Apasionado del software libre, comparto tutoriales y guías prácticas en Linuxbasico para ayudarte a dominar el entorno Linux desde cero.</p>
</div></div><div class="clearfix"></div><div class="saboxplugin-socials sabox-colored"><a title="Instagram" target="_blank" href="https://www.instagram.com/inaki_mendez/" rel="nofollow noopener" class="saboxplugin-icon-color"><svg class="sab-instagram" viewBox="0 0 500 500.7" xml:space="preserve" xmlns="http://www.w3.org/2000/svg"><path class="st0" d="m499.8 250.7c0 7.6-0.4 15.2-1 22.6-0.2 2.2-0.4 4.4-0.7 6.6-0.1 0.6-0.1 1.1-0.2 1.7-0.3 2.6-0.7 5.2-1.1 7.7-0.4 2.3-0.8 4.7-1.2 7 0 0.3-0.1 0.6-0.2 0.9-0.2 1-0.4 1.9-0.5 2.9-0.2 0.8-0.4 1.6-0.5 2.5-0.1 0.3-0.1 0.5-0.2 0.8-0.7 3.3-1.5 6.5-2.3 9.7-0.6 2.3-1.2 4.5-1.9 6.8-23.4 81.3-87.1 145.6-168.2 169.8-3 0.9-6.1 1.8-9.2 2.6-1.5 0.4-3 0.8-4.5 1.1-3.6 0.9-7.2 1.6-10.9 2.3-0.2 0-0.5 0.1-0.7 0.1l-3 0.6c-1.8 0.3-3.6 0.6-5.4 0.9-0.2 0-0.3 0.1-0.5 0.1-0.9 0.1-1.9 0.3-2.8 0.4-5.5 0.8-11.1 1.3-16.7 1.7-0.8 0.1-1.6 0.1-2.4 0.1-5 0.3-10.1 0.4-15.2 0.4-137.7 0-249.3-111.6-249.3-249.3s111.6-249.4 249.3-249.4 249.3 111.7 249.3 249.4z" fill="#405de6" /><path class="st1" d="m495.4 297.2c-0.2 1-0.4 1.9-0.5 2.9-0.2 0.8-0.4 1.6-0.5 2.5-0.1 0.3-0.1 0.5-0.2 0.8-0.7 3.3-1.5 6.5-2.3 9.7-0.6 2.3-1.2 4.5-1.9 6.8-23.4 81.3-87.1 145.6-168.2 169.8-3 0.9-6.1 1.8-9.2 2.6-1.5 0.4-3 0.8-4.5 1.1-3.6 0.9-7.2 1.6-10.9 2.3-0.2 0-0.5 0.1-0.7 0.1l-151.5-152.7v-147l9.2-27 14.8-14 33-8 70-5 80.5 11.7 142.9 143.4z" /><path class="st2" d="m252.7 192.1c-34.1 0-61.6 27.5-61.6 61.6s27.5 61.6 61.6 61.6 61.6-27.5 61.6-61.6-27.5-61.6-61.6-61.6zm0 101.6c-22 0-40-17.9-40-40s17.9-40 40-40 40 17.9 40 40-17.9 40-40 40zm78.5-104.1c0 8-6.4 14.4-14.4 14.4s-14.4-6.4-14.4-14.4 6.4-14.4 14.4-14.4c7.9 0 14.4 6.4 14.4 14.4zm40.7 14.6c-0.9-19.2-5.3-36.3-19.4-50.3-14-14-31.1-18.4-50.3-19.4-19.8-1.1-79.2-1.1-99.1 0-19.2 0.9-36.2 5.3-50.3 19.3s-18.4 31.1-19.4 50.3c-1.1 19.8-1.1 79.2 0 99.1 0.9 19.2 5.3 36.3 19.4 50.3s31.1 18.4 50.3 19.4c19.8 1.1 79.2 1.1 99.1 0 19.2-0.9 36.3-5.3 50.3-19.4 14-14 18.4-31.1 19.4-50.3 1.2-19.9 1.2-79.2 0-99zm-25.6 120.2c-4.2 10.5-12.3 18.6-22.8 22.8-15.8 6.3-53.3 4.8-70.8 4.8s-55 1.4-70.8-4.8c-10.5-4.2-18.6-12.3-22.8-22.8-6.3-15.8-4.8-53.3-4.8-70.8s-1.4-55 4.8-70.8c4.2-10.5 12.3-18.6 22.8-22.8 15.8-6.3 53.3-4.8 70.8-4.8s55-1.4 70.8 4.8c10.5 4.2 18.6 12.3 22.8 22.8 6.3 15.8 4.8 53.3 4.8 70.8s1.5 55.1-4.8 70.8z" /></svg></span></a><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/inakimendez/" rel="nofollow noopener" class="saboxplugin-icon-color"><svg class="sab-linkedin" viewBox="0 0 500 500.7" xml:space="preserve" xmlns="http://www.w3.org/2000/svg"><path class="st0" d="m499.8 250.7c0 7.6-0.4 15.2-1 22.6-0.2 2.2-0.4 4.4-0.7 6.6-0.1 0.6-0.1 1.1-0.2 1.7-0.3 2.6-0.7 5.2-1.1 7.7-0.4 2.3-0.8 4.7-1.2 7 0 0.3-0.1 0.6-0.2 0.9-0.2 1-0.4 1.9-0.5 2.9-0.2 0.8-0.4 1.6-0.5 2.5-0.1 0.3-0.1 0.5-0.2 0.8-0.7 3.3-1.5 6.5-2.3 9.7-0.6 2.3-1.2 4.5-1.9 6.8-1.5 5.3-3.2 10.5-5 15.6-26.7 73.9-87.3 131.6-163.2 154.2-3 0.9-6.1 1.8-9.2 2.6-1.5 0.4-3 0.8-4.5 1.1-3.6 0.9-7.2 1.6-10.9 2.3h-0.2c-0.2 0-0.3 0.1-0.5 0.1l-3 0.6c-1.8 0.3-3.6 0.6-5.4 0.9-0.2 0-0.3 0.1-0.5 0.1-0.9 0.1-1.9 0.3-2.8 0.4-5.5 0.8-11.1 1.3-16.7 1.7-0.8 0.1-1.6 0.1-2.4 0.1-5 0.3-10.1 0.4-15.2 0.4-137.7 0-249.3-111.6-249.3-249.3s111.6-249.4 249.3-249.4 249.3 111.7 249.3 249.4z" fill="#0077b5" /><path class="st1" d="m485 335.5c-26.7 73.9-87.3 131.6-163.2 154.2-3 0.9-6.1 1.8-9.2 2.6-1.5 0.4-3 0.8-4.5 1.1-3.6 0.9-7.2 1.6-10.9 2.3h-0.2l-148.3-148.1 35.3-142.9-32-37.6 38.1-38.7 68 68.4h11.9l9.5 9.3 70.5-3.9 135 133.3z" /><path class="st2" d="m195.6 347.6h-46.9v-150.8h46.9v150.8zm-23.5-171.4c-15 0-27.1-12.4-27.1-27.4s12.2-27.1 27.1-27.1c15 0 27.1 12.2 27.1 27.1s-12.1 27.4-27.1 27.4zm198.9 171.4h-46.8v-73.4c0-17.5-0.4-39.9-24.4-39.9-24.4 0-28.1 19-28.1 38.7v74.7h-46.8v-150.9h44.9v20.6h0.7c6.3-11.9 21.5-24.4 44.3-24.4 47.4 0 56.1 31.2 56.1 71.8l0.1 82.8z" /></svg></span></a><a title="Wordpress" target="_blank" href="https://inakimendez.com" rel="nofollow noopener" class="saboxplugin-icon-color"><svg class="sab-wordpress" viewBox="0 0 500 500.7" xml:space="preserve" xmlns="http://www.w3.org/2000/svg"><path class="st0" d="m499.4 250.9c0 2.2 0 4.4-0.1 6.6-0.1 5.4-0.5 10.7-0.9 15.9-0.2 2.2-0.4 4.5-0.7 6.7-0.1 0.6-0.1 1.1-0.2 1.7-0.7 4.8-1.4 9.5-2.2 14.2v0.3c-0.2 1-0.4 2-0.5 3 0 0.1 0 0.2-0.1 0.3 0 0.2-0.1 0.5-0.1 0.7-0.1 0.5-0.2 1-0.3 1.6-1 4.6-2.1 9.2-3.2 13.7-0.2 0.9-0.5 1.9-0.8 2.8-0.2 0.6-0.3 1.1-0.5 1.7-0.8 2.7-1.6 5.3-2.5 8-1.4 4.2-2.8 8.5-4.4 12.5-0.1 0.4-0.3 0.7-0.4 1.1-0.9 2.3-1.8 4.6-2.8 6.8-28.3 66.6-84.9 118.5-154.8 140.4-1.1 0.4-2.2 0.7-3.3 1-3 0.9-6.1 1.7-9.1 2.5-2.5 0.7-5 1.3-7.6 1.8-1.3 0.3-2.6 0.6-3.9 0.9-0.2 0.1-0.5 0.1-0.7 0.2-1.5 0.3-2.9 0.5-4.3 0.8-0.6 0.1-1.3 0.2-1.9 0.4-3.1 0.6-6.3 1.1-9.5 1.5-0.3 0-0.5 0.1-0.8 0.1-2.7 0.4-5.5 0.7-8.2 1-0.4 0-0.8 0.1-1.2 0.1-1.1 0.1-2.1 0.2-3.2 0.3s-2.2 0.2-3.4 0.2c-0.8 0.1-1.6 0.1-2.4 0.1-1.4 0.1-2.9 0.2-4.4 0.2-3.6 0.1-7.2 0.2-10.8 0.2-137.9 0-249.5-111.6-249.5-249.3s111.6-249.4 249.4-249.4c135.3 0 245.2 107.6 249.2 241.8 0.1 2.5 0.1 5.1 0.1 7.6z" fill="#21759b" /><path class="st1" d="m495.2 296.3c-0.2 1-0.4 2-0.5 3 0 0.1 0 0.2-0.1 0.3 0 0.2-0.1 0.5-0.1 0.7-0.1 0.5-0.2 1-0.3 1.6-1 4.6-2.1 9.2-3.2 13.7-0.2 0.9-0.5 1.9-0.8 2.8-0.2 0.6-0.3 1.1-0.5 1.7-0.8 2.7-1.6 5.3-2.5 8-1.4 4.2-2.8 8.5-4.4 12.5-0.1 0.4-0.3 0.7-0.4 1.1-0.9 2.3-1.8 4.6-2.8 6.8-28.3 66.6-84.9 118.5-154.8 140.4-1.1 0.4-2.2 0.7-3.3 1-3 0.9-6.1 1.7-9.1 2.5-2.5 0.7-5 1.3-7.6 1.8-72.7-73.6-156.6-158.5-158.3-160.2l-0.7-7.3-17.5-29.2-7-28.5-1.2-21.9 2.4-34.7 12.3-27 18.3-27.7 21-19.3 25-13.3 31.5-9 34.8-1.8 42.5 10.5 39.4 24.4 147.9 147.1z" /><path class="st2" d="m145.9 199.6l55.9 153c-39.1-18.9-66-59-66-105.3-0.1-17 3.6-33.1 10.1-47.7zm185.9 41.8c0-14.5-5.2-24.5-9.6-32.3-5.9-9.6-11.5-17.8-11.5-27.5 0-10.8 8.1-20.8 19.6-20.8 0.5 0 1 0.1 1.5 0.1-20.9-19.1-48.6-30.8-79.1-30.8-40.9 0-76.9 21-97.9 52.8 2.8 0.1 5.3 0.2 7.5 0.2 12.2 0 31.2-1.5 31.2-1.5 6.3-0.4 7 8.9 0.8 9.6 0 0-6.3 0.7-13.4 1.1l42.7 126.8 25.6-76.8-18.2-50c-6.3-0.4-12.3-1.1-12.3-1.1-6.3-0.4-5.6-10 0.7-9.6 0 0 19.3 1.5 30.8 1.5 12.2 0 31.2-1.5 31.2-1.5 6.3-0.4 7 8.9 0.8 9.6 0 0-6.3 0.7-13.4 1.1l42.3 125.9 11.7-39c5.2-16.2 9-27.8 9-37.8zm-77 16.1l-35.1 102.1c10.5 3.1 21.6 4.8 33.1 4.8 13.6 0 26.7-2.4 38.9-6.7-0.3-0.5-0.6-1-0.8-1.6l-36.1-98.6zm100.7-66.4c0.5 3.7 0.8 7.7 0.8 12.1 0 11.9-2.2 25.2-8.9 41.9l-35.8 103.4c34.8-20.3 58.2-58 58.2-101.2 0.1-20.4-5.1-39.5-14.3-56.2zm33.8 56.2c0 75.3-61.3 136.5-136.5 136.5-75.3 0-136.5-61.3-136.5-136.5 0-75.3 61.2-136.5 136.5-136.5 75.2 0 136.5 61.2 136.5 136.5zm-6.3 0c0-71.8-58.4-130.2-130.2-130.2s-130.2 58.4-130.2 130.2 58.4 130.2 130.2 130.2 130.2-58.4 130.2-130.2z" /></svg></span></a><a title="User email" target="_self" href="mailto:i&#110;aki&#064;&#105;n&#097;k&#105;&#046;&#101;us" rel="nofollow noopener" class="saboxplugin-icon-color"><svg class="sab-user_email" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 500 500.7"><path class="st0" d="M499.4 250.9c0 2.2 0 4.4-0.1 6.6v0.4c-0.1 1.8-0.2 3.6-0.2 5.3 0 0.4 0 0.8-0.1 1.2 -0.1 1.3-0.1 2.6-0.2 4 -0.1 1.7-0.2 3.3-0.4 5 0 0.2 0 0.4-0.1 0.6 -0.2 2-0.4 4.1-0.6 6.1 -0.1 0.6-0.1 1.1-0.2 1.7 -0.7 4.4-1.3 8.8-2 13.2 0 0.4-0.1 0.7-0.2 1v0.3c-0.2 1-0.4 2-0.5 3 0 0.1 0 0.2-0.1 0.3v0.1c0 0.2-0.1 0.4-0.1 0.6 -0.1 0.5-0.2 1-0.3 1.6 0 0.2-0.1 0.3-0.1 0.5 -0.6 2.6-1.2 5.2-1.8 7.8 -0.4 1.8-0.9 3.6-1.3 5.5 -0.2 0.9-0.5 1.9-0.8 2.8 -0.2 0.6-0.3 1.1-0.5 1.7 -0.8 2.7-1.6 5.3-2.5 8 -1.4 4.2-2.8 8.5-4.4 12.5 -0.1 0.4-0.3 0.7-0.4 1.1 -0.9 2.3-1.8 4.6-2.8 6.8 -28.1 66.2-84.2 117.8-153.5 140 -0.5 0.2-0.9 0.3-1.3 0.4 -1.1 0.4-2.2 0.7-3.3 1 -2.9 0.9-5.9 1.6-8.8 2.4 -0.1 0-0.2 0.1-0.3 0.1 -0.4 0.1-0.7 0.2-1.1 0.3 -1 0.3-2.1 0.6-3.1 0.8 -1 0.3-2 0.5-3.1 0.6 -0.1 0-0.2 0-0.3 0.1 -1 0.2-1.9 0.4-2.9 0.7 -0.3 0.1-0.7 0.2-1 0.2 -0.2 0.1-0.5 0.1-0.7 0.2 -1.5 0.3-2.9 0.5-4.3 0.8 -0.6 0.1-1.3 0.2-1.9 0.4 -0.2 0-0.3 0.1-0.5 0.1 -1.1 0.2-2.2 0.4-3.3 0.6 -1.2 0.2-2.4 0.4-3.5 0.5 -0.7 0.1-1.4 0.2-2.1 0.3 -0.3 0-0.5 0.1-0.8 0.1 -2.7 0.4-5.5 0.7-8.2 1 -0.3 0-0.7 0.1-1 0.1 -0.1 0-0.1 0-0.2 0 -1.1 0.1-2.1 0.2-3.2 0.3 -0.1 0-0.1 0-0.2 0 -1 0.1-2.1 0.2-3.2 0.2 -0.8 0.1-1.6 0.1-2.4 0.1 -1.4 0.1-2.9 0.2-4.4 0.2 -3.6 0.1-7.2 0.2-10.8 0.2 -4.3 0-8.7-0.1-13-0.3C105.4 493.1 0.7 384.3 0.7 250.9 0.7 113.2 112.3 1.5 250.1 1.5c129.3 0 235.3 98.2 248 223.9 0.5 4.4 0.8 8.9 1 13.3 0.1 1.5 0.1 3 0.2 4.6C499.4 245.8 499.4 248.4 499.4 250.9z" fill="#F97E2A" /><path class="st1" d="M499.1 263.2c0 0.4 0 0.8-0.1 1.2 -0.1 1.3-0.1 2.6-0.2 4 -0.1 1.7-0.2 3.3-0.4 5 0 0.2 0 0.4-0.1 0.6 -0.2 2-0.4 4.1-0.6 6.1 -0.1 0.6-0.1 1.1-0.2 1.7 -0.7 4.4-1.3 8.8-2 13.2 0 0.4-0.1 0.7-0.2 1v0.3c-0.2 1-0.4 2-0.5 3 0 0.1 0 0.2-0.1 0.3v0.1c0 0.2-0.1 0.4-0.1 0.6 -0.1 0.5-0.2 1-0.3 1.6 0 0.2-0.1 0.3-0.1 0.5 -0.6 2.6-1.2 5.2-1.8 7.8 -0.4 1.8-0.9 3.6-1.3 5.5 -0.2 0.9-0.5 1.9-0.8 2.8 -0.2 0.6-0.3 1.1-0.5 1.7 -0.8 2.7-1.6 5.3-2.5 8 -1.4 4.2-2.8 8.5-4.4 12.5 -0.1 0.4-0.3 0.7-0.4 1.1 -0.9 2.3-1.8 4.6-2.8 6.8 -28.1 66.2-84.2 117.8-153.5 140 -0.5 0.2-0.9 0.3-1.3 0.4 -1.1 0.4-2.2 0.7-3.3 1 -2.9 0.9-5.9 1.6-8.8 2.4 -0.1 0-0.2 0.1-0.3 0.1 -0.4 0.1-0.7 0.2-1.1 0.3 -1 0.3-2.1 0.6-3.1 0.8 -1 0.3-2 0.5-3.1 0.6 -0.1 0-0.2 0-0.3 0.1 -1 0.2-1.9 0.4-2.9 0.7 -0.3 0.1-0.7 0.2-1 0.2 -0.2 0.1-0.5 0.1-0.7 0.2 -1.5 0.3-2.9 0.5-4.3 0.8 -0.6 0.1-1.3 0.2-1.9 0.4 -0.2 0-0.3 0.1-0.5 0.1 -1.1 0.2-2.2 0.4-3.3 0.6 -1.2 0.2-2.4 0.4-3.5 0.5 -0.7 0.1-1.4 0.2-2.1 0.3 -0.3 0-0.5 0.1-0.8 0.1 -2.7 0.4-5.5 0.7-8.2 1 -0.3 0-0.7 0.1-1 0.1L119.9 344.1l105.3-46.7L119.9 191.6l265.6-41.2L499.1 263.2z" /><path class="st2" d="M390.1 214.1c2.1-1.7 5.3-0.1 5.3 2.6v112c0 14.5-11.8 26.3-26.3 26.3H141.2c-14.5 0-26.3-11.8-26.3-26.3v-112c0-2.7 3.1-4.3 5.3-2.6 12.3 9.5 28.5 21.6 84.4 62.2 11.6 8.4 31.1 26.2 50.5 26.1 19.6 0.2 39.4-18 50.6-26.1C361.6 235.7 377.8 223.6 390.1 214.1zM255.1 284.8c12.7 0.2 31-16 40.2-22.7 72.7-52.8 78.2-57.4 95-70.5 3.2-2.5 5-6.3 5-10.4v-10.4c0-14.5-11.8-26.3-26.3-26.3H141.2c-14.5 0-26.3 11.8-26.3 26.3v10.4c0 4.1 1.9 7.8 5 10.4 16.8 13.1 22.3 17.7 95 70.5C224.1 268.8 242.4 285 255.1 284.8L255.1 284.8z" /></svg></span></a></div></div></div><p>La entrada <a href="https://linuxbasico.com/tecnicas-cifrado-simetrico-asimetrico">Técnicas de cifrado, cifrado simétrico y asimétrico</a> se publicó primero en <a href="https://linuxbasico.com">Linux Básico</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://linuxbasico.com/tecnicas-cifrado-simetrico-asimetrico/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
