{"id":1247,"date":"2012-11-19T12:57:19","date_gmt":"2012-11-19T14:57:19","guid":{"rendered":"http:\/\/efagundes.com\/openclass_networking\/?page_id=1247"},"modified":"2022-01-16T17:53:21","modified_gmt":"2022-01-16T20:53:21","slug":"o-algoritmo-rsa-2","status":"publish","type":"page","link":"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/o-algoritmo-rsa-2\/","title":{"rendered":"O Algoritmo RSA (II)"},"content":{"rendered":"<p><a href=\"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide267.png\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2709\" data-permalink=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/o-algoritmo-rsa-2\/slide267\/\" data-orig-file=\"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide267.png?fit=960%2C720&amp;ssl=1\" data-orig-size=\"960,720\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Slide267\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide267.png?fit=960%2C720&amp;ssl=1\" class=\"alignnone size-full wp-image-2709\" src=\"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide267.png?resize=960%2C720\" alt=\"Slide267\" width=\"960\" height=\"720\" srcset=\"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide267.png?w=960&amp;ssl=1 960w, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide267.png?resize=300%2C225&amp;ssl=1 300w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":1205,"menu_order":280,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-1247","page","type-page","status-publish","hentry"],"jetpack_shortlink":"https:\/\/wp.me\/P8yKGp-k7","jetpack-related-posts":[{"id":1243,"url":"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/o-algoritmo-rsa\/","url_meta":{"origin":1247,"position":0},"title":"O Algoritmo RSA (I)","author":"Eduardo Fagundes","date":"19\/11\/2012","format":false,"excerpt":"","rel":"","context":"Post similar","block_context":{"text":"Post similar","link":""},"img":{"alt_text":"Slide266","src":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide266.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide266.png?resize=350%2C200 1x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide266.png?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide266.png?resize=700%2C400 2x"},"classes":[]},{"id":1251,"url":"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/o-algoritmo-rsa-3\/","url_meta":{"origin":1247,"position":1},"title":"O Algoritmo RSA (III)","author":"Eduardo Fagundes","date":"19\/11\/2012","format":false,"excerpt":"","rel":"","context":"Post similar","block_context":{"text":"Post similar","link":""},"img":{"alt_text":"Slide268","src":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide268.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide268.png?resize=350%2C200 1x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide268.png?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide268.png?resize=700%2C400 2x"},"classes":[]},{"id":1256,"url":"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/exemplo-do-algoritmo-rsa\/","url_meta":{"origin":1247,"position":2},"title":"Exemplo do algoritmo RSA","author":"Eduardo Fagundes","date":"19\/11\/2012","format":false,"excerpt":"","rel":"","context":"Post similar","block_context":{"text":"Post similar","link":""},"img":{"alt_text":"Slide269","src":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide269.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide269.png?resize=350%2C200 1x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide269.png?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide269.png?resize=700%2C400 2x"},"classes":[]},{"id":753,"url":"https:\/\/efagundes.com\/networking\/algoritmos-de-roteamento\/roteamento-por-estado-de-enlace\/","url_meta":{"origin":1247,"position":3},"title":"Roteamento por estado de enlace","author":"Eduardo Fagundes","date":"18\/11\/2012","format":false,"excerpt":"Estado de enlace: Tamb\u00e9m definido como algoritmo Link State, este algoritmo trabalha baseado na ideia de que cada roteador possui informa\u00e7\u00f5es sobre as redes que est\u00e3o conectadas a ele e, periodicamente, testa para determinar se cada enlace est\u00e1 ativo. Com estas informa\u00e7\u00f5es cada roteador divulga uma lista sobre o status\u2026","rel":"","context":"Post similar","block_context":{"text":"Post similar","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide175.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide175.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide175.jpg?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide175.jpg?resize=700%2C400 2x"},"classes":[]},{"id":787,"url":"https:\/\/efagundes.com\/networking\/algoritmos-de-roteamento\/tecnicas-para-se-alcancar-boa-qualidade-de-servico-algoritmo-do-balde-furado\/","url_meta":{"origin":1247,"position":4},"title":"T\u00e9cnicas para se alcan\u00e7ar boa qualidade de servi\u00e7o: algoritmo do balde furado","author":"Eduardo Fagundes","date":"18\/11\/2012","format":false,"excerpt":"Outra t\u00e9cnica para alcan\u00e7ar boa qualidade de servi\u00e7o \u00e9 o algoritmo do balde furado. Imagine um balde com um pequeno furo no fundo, como ilustra a figura (a) acima. Independente da velocidade com que a \u00e1gua entra no balde, o fluxo de sa\u00edda ocorrer\u00e1 em uma taxa constante, \u03c1, quando\u2026","rel":"","context":"Post similar","block_context":{"text":"Post similar","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide333.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide333.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide333.jpg?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide333.jpg?resize=700%2C400 2x"},"classes":[]},{"id":751,"url":"https:\/\/efagundes.com\/networking\/algoritmos-de-roteamento\/roteamento-com-vetor-distancia\/","url_meta":{"origin":1247,"position":5},"title":"Roteamento com vetor dist\u00e2ncia","author":"Eduardo Fagundes","date":"18\/11\/2012","format":false,"excerpt":"Os algoritmos de roteamento com vetor de dist\u00e2ncia operam fazendo cada roteador manter uma tabela (isto \u00e9,\u00a0 um vetor) que fornece a melhor dist\u00e2ncia conhecida at\u00e9 cada destino e determina qual linha deve ser utilizada para se chegar l\u00e1. Essas tabelas s\u00e3o atualizadas atrav\u00e9s da troca de informa\u00e7\u00f5es com os\u2026","rel":"","context":"Post similar","block_context":{"text":"Post similar","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide166.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide166.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide166.jpg?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide166.jpg?resize=700%2C400 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/pages\/1247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/comments?post=1247"}],"version-history":[{"count":0,"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/pages\/1247\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/pages\/1205"}],"wp:attachment":[{"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/media?parent=1247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}