Blockverschlüsselung finished until CTS (Skript 2 Seite 29)
This commit is contained in:
parent
10d870f6cf
commit
3422854aff
@ -97,3 +97,10 @@
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{19}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.5}ChaCha20}{20}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{21}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{22}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.1}Padding-Verfahren}{22}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.2}Betriebsmodi}{22}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{22}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{23}\protected@file@percent }
|
||||
|
@ -1,9 +1,13 @@
|
||||
# Fdb version 3
|
||||
["pdflatex"] 1600021756 "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" "Zusammenfassung_DC" 1600021756
|
||||
["pdflatex"] 1600024822 "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" "Zusammenfassung_DC" 1600024823
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Abhörung.png" 1599946545 2649 d6dd82c7c38c06d31f966207a71dc01b ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_0.png" 1599947572 2910 b2497355ec1d31d5fce9d57d122a91f3 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_1.png" 1599947589 3427 a39ecab3779301930ce6bed4cf3141a1 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_2.png" 1599947603 3783 f12b3b1eb521e69049eb7e178c05f8b3 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_dec.png" 1600024808 8681 d1beef3bdda855c03f924aa8842c6f10 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_enc.png" 1600024618 9872 3da7196411819ef22737f9578e1e4842 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB.png" 1600023997 7379 9b90ee7b021f6a66a389f5bb954ac3ff ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB_Nonce.png" 1600024218 11089 e5625d7199c0bbb3f1d47f8a50c3c7ce ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Schlüsselstromgenerator mit Nonce.png" 1600006036 6830 255eed9add3dd8e899b4714f95b6f466 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Skytale.png" 1599914207 1414106 7498f70ad27e17e63eb468c2321baa5c ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Stromverschlüsselung.png" 1600000454 11895 926c20089116051531a0564de5026305 ""
|
||||
@ -13,9 +17,10 @@
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone additive Stromverschlüsselung.png" 1600003271 10891 bfed2f0ea0241a4a2a4bf215a3d59c32 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/zustandsabhängige Stromverschlüsselung.png" 1600002333 10276 422a1760594d1c860f8d7aa6dc5ed032 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Übertragungsmanipulation.png" 1599947212 3178 33bbd19fca19c787748d9158d802ceb1 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux" 1600021756 9744 8eef85ff3e214a3dd4da4d290552f3d7 "pdflatex"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" 1599999609 1017 308fe50a977d63b861fe1d91c2dfe568 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc" 1600021756 5853 b497ea98cc05fa5a22f374dfe982b52a "pdflatex"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux" 1600024823 10386 1381afbb713336eb5c93879a24aed9c1 "pdflatex"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" 1600023076 1092 0054d3a68ecb6150a0a78b54c52b707b ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc" 1600024823 6214 b889a013155fdb1d6a98154f42bf0083 "pdflatex"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex" 1600024821 3601 1118c09158d3fca27c9b2395db514ca0 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex" 1599950390 6191 fdec0aff09dab6668264963cb44ee2f3 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex" 1600002690 6678 5f1596dba278e6bc1791a5615776653a ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Stromverschlüsselungsverfahren.tex" 1600021754 9750 78c046cdfed5970c89760677c32ba2ee ""
|
||||
@ -70,7 +75,9 @@
|
||||
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr6.pfb" 1591545468 32734 69e00a6b65cedb993666e42eedb3d48f ""
|
||||
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr8.pfb" 1591545468 32726 0a1aea6fcd6468ee2cf64d891f5c43c8 ""
|
||||
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy10.pfb" 1591545468 32569 5e5ddc8df908dea60932f3c484a54c0d ""
|
||||
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy6.pfb" 1591545468 32587 1788b0c1c5b39540c96f5e42ccd6dae8 ""
|
||||
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy8.pfb" 1591545468 32626 4f5c1b83753b1dd3a97d1b399a005b4b ""
|
||||
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msam10.pfb" 1591545468 31764 459c573c03a4949a528c2cc7f557e217 ""
|
||||
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msbm10.pfb" 1591545468 34694 ad62b13721ee8eda1dcc8993c8bd7041 ""
|
||||
"/usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1095.pfb" 1591545468 154600 ea54091d31de803b613ba9e80ca51709 ""
|
||||
"/usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1200.pfb" 1591545468 140176 d4962f948b4cc0adf4d3dde77a128c95 ""
|
||||
@ -93,6 +100,7 @@
|
||||
"/usr/share/texmf-dist/tex/generic/kvsetkeys/kvsetkeys.sty" 1591545468 13807 952b0226d4efca026f0e19dd266dcc22 ""
|
||||
"/usr/share/texmf-dist/tex/generic/ltxcmds/ltxcmds.sty" 1591545468 18552 1e1cc7b75da0dfaacce7cdcb27d306bf ""
|
||||
"/usr/share/texmf-dist/tex/latex/amsfonts/amsfonts.sty" 1591545468 5949 3f3fd50a8cc94c3d4cbf4fc66cd3df1c ""
|
||||
"/usr/share/texmf-dist/tex/latex/amsfonts/amssymb.sty" 1591545468 13829 94730e64147574077f8ecfea9bb69af4 ""
|
||||
"/usr/share/texmf-dist/tex/latex/amsfonts/umsa.fd" 1591545468 961 6518c6525a34feb5e8250ffa91731cff ""
|
||||
"/usr/share/texmf-dist/tex/latex/amsfonts/umsb.fd" 1591545468 961 d02606146ba5601b5645f987c92e6193 ""
|
||||
"/usr/share/texmf-dist/tex/latex/amsmath/amsbsy.sty" 1591545468 2211 ca7ce284ab93c8eecdc6029dc5ccbd73 ""
|
||||
@ -127,7 +135,7 @@
|
||||
"/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map" 1599837712 334180 163417853e75f7c89e92e140d6d6e976 ""
|
||||
"/var/lib/texmf/web2c/pdftex/pdflatex.fmt" 1599837703 2514050 ecf9fe402c479fca46412778ddf38de8 ""
|
||||
(generated)
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.log"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.log"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf"
|
||||
|
@ -49,6 +49,8 @@ INPUT /usr/share/texmf-dist/tex/latex/amsmath/amsbsy.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/amsmath/amsbsy.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/amsmath/amsopn.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/amsmath/amsopn.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/amsfonts/amssymb.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/amsfonts/amssymb.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/amsfonts/amsfonts.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/amsfonts/amsfonts.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/jknapltx/mathrsfs.sty
|
||||
@ -199,6 +201,20 @@ INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/sync
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Schlüsselstromgenerator mit Nonce.png
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Schlüsselstromgenerator mit Nonce.png
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Schlüsselstromgenerator mit Nonce.png
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB.png
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB.png
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB.png
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB_Nonce.png
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB_Nonce.png
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB_Nonce.png
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_enc.png
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_enc.png
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_enc.png
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_dec.png
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_dec.png
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_dec.png
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux
|
||||
INPUT /usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc
|
||||
INPUT /usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc
|
||||
@ -211,7 +227,9 @@ INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb
|
||||
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr6.pfb
|
||||
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr8.pfb
|
||||
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy10.pfb
|
||||
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy6.pfb
|
||||
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy8.pfb
|
||||
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msam10.pfb
|
||||
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msbm10.pfb
|
||||
INPUT /usr/share/texmf-dist/fonts/type1/public/rsfs/rsfs10.pfb
|
||||
INPUT /usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1095.pfb
|
||||
|
@ -1,4 +1,4 @@
|
||||
This is pdfTeX, Version 3.14159265-2.6-1.40.21 (TeX Live 2020/Arch Linux) (preloaded format=pdflatex 2020.9.11) 13 SEP 2020 20:29
|
||||
This is pdfTeX, Version 3.14159265-2.6-1.40.21 (TeX Live 2020/Arch Linux) (preloaded format=pdflatex 2020.9.11) 13 SEP 2020 21:20
|
||||
entering extended mode
|
||||
restricted \write18 enabled.
|
||||
file:line:error style messages enabled.
|
||||
@ -136,14 +136,16 @@ LaTeX Font Info: Redeclaring font encoding OMS on input line 734.
|
||||
\mathdisplay@stack=\toks23
|
||||
LaTeX Info: Redefining \[ on input line 2859.
|
||||
LaTeX Info: Redefining \] on input line 2860.
|
||||
) (/usr/share/texmf-dist/tex/latex/amsfonts/amsfonts.sty
|
||||
) (/usr/share/texmf-dist/tex/latex/amsfonts/amssymb.sty
|
||||
Package: amssymb 2013/01/14 v3.01 AMS font symbols
|
||||
(/usr/share/texmf-dist/tex/latex/amsfonts/amsfonts.sty
|
||||
Package: amsfonts 2013/01/14 v3.01 Basic AMSFonts support
|
||||
\symAMSa=\mathgroup4
|
||||
\symAMSb=\mathgroup5
|
||||
LaTeX Font Info: Redeclaring math symbol \hbar on input line 98.
|
||||
LaTeX Font Info: Overwriting math alphabet `\mathfrak' in version `bold'
|
||||
(Font) U/euf/m/n --> U/euf/b/n on input line 106.
|
||||
) (/usr/share/texmf-dist/tex/latex/jknapltx/mathrsfs.sty
|
||||
)) (/usr/share/texmf-dist/tex/latex/jknapltx/mathrsfs.sty
|
||||
Package: mathrsfs 1996/01/01 Math RSFS package v1.0 (jk)
|
||||
\symrsfs=\mathgroup6
|
||||
) (/usr/share/texmf-dist/tex/latex/xcolor/xcolor.sty
|
||||
@ -200,20 +202,20 @@ File: l3backend-pdfmode.def 2020-06-03 L3 backend support: PDF mode
|
||||
\l__kernel_color_stack_int=\count268
|
||||
\l__pdf_internal_box=\box49
|
||||
) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux)
|
||||
LaTeX Font Info: Checking defaults for OML/cmm/m/it on input line 35.
|
||||
LaTeX Font Info: ... okay on input line 35.
|
||||
LaTeX Font Info: Checking defaults for OMS/cmsy/m/n on input line 35.
|
||||
LaTeX Font Info: ... okay on input line 35.
|
||||
LaTeX Font Info: Checking defaults for OT1/cmr/m/n on input line 35.
|
||||
LaTeX Font Info: ... okay on input line 35.
|
||||
LaTeX Font Info: Checking defaults for T1/cmr/m/n on input line 35.
|
||||
LaTeX Font Info: ... okay on input line 35.
|
||||
LaTeX Font Info: Checking defaults for TS1/cmr/m/n on input line 35.
|
||||
LaTeX Font Info: ... okay on input line 35.
|
||||
LaTeX Font Info: Checking defaults for OMX/cmex/m/n on input line 35.
|
||||
LaTeX Font Info: ... okay on input line 35.
|
||||
LaTeX Font Info: Checking defaults for U/cmr/m/n on input line 35.
|
||||
LaTeX Font Info: ... okay on input line 35.
|
||||
LaTeX Font Info: Checking defaults for OML/cmm/m/it on input line 36.
|
||||
LaTeX Font Info: ... okay on input line 36.
|
||||
LaTeX Font Info: Checking defaults for OMS/cmsy/m/n on input line 36.
|
||||
LaTeX Font Info: ... okay on input line 36.
|
||||
LaTeX Font Info: Checking defaults for OT1/cmr/m/n on input line 36.
|
||||
LaTeX Font Info: ... okay on input line 36.
|
||||
LaTeX Font Info: Checking defaults for T1/cmr/m/n on input line 36.
|
||||
LaTeX Font Info: ... okay on input line 36.
|
||||
LaTeX Font Info: Checking defaults for TS1/cmr/m/n on input line 36.
|
||||
LaTeX Font Info: ... okay on input line 36.
|
||||
LaTeX Font Info: Checking defaults for OMX/cmex/m/n on input line 36.
|
||||
LaTeX Font Info: ... okay on input line 36.
|
||||
LaTeX Font Info: Checking defaults for U/cmr/m/n on input line 36.
|
||||
LaTeX Font Info: ... okay on input line 36.
|
||||
|
||||
*geometry* driver: auto-detecting
|
||||
*geometry* detected driver: pdftex
|
||||
@ -269,15 +271,15 @@ Package epstopdf-base Info: Redefining graphics rule for `.eps' on input line 48
|
||||
File: epstopdf-sys.cfg 2010/07/13 v1.3 Configuration of (r)epstopdf for TeX Live
|
||||
))
|
||||
\c@lstlisting=\count275
|
||||
LaTeX Font Info: Trying to load font information for U+msa on input line 38.
|
||||
LaTeX Font Info: Trying to load font information for U+msa on input line 39.
|
||||
(/usr/share/texmf-dist/tex/latex/amsfonts/umsa.fd
|
||||
File: umsa.fd 2013/01/14 v3.01 AMS symbols A
|
||||
)
|
||||
LaTeX Font Info: Trying to load font information for U+msb on input line 38.
|
||||
LaTeX Font Info: Trying to load font information for U+msb on input line 39.
|
||||
(/usr/share/texmf-dist/tex/latex/amsfonts/umsb.fd
|
||||
File: umsb.fd 2013/01/14 v3.01 AMS symbols B
|
||||
)
|
||||
LaTeX Font Info: Trying to load font information for U+rsfs on input line 38.
|
||||
LaTeX Font Info: Trying to load font information for U+rsfs on input line 39.
|
||||
(/usr/share/texmf-dist/tex/latex/jknapltx/ursfs.fd
|
||||
File: ursfs.fd 1998/03/24 rsfs font definition file (jk)
|
||||
) [1
|
||||
@ -458,20 +460,51 @@ Overfull \hbox (77.3615pt too wide) in paragraph at lines 138--138
|
||||
[]\T1/cmr/bx/n/14.4 Cipher-Instanzen: Ver-schlüs-se-lungs-al-go-rith-men in Java-Laufzeitumgebungen
|
||||
[]
|
||||
|
||||
) [20] [21] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux) )
|
||||
) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex [20] [21]
|
||||
Kapitel 6.
|
||||
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 4--6
|
||||
|
||||
[]
|
||||
|
||||
[22
|
||||
|
||||
]
|
||||
<./images/ECB.png, id=114, 466.84758pt x 215.97931pt>
|
||||
File: ./images/ECB.png Graphic file (type png)
|
||||
<use ./images/ECB.png>
|
||||
Package pdftex.def Info: ./images/ECB.png used on input line 34.
|
||||
(pdftex.def) Requested size: 466.84644pt x 215.97878pt.
|
||||
<./images/ECB_Nonce.png, id=115, 471.00104pt x 221.79414pt>
|
||||
File: ./images/ECB_Nonce.png Graphic file (type png)
|
||||
<use ./images/ECB_Nonce.png>
|
||||
Package pdftex.def Info: ./images/ECB_Nonce.png used on input line 36.
|
||||
(pdftex.def) Requested size: 470.99988pt x 221.7936pt.
|
||||
<./images/CBC_enc.png, id=116, 474.32379pt x 219.30206pt>
|
||||
File: ./images/CBC_enc.png Graphic file (type png)
|
||||
<use ./images/CBC_enc.png>
|
||||
Package pdftex.def Info: ./images/CBC_enc.png used on input line 45.
|
||||
(pdftex.def) Requested size: 474.32263pt x 219.30151pt.
|
||||
[23 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB_Nonce.png (PNG copy)>]
|
||||
<./images/CBC_dec.png, id=120, 469.33966pt x 214.31793pt>
|
||||
File: ./images/CBC_dec.png Graphic file (type png)
|
||||
<use ./images/CBC_dec.png>
|
||||
Package pdftex.def Info: ./images/CBC_dec.png used on input line 51.
|
||||
(pdftex.def) Requested size: 469.3385pt x 214.3174pt.
|
||||
) [24 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_enc.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_dec.png (PNG copy)>] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux) )
|
||||
Here is how much of TeX's memory you used:
|
||||
5796 strings out of 480478
|
||||
82006 string characters out of 5905959
|
||||
350766 words of memory out of 5000000
|
||||
21695 multiletter control sequences out of 15000+600000
|
||||
6231 strings out of 480478
|
||||
86787 string characters out of 5905959
|
||||
350843 words of memory out of 5000000
|
||||
22120 multiletter control sequences out of 15000+600000
|
||||
553344 words of font info for 81 fonts, out of 8000000 for 9000
|
||||
1141 hyphenation exceptions out of 8191
|
||||
30i,9n,37p,377b,255s stack positions out of 5000i,500n,10000p,200000b,80000s
|
||||
{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc}{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmex10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msbm10.pfb></usr/share/texmf-dist/fonts/type1/public/rsfs/rsfs10.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1200.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1440.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2074.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2488.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1200.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1728.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfti1095.pfb>
|
||||
Output written on "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" (22 pages, 2371242 bytes).
|
||||
{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc}{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmex10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msam10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msbm10.pfb></usr/share/texmf-dist/fonts/type1/public/rsfs/rsfs10.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1200.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1440.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2074.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2488.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1200.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1728.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfti1095.pfb>
|
||||
Output written on "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" (25 pages, 2429659 bytes).
|
||||
PDF statistics:
|
||||
179 PDF objects out of 1000 (max. 8388607)
|
||||
118 compressed objects within 2 object streams
|
||||
201 PDF objects out of 1000 (max. 8388607)
|
||||
131 compressed objects within 2 object streams
|
||||
0 named destinations out of 1000 (max. 500000)
|
||||
66 words of extra memory for PDF output out of 10000 (max. 10000000)
|
||||
86 words of extra memory for PDF output out of 10000 (max. 10000000)
|
||||
|
||||
|
Binary file not shown.
Binary file not shown.
@ -13,6 +13,7 @@
|
||||
\graphicspath{ {./images/} }
|
||||
%mathsymbols
|
||||
\usepackage{amsmath}
|
||||
\usepackage{amssymb}
|
||||
\usepackage{amsfonts}
|
||||
\usepackage{mathrsfs}
|
||||
%for code highlighting
|
||||
@ -52,4 +53,6 @@ rightsub = \grq%
|
||||
|
||||
\input{chapters/Stromverschlüsselungsverfahren.tex}
|
||||
|
||||
\input{chapters/Blockverschlüsselungsverfahren.tex}
|
||||
|
||||
\end{document}
|
||||
|
@ -74,3 +74,8 @@
|
||||
\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{19}%
|
||||
\contentsline {section}{\numberline {5.5}ChaCha20}{20}%
|
||||
\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{21}%
|
||||
\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{22}%
|
||||
\contentsline {section}{\numberline {6.1}Padding-Verfahren}{22}%
|
||||
\contentsline {section}{\numberline {6.2}Betriebsmodi}{22}%
|
||||
\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{22}%
|
||||
\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{23}%
|
||||
|
51
chapters/Blockverschlüsselungsverfahren.tex
Normal file
51
chapters/Blockverschlüsselungsverfahren.tex
Normal file
@ -0,0 +1,51 @@
|
||||
\chapter{Blockverschlüsselungsverfahren}
|
||||
Ein Verschlüsselungsverfahren wird als Blockverschlüsselungsverfahren bezeichnet,
|
||||
wenn die Menge der Nachrichten $\mathscr M$ durch die Menge der Blöcker einer festen Länge $n\in \mathbb{N}$ gegeben ist:
|
||||
$$\mathscr M := ({\mathbb{Z}_2}^8)^n = \{(z_1,z_2,...,z_n)\mid z_i\in{\mathbb{Z}_2}^8\}$$
|
||||
\textbf{Wichtig}\\
|
||||
\begin{itemize}
|
||||
\item Häufig wird für Blöcke die aus $n$ Bytewerten die Blocklänge in Bits (Blocklänge$=n\cdot 8$) angegeben
|
||||
\item Die Menge der Blöcke $\mathscr M$ kann als Vektorraum über $\mathbb{Z}_2$ aufgefasst werden.
|
||||
Hierbei wird die Summe von zwei Blöcken $m_1,m_2\in\mathscr M$ durch eine bitweise Addition definiert, welcher einer Bitweisen XOR-Verknüpfung ($\oplus$) entspricht.
|
||||
\item Da sich die Vektoren aus ${\mathbb{Z}_2}^{8\cdot n}$ in Zahlen aus $\mathbb{Z}_{2^{8\cdot n}}$ umrechnen lassen könnte man sie auch auf diese Art addieren.
|
||||
Hierbei erhält man allerdings ein deutlich anderes Ergebnis als bei XOR-Addition.
|
||||
Aus diesem Grund wird in diesem Fall das Symbol $\boxplus$ verwendet.
|
||||
\end{itemize}
|
||||
|
||||
\section{Padding-Verfahren}
|
||||
Damit Daten beliebiger Länge mit einem Blockverschlüsselungsverfahren verschlüsselt werden können muss die Nachricht auf ein Vielfaches der Blocklänge aufgestockt werden.
|
||||
Man spricht von Padding.
|
||||
Um dem Empfänger mitzuteilen, welche übertragenen Daten zum Padding und nicht zur Nachricht gehören gibt es mehrere Möglichkeiten:
|
||||
\begin{itemize}
|
||||
\item Die Anzahl der Padding-Bytes wird mit übertragen
|
||||
\item Als Paddingbytes werden Zeichen verwendet, die nicht in die Kodierung passen (z.B. 0x00 bei ASCII)
|
||||
\item Es findet immer Padding statt (bei passender Nachrichtenlänge ist der ganze letzte Block Padding), wobei im Padding die Paddinglänge kodiert ist.
|
||||
\end{itemize}
|
||||
|
||||
\section{Betriebsmodi}
|
||||
Es gibt eine Vielzahl von Betriebsmodi, die für die Blockverschlüsselung verwendet werden.
|
||||
Auf diese wird im Folgenden eingegangen
|
||||
|
||||
\subsection{ECB (Electronic Code Book)}
|
||||
Im ECB-Modus wir mit dem Verschlüsselungsverfahren $E$ jedes Tupel von Blöcken blockweise verschlüsselt:
|
||||
$$E_k((m_1,...,m_r)) := (E_k(m_1),...,E_k(m_r))$$
|
||||
eine auf diese Weise verschlüsselte Nachricht kann ebenfalls Blockweise entschlüsselt werden:
|
||||
$$D_k((c_1,...,c_r)) := (D_k(c_1),...,D_k(c_r))$$
|
||||
\includegraphics{ECB.png}\\
|
||||
Da diese Modus anfällig für Wörterbuchangriffe ist wird häufig ein Nonce-Wert verwendet, der jeweils mit dem Klartextblock addiert ($\oplus$) wird:\\
|
||||
\includegraphics{ECB_Nonce.png}
|
||||
|
||||
\subsection{CBC (Cipher Block Chaining)}
|
||||
Der CBC-Modus ist eine spezielle Form des ECB-Modus, bei dem der errechnete Geheimtextblock als Nonce-Wert für die Verschlüsselung des nächsten Blocks verwendet wird.
|
||||
Hierbei wird der erste Nonce-Wert $c_0$ durch einen Initialisierungsvektor $IV\in\mathscr M$ gegeben.
|
||||
$$\begin{aligned}
|
||||
c_i:=&E_k(m_i+c_{i-1})\\
|
||||
E_{k,IV}(m_1,...,m_r) :=&(c_1,...,c_r)
|
||||
\end{aligned}$$
|
||||
\includegraphics{CBC_enc.png}\\
|
||||
Bei der Entschlüsselung wird wie folgt vorgegangen:
|
||||
$$\begin{aligned}
|
||||
m_i :=&D_k(c_i)+c_{i-1}\\
|
||||
D_{k,IV}(c_1,...,c_r):=&(m_1,...,m_r)
|
||||
\end{aligned}$$
|
||||
\includegraphics{CBC_dec.png}
|
BIN
images/CBC_dec.png
Normal file
BIN
images/CBC_dec.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 8.5 KiB |
BIN
images/CBC_enc.png
Normal file
BIN
images/CBC_enc.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 9.6 KiB |
BIN
images/ECB.png
Normal file
BIN
images/ECB.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 7.2 KiB |
BIN
images/ECB_Nonce.png
Normal file
BIN
images/ECB_Nonce.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 11 KiB |
Loading…
x
Reference in New Issue
Block a user