MAC-Verfahren finished
This commit is contained in:
parent
862e89e11f
commit
cacbf109c0
@ -2,143 +2,152 @@
|
||||
\@nameuse{bbl@beforestart}
|
||||
\catcode `"\active
|
||||
\babel@aux{ngerman}{}
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {1}Substitionsverfahren}{3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {1}Substitionsverfahren}{4}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.1}Skytale}{3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{3}\protected@file@percent }
|
||||
\newlabel{monoalphabet}{{1.2}{3}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{4}\protected@file@percent }
|
||||
\newlabel{häufigkeit}{{1.2.2}{4}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{5}\protected@file@percent }
|
||||
\newlabel{otp}{{1.3.2}{5}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.1}Skytale}{4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{4}\protected@file@percent }
|
||||
\newlabel{monoalphabet}{{1.2}{4}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{5}\protected@file@percent }
|
||||
\newlabel{häufigkeit}{{1.2.2}{5}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{6}\protected@file@percent }
|
||||
\newlabel{otp}{{1.3.2}{6}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{7}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{6}\protected@file@percent }
|
||||
\newlabel{Der Ring Z}{{2.2}{6}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{6}\protected@file@percent }
|
||||
\newlabel{modulare_addition}{{2.2.1}{6}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.5}Matrizen}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{8}\protected@file@percent }
|
||||
\newlabel{euklid}{{2.3.1}{8}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{8}\protected@file@percent }
|
||||
\newlabel{erweiterter Euklid}{{2.3.2}{8}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{9}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{9}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{10}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{7}\protected@file@percent }
|
||||
\newlabel{Der Ring Z}{{2.2}{7}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{7}\protected@file@percent }
|
||||
\newlabel{modulare_addition}{{2.2.1}{7}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.5}Matrizen}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{9}\protected@file@percent }
|
||||
\newlabel{euklid}{{2.3.1}{9}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{9}\protected@file@percent }
|
||||
\newlabel{erweiterter Euklid}{{2.3.2}{9}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{9}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{10}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{10}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{11}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.1}Vertraulichkeit}{10}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{10}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.2}Integrität}{10}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.3}Authenzität der Daten}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{11}\protected@file@percent }
|
||||
\newlabel{signature}{{3.3.1}{11}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.7}Verfügbarkeit}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.8}Anonymität}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{13}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.1}Vertraulichkeit}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.2}Integrität}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.3}Authenzität der Daten}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{12}\protected@file@percent }
|
||||
\newlabel{signature}{{3.3.1}{12}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{13}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{13}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{13}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.7}Verfügbarkeit}{13}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{13}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.8}Anonymität}{13}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{14}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{13}\protected@file@percent }
|
||||
\newlabel{kerckhoff}{{4.1}{13}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{13}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{13}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.4}Angriffsszenarien}{14}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{14}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{14}\protected@file@percent }
|
||||
\newlabel{known-plaintext}{{4.4.2}{14}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{14}\protected@file@percent }
|
||||
\newlabel{chosen-plaintext}{{4.4.3}{14}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{14}\protected@file@percent }
|
||||
\newlabel{brute-force}{{4.5}{14}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{14}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{14}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{14}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{15}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{15}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{15}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{16}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{14}\protected@file@percent }
|
||||
\newlabel{kerckhoff}{{4.1}{14}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{14}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{14}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.4}Angriffsszenarien}{15}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{15}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{15}\protected@file@percent }
|
||||
\newlabel{known-plaintext}{{4.4.2}{15}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{15}\protected@file@percent }
|
||||
\newlabel{chosen-plaintext}{{4.4.3}{15}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{15}\protected@file@percent }
|
||||
\newlabel{brute-force}{{4.5}{15}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{15}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{15}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{15}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{16}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{16}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{16}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{17}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{16}\protected@file@percent }
|
||||
\newlabel{synchrone Stromverschlüsselung}{{5.1}{16}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{17}\protected@file@percent }
|
||||
\newlabel{zustandsabhängige Stromverschlüsselung}{{5.2}{17}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{18}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{18}\protected@file@percent }
|
||||
\newlabel{synchron additive Stromverschlüsselung}{{5.2.1.1}{18}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{19}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{19}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.5}ChaCha20}{20}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{21}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{22}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{17}\protected@file@percent }
|
||||
\newlabel{synchrone Stromverschlüsselung}{{5.1}{17}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{18}\protected@file@percent }
|
||||
\newlabel{zustandsabhängige Stromverschlüsselung}{{5.2}{18}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{19}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{19}\protected@file@percent }
|
||||
\newlabel{synchron additive Stromverschlüsselung}{{5.2.1.1}{19}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{20}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{20}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.5}ChaCha20}{21}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{22}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{23}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.1}Padding-Verfahren}{22}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.2}Betriebsmodi}{22}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{22}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{23}\protected@file@percent }
|
||||
\newlabel{CBC}{{6.2.2}{23}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{24}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{24}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{25}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{25}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{25}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{25}\protected@file@percent }
|
||||
\newlabel{OFB}{{6.2.5}{25}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{26}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{26}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{26}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{27}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.4}DES}{27}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{27}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{28}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{29}\protected@file@percent }
|
||||
\newlabel{aes}{{6.6}{29}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.6.1}AES-128}{29}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {7}Hashfunktionen}{31}\protected@file@percent }
|
||||
\newlabel{Blockverschlüsselungsverfahren}{{6}{23}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.1}Padding-Verfahren}{23}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.2}Betriebsmodi}{23}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{23}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{24}\protected@file@percent }
|
||||
\newlabel{CBC}{{6.2.2}{24}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{25}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{25}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{26}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{26}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{26}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{26}\protected@file@percent }
|
||||
\newlabel{OFB}{{6.2.5}{26}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{27}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{27}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{27}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{28}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.4}DES}{28}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{28}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{29}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{30}\protected@file@percent }
|
||||
\newlabel{aes}{{6.6}{30}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.6.1}AES-128}{30}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {7}Hashfunktionen}{32}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{31}\protected@file@percent }
|
||||
\newlabel{schwache Kollisionsfreiheit}{{7.1}{31}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{31}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{32}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{32}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{32}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{32}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{32}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{32}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{32}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{33}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{33}\protected@file@percent }
|
||||
\newlabel{Hashfunktionen}{{7}{32}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{32}\protected@file@percent }
|
||||
\newlabel{schwache Kollisionsfreiheit}{{7.1}{32}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{32}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{33}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{33}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{33}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{33}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{33}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{33}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{33}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{34}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{34}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {8}MAC-Verfahren}{36}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {8.1}HMAC}{36}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {8.2}CMAC, CBC-MAC}{36}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {8.2.1}CMAC}{36}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {8.2.2}CBC-MAC}{37}\protected@file@percent }
|
||||
|
@ -1,5 +1,5 @@
|
||||
# Fdb version 3
|
||||
["pdflatex"] 1600447913 "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" "Zusammenfassung_DC" 1600447914
|
||||
["pdflatex"] 1600449989 "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" "Zusammenfassung_DC" 1600449989
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/3DES.png" 1600198739 21419 7bf85db371a659f085d9c727a1835013 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/AES S-Box.png" 1600269267 23090 2ccce6631c19f6339868594d4b8f11fd ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Abhörung.png" 1599946545 2649 d6dd82c7c38c06d31f966207a71dc01b ""
|
||||
@ -23,12 +23,13 @@
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone additive Stromverschlüsselung.png" 1600003271 10891 bfed2f0ea0241a4a2a4bf215a3d59c32 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/zustandsabhängige Stromverschlüsselung.png" 1600002333 10276 422a1760594d1c860f8d7aa6dc5ed032 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Übertragungsmanipulation.png" 1599947212 3178 33bbd19fca19c787748d9158d802ceb1 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux" 1600447914 14069 a2d0e80e3e3b2bdaec79cb0e226d55dc "pdflatex"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" 1600440432 1128 fcefc494983c6ad67020eaf1da08b11b ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc" 1600447914 8357 ba9fb5647f721b3df7dc2919d835781f "pdflatex"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex" 1600357819 17225 db24f9d3d23fd17831ff4473e048373c ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex" 1600447912 10224 5864379c24b338259d3114889aafebd8 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux" 1600449989 14728 218d8302697279964c9c5cac607bb3f7 "pdflatex"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" 1600448009 1164 63060c3089d19db142722eb600fa368b ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc" 1600449989 8648 2da1b659a745416645125d00d326d2be "pdflatex"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex" 1600448893 17264 63a210833f62fb093168d19f774d7af2 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex" 1600448588 10246 7885d54a32da2f0500e74d589ed65022 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex" 1599950390 6191 fdec0aff09dab6668264963cb44ee2f3 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex" 1600449988 2852 e14fb50fd5672a6215d5d27dd7fa0b13 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex" 1600284018 6736 3dece8651acf670a27e1fb6d604e2027 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Stromverschlüsselungsverfahren.tex" 1600194483 9836 ddaca4f3d88a46ce7c40ec5d75657c71 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex" 1600001305 6264 cba30a66f463934bc822d2ee54ac4b90 ""
|
||||
@ -155,7 +156,7 @@
|
||||
"/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map" 1599837712 334180 163417853e75f7c89e92e140d6d6e976 ""
|
||||
"/var/lib/texmf/web2c/pdftex/pdflatex.fmt" 1599837703 2514050 ecf9fe402c479fca46412778ddf38de8 ""
|
||||
(generated)
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.log"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.log"
|
||||
|
@ -246,6 +246,8 @@ INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ectt0800.tfm
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex
|
||||
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ectt1440.tfm
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux
|
||||
INPUT /usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc
|
||||
INPUT /usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc
|
||||
|
@ -1,4 +1,4 @@
|
||||
This is pdfTeX, Version 3.14159265-2.6-1.40.21 (TeX Live 2020/Arch Linux) (preloaded format=pdflatex 2020.9.11) 18 SEP 2020 18:51
|
||||
This is pdfTeX, Version 3.14159265-2.6-1.40.21 (TeX Live 2020/Arch Linux) (preloaded format=pdflatex 2020.9.11) 18 SEP 2020 19:26
|
||||
entering extended mode
|
||||
restricted \write18 enabled.
|
||||
file:line:error style messages enabled.
|
||||
@ -291,11 +291,11 @@ File: ursfs.fd 1998/03/24 rsfs font definition file (jk)
|
||||
LaTeX Font Info: Trying to load font information for T1+cmtt on input line 99.
|
||||
(/usr/share/texmf-dist/tex/latex/base/t1cmtt.fd
|
||||
File: t1cmtt.fd 2019/12/16 v2.5j Standard LaTeX font definitions
|
||||
))
|
||||
) [2])
|
||||
\tf@toc=\write3
|
||||
[2] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex
|
||||
[3] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex
|
||||
Kapitel 1.
|
||||
<./images/Skytale.png, id=21, 614.6965pt x 351.3125pt>
|
||||
<./images/Skytale.png, id=24, 614.6965pt x 351.3125pt>
|
||||
File: ./images/Skytale.png Graphic file (type png)
|
||||
<use ./images/Skytale.png>
|
||||
Package pdftex.def Info: ./images/Skytale.png used on input line 6.
|
||||
@ -305,10 +305,10 @@ Underfull \hbox (badness 10000) in paragraph at lines 11--12
|
||||
|
||||
[]
|
||||
|
||||
[3
|
||||
[4
|
||||
|
||||
</home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Skytale.png>]
|
||||
<./images/Vignère-Verfahren.png, id=32, 444.41896pt x 257.5138pt>
|
||||
<./images/Vignère-Verfahren.png, id=35, 444.41896pt x 257.5138pt>
|
||||
File: ./images/Vignère-Verfahren.png Graphic file (type png)
|
||||
<use ./images/Vignère-Verfahren.png>
|
||||
Package pdftex.def Info: ./images/Vignère-Verfahren.png used on input line 50.
|
||||
@ -318,41 +318,41 @@ Underfull \hbox (badness 10000) in paragraph at lines 47--51
|
||||
|
||||
[]
|
||||
|
||||
[4 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Vignère-Verfahren.png (PNG copy)>]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex [5]
|
||||
[5 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Vignère-Verfahren.png (PNG copy)>]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex [6]
|
||||
Kapitel 2.
|
||||
[6
|
||||
[7
|
||||
|
||||
] [7]
|
||||
] [8]
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 108--109
|
||||
|
||||
[]
|
||||
|
||||
[8]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex [9]
|
||||
[9]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex [10]
|
||||
Kapitel 3.
|
||||
<./images/Abhörung.png, id=60, 158.66173pt x 78.08482pt>
|
||||
<./images/Abhörung.png, id=63, 158.66173pt x 78.08482pt>
|
||||
File: ./images/Abhörung.png Graphic file (type png)
|
||||
<use ./images/Abhörung.png>
|
||||
Package pdftex.def Info: ./images/Abhörung.png used on input line 6.
|
||||
(pdftex.def) Requested size: 158.66132pt x 78.08463pt.
|
||||
<./images/Übertragungsmanipulation.png, id=61, 160.3231pt x 72.27pt>
|
||||
<./images/Übertragungsmanipulation.png, id=64, 160.3231pt x 72.27pt>
|
||||
File: ./images/Übertragungsmanipulation.png Graphic file (type png)
|
||||
<use ./images/Übertragungsmanipulation.png>
|
||||
Package pdftex.def Info: ./images/Übertragungsmanipulation.png used on input line 23.
|
||||
(pdftex.def) Requested size: 160.3227pt x 72.2698pt.
|
||||
[10
|
||||
[11
|
||||
|
||||
</home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Abhörung.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Übertragungsmanipulation.png (PNG copy)>]
|
||||
<./images/Authenzitätsstörung_0.png, id=66, 156.16966pt x 61.47104pt>
|
||||
<./images/Authenzitätsstörung_0.png, id=69, 156.16966pt x 61.47104pt>
|
||||
File: ./images/Authenzitätsstörung_0.png Graphic file (type png)
|
||||
<use ./images/Authenzitätsstörung_0.png>
|
||||
Package pdftex.def Info: ./images/Authenzitätsstörung_0.png used on input line 30.
|
||||
(pdftex.def) Requested size: 156.16927pt x 61.47087pt.
|
||||
<./images/Authenzitätsstörung_1.png, id=67, 147.03207pt x 62.30173pt>
|
||||
<./images/Authenzitätsstörung_1.png, id=70, 147.03207pt x 62.30173pt>
|
||||
File: ./images/Authenzitätsstörung_1.png Graphic file (type png)
|
||||
<use ./images/Authenzitätsstörung_1.png>
|
||||
Package pdftex.def Info: ./images/Authenzitätsstörung_1.png used on input line 31.
|
||||
(pdftex.def) Requested size: 147.03171pt x 62.30157pt.
|
||||
<./images/Authenzitätsstörung_2.png, id=68, 153.67758pt x 72.27pt>
|
||||
<./images/Authenzitätsstörung_2.png, id=71, 153.67758pt x 72.27pt>
|
||||
File: ./images/Authenzitätsstörung_2.png Graphic file (type png)
|
||||
<use ./images/Authenzitätsstörung_2.png>
|
||||
Package pdftex.def Info: ./images/Authenzitätsstörung_2.png used on input line 32.
|
||||
@ -362,7 +362,7 @@ Overfull \hbox (23.6558pt too wide) in paragraph at lines 37--38
|
||||
[]\T1/cmr/m/n/10.95 es wird ein zwei-ter Kom-mu-ni-ka-ti-ons-weg für die Au-then-ti-fi-ka-ti-on ver-wen-det (2-Factor-Authentification)
|
||||
[]
|
||||
|
||||
[11 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_0.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_1.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_2.png (PNG copy)>]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Verschlüsselungsverfahren.tex [12]
|
||||
[12 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_0.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_1.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_2.png (PNG copy)>]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Verschlüsselungsverfahren.tex [13]
|
||||
Kapitel 4.
|
||||
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 3--4
|
||||
@ -374,7 +374,7 @@ Underfull \hbox (badness 10000) in paragraph at lines 5--6
|
||||
|
||||
[]
|
||||
|
||||
[13
|
||||
[14
|
||||
|
||||
]
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 50--53
|
||||
@ -386,14 +386,14 @@ Overfull \hbox (30.70032pt too wide) in paragraph at lines 69--70
|
||||
[]\T1/cmr/m/n/10.95 Es soll kei-nen An-griff auf die Klar-text-nach-richt $\OML/cmm/m/it/10.95 m$ \T1/cmr/m/n/10.95 ge-ben, der durch-schnitt-lich we-ni-ger als $[] [][]\OML/cmm/m/it/10.95 ; [][]$
|
||||
[]
|
||||
|
||||
[14]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Stromverschlüsselungsverfahren.tex [15]
|
||||
[15]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Stromverschlüsselungsverfahren.tex [16]
|
||||
Kapitel 5.
|
||||
|
||||
Overfull \hbox (29.27113pt too wide) in paragraph at lines 8--10
|
||||
\T1/cmr/m/n/10.95 Bei man-chen Ver-fah-ren kön-nen bei der Be-rech-nung des $\OML/cmm/m/it/10.95 i$\T1/cmr/m/n/10.95 -ten Ge-heim-text-zei-chens $\OML/cmm/m/it/10.95 c[] \OT1/cmr/m/n/10.95 = \OML/cmm/m/it/10.95 E[]\OT1/cmr/m/n/10.95 (\OML/cmm/m/it/10.95 k; \OT1/cmr/m/n/10.95 (\OML/cmm/m/it/10.95 m[]; m[]; :::; m[]\OT1/cmr/m/n/10.95 ))$
|
||||
[]
|
||||
|
||||
<./images/Stromverschlüsselung.png, id=85, 472.66241pt x 229.27034pt>
|
||||
<./images/Stromverschlüsselung.png, id=88, 472.66241pt x 229.27034pt>
|
||||
File: ./images/Stromverschlüsselung.png Graphic file (type png)
|
||||
<use ./images/Stromverschlüsselung.png>
|
||||
Package pdftex.def Info: ./images/Stromverschlüsselung.png used on input line 11.
|
||||
@ -403,7 +403,7 @@ Overfull \hbox (5.96439pt too wide) in paragraph at lines 11--12
|
||||
[][]
|
||||
[]
|
||||
|
||||
<./images/synchrone Stromverschlüsselung.png, id=86, 469.33966pt x 215.97931pt>
|
||||
<./images/synchrone Stromverschlüsselung.png, id=89, 469.33966pt x 215.97931pt>
|
||||
File: ./images/synchrone Stromverschlüsselung.png Graphic file (type png)
|
||||
<use ./images/synchrone Stromverschlüsselung.png>
|
||||
Package pdftex.def Info: ./images/synchrone Stromverschlüsselung.png used on input line 21.
|
||||
@ -413,10 +413,10 @@ Overfull \hbox (2.64163pt too wide) in paragraph at lines 21--22
|
||||
[][]
|
||||
[]
|
||||
|
||||
[16
|
||||
[17
|
||||
|
||||
</home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Stromverschlüsselung.png (PNG copy)>]
|
||||
<./images/zustandsabhängige Stromverschlüsselung.png, id=90, 482.63069pt x 217.64069pt>
|
||||
<./images/zustandsabhängige Stromverschlüsselung.png, id=93, 482.63069pt x 217.64069pt>
|
||||
File: ./images/zustandsabhängige Stromverschlüsselung.png Graphic file (type png)
|
||||
<use ./images/zustandsabhängige Stromverschlüsselung.png>
|
||||
Package pdftex.def Info: ./images/zustandsabhängige Stromverschlüsselung.png used on input line 38.
|
||||
@ -426,8 +426,8 @@ Overfull \hbox (15.93263pt too wide) in paragraph at lines 38--39
|
||||
[][][]
|
||||
[]
|
||||
|
||||
[17 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone Stromverschlüsselung.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/zustandsabhängige Stromverschlüsselung.png (PNG copy)>]
|
||||
<./images/additive zustandsabhängige Stromverschlüsselung.png, id=94, 471.00104pt x 219.30206pt>
|
||||
[18 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone Stromverschlüsselung.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/zustandsabhängige Stromverschlüsselung.png (PNG copy)>]
|
||||
<./images/additive zustandsabhängige Stromverschlüsselung.png, id=98, 471.00104pt x 219.30206pt>
|
||||
File: ./images/additive zustandsabhängige Stromverschlüsselung.png Graphic file (type png)
|
||||
<use ./images/additive zustandsabhängige Stromverschlüsselung.png>
|
||||
Package pdftex.def Info: ./images/additive zustandsabhängige Stromverschlüsselung.png used on input line 46.
|
||||
@ -437,7 +437,7 @@ Overfull \hbox (4.30301pt too wide) in paragraph at lines 46--47
|
||||
[][]
|
||||
[]
|
||||
|
||||
<./images/synchrone additive Stromverschlüsselung.png, id=95, 471.83173pt x 218.47137pt>
|
||||
<./images/synchrone additive Stromverschlüsselung.png, id=99, 471.83173pt x 218.47137pt>
|
||||
File: ./images/synchrone additive Stromverschlüsselung.png Graphic file (type png)
|
||||
<use ./images/synchrone additive Stromverschlüsselung.png>
|
||||
Package pdftex.def Info: ./images/synchrone additive Stromverschlüsselung.png used on input line 54.
|
||||
@ -447,9 +447,9 @@ Overfull \hbox (5.1337pt too wide) in paragraph at lines 54--55
|
||||
[][]
|
||||
[]
|
||||
|
||||
[18 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/additive zustandsabhängige Stromverschlüsselung.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone additive Stromverschlüsselung.png (PNG copy)>]
|
||||
[19 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/additive zustandsabhängige Stromverschlüsselung.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone additive Stromverschlüsselung.png (PNG copy)>]
|
||||
Missing character: There is no k in font rsfs10!
|
||||
<./images/Schlüsselstromgenerator mit Nonce.png, id=100, 473.4931pt x 215.97931pt>
|
||||
<./images/Schlüsselstromgenerator mit Nonce.png, id=103, 473.4931pt x 215.97931pt>
|
||||
File: ./images/Schlüsselstromgenerator mit Nonce.png Graphic file (type png)
|
||||
<use ./images/Schlüsselstromgenerator mit Nonce.png>
|
||||
Package pdftex.def Info: ./images/Schlüsselstromgenerator mit Nonce.png used on input line 82.
|
||||
@ -459,38 +459,38 @@ Overfull \hbox (17.17014pt too wide) in paragraph at lines 81--83
|
||||
[]
|
||||
[]
|
||||
|
||||
[19 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Schlüsselstromgenerator mit Nonce.png (PNG copy)>]
|
||||
[20 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Schlüsselstromgenerator mit Nonce.png (PNG copy)>]
|
||||
Overfull \hbox (77.3615pt too wide) in paragraph at lines 138--138
|
||||
[]\T1/cmr/bx/n/14.4 Cipher-Instanzen: Ver-schlüs-se-lungs-al-go-rith-men in Java-Laufzeitumgebungen
|
||||
[]
|
||||
|
||||
) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex [20] [21]
|
||||
) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex [21] [22]
|
||||
Kapitel 6.
|
||||
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 4--6
|
||||
|
||||
[]
|
||||
|
||||
[22
|
||||
[23
|
||||
|
||||
]
|
||||
<./images/ECB.png, id=115, 466.84758pt x 215.97931pt>
|
||||
<./images/ECB.png, id=118, 466.84758pt x 215.97931pt>
|
||||
File: ./images/ECB.png Graphic file (type png)
|
||||
<use ./images/ECB.png>
|
||||
Package pdftex.def Info: ./images/ECB.png used on input line 34.
|
||||
(pdftex.def) Requested size: 466.84644pt x 215.97878pt.
|
||||
<./images/ECB_Nonce.png, id=116, 471.00104pt x 221.79414pt>
|
||||
<./images/ECB_Nonce.png, id=119, 471.00104pt x 221.79414pt>
|
||||
File: ./images/ECB_Nonce.png Graphic file (type png)
|
||||
<use ./images/ECB_Nonce.png>
|
||||
Package pdftex.def Info: ./images/ECB_Nonce.png used on input line 36.
|
||||
(pdftex.def) Requested size: 470.99988pt x 221.7936pt.
|
||||
<./images/CBC_enc.png, id=117, 474.32379pt x 219.30206pt>
|
||||
<./images/CBC_enc.png, id=120, 474.32379pt x 219.30206pt>
|
||||
File: ./images/CBC_enc.png Graphic file (type png)
|
||||
<use ./images/CBC_enc.png>
|
||||
Package pdftex.def Info: ./images/CBC_enc.png used on input line 45.
|
||||
(pdftex.def) Requested size: 474.32263pt x 219.30151pt.
|
||||
[23 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB_Nonce.png (PNG copy)>]
|
||||
<./images/CBC_dec.png, id=121, 469.33966pt x 214.31793pt>
|
||||
[24 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB_Nonce.png (PNG copy)>]
|
||||
<./images/CBC_dec.png, id=125, 469.33966pt x 214.31793pt>
|
||||
File: ./images/CBC_dec.png Graphic file (type png)
|
||||
<use ./images/CBC_dec.png>
|
||||
Package pdftex.def Info: ./images/CBC_dec.png used on input line 51.
|
||||
@ -500,12 +500,12 @@ Overfull \hbox (61.4574pt too wide) in paragraph at lines 59--64
|
||||
\T1/cmr/m/n/10.95 Wenn die Län-ge der Nach-richt $\OML/cmm/m/it/10.95 m$ \T1/cmr/m/n/10.95 ein Viel-fa-ches des Block-län-ge $\OML/cmm/m/it/10.95 l$ \T1/cmr/m/n/10.95 ist wird das nor-ma-le CBC-Verschlüsselungsverfahren
|
||||
[]
|
||||
|
||||
[24 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_enc.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_dec.png (PNG copy)>]
|
||||
[25 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_enc.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_dec.png (PNG copy)>]
|
||||
Overfull \hbox (61.4574pt too wide) in paragraph at lines 68--70
|
||||
\T1/cmr/m/n/10.95 Wenn die Län-ge der Nach-richt $\OML/cmm/m/it/10.95 m$ \T1/cmr/m/n/10.95 ein Viel-fa-ches des Block-län-ge $\OML/cmm/m/it/10.95 l$ \T1/cmr/m/n/10.95 ist wird das nor-ma-le CBC-Verschlüsselungsverfahren
|
||||
[]
|
||||
|
||||
<./images/CTR.png, id=126, 515.02759pt x 240.0693pt>
|
||||
<./images/CTR.png, id=129, 515.02759pt x 240.0693pt>
|
||||
File: ./images/CTR.png Graphic file (type png)
|
||||
<use ./images/CTR.png>
|
||||
Package pdftex.def Info: ./images/CTR.png used on input line 85.
|
||||
@ -515,7 +515,7 @@ Overfull \hbox (31.32945pt too wide) in paragraph at lines 84--86
|
||||
[]
|
||||
[]
|
||||
|
||||
<./images/OFB.png, id=127, 516.42938pt x 235.63031pt>
|
||||
<./images/OFB.png, id=130, 516.42938pt x 235.63031pt>
|
||||
File: ./images/OFB.png Graphic file (type png)
|
||||
<use ./images/OFB.png>
|
||||
Package pdftex.def Info: ./images/OFB.png used on input line 90.
|
||||
@ -530,8 +530,8 @@ Underfull \hbox (badness 10000) in paragraph at lines 88--91
|
||||
|
||||
[]
|
||||
|
||||
[25 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CTR.png (PNG copy)>]
|
||||
<./images/CFB.png, id=131, 518.6878pt x 239.39438pt>
|
||||
[26 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CTR.png (PNG copy)>]
|
||||
<./images/CFB.png, id=134, 518.6878pt x 239.39438pt>
|
||||
File: ./images/CFB.png Graphic file (type png)
|
||||
<use ./images/CFB.png>
|
||||
Package pdftex.def Info: ./images/CFB.png used on input line 101.
|
||||
@ -541,55 +541,59 @@ Overfull \hbox (34.98967pt too wide) in paragraph at lines 98--102
|
||||
[]
|
||||
[]
|
||||
|
||||
[26 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/OFB.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CFB.png (PNG copy)>]
|
||||
<./images/3DES.png, id=135, 274.77657pt x 331.99031pt>
|
||||
[27 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/OFB.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CFB.png (PNG copy)>]
|
||||
<./images/3DES.png, id=138, 274.77657pt x 331.99031pt>
|
||||
File: ./images/3DES.png Graphic file (type png)
|
||||
<use ./images/3DES.png>
|
||||
Package pdftex.def Info: ./images/3DES.png used on input line 144.
|
||||
(pdftex.def) Requested size: 219.82153pt x 265.59259pt.
|
||||
[27]
|
||||
<./images/meet-in-the-middle.png, id=140, 260.47313pt x 247.67531pt>
|
||||
[28]
|
||||
<./images/meet-in-the-middle.png, id=143, 260.47313pt x 247.67531pt>
|
||||
File: ./images/meet-in-the-middle.png Graphic file (type png)
|
||||
<use ./images/meet-in-the-middle.png>
|
||||
Package pdftex.def Info: ./images/meet-in-the-middle.png used on input line 150.
|
||||
(pdftex.def) Requested size: 260.47249pt x 247.6747pt.
|
||||
[28 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/3DES.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/meet-in-the-middle.png (PNG copy)>]
|
||||
<./images/AES S-Box.png, id=144, 424.58624pt x 396.48125pt>
|
||||
[29 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/3DES.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/meet-in-the-middle.png (PNG copy)>]
|
||||
<./images/AES S-Box.png, id=147, 424.58624pt x 396.48125pt>
|
||||
File: ./images/AES S-Box.png Graphic file (type png)
|
||||
<use ./images/AES S-Box.png>
|
||||
Package pdftex.def Info: ./images/AES S-Box.png used on input line 196.
|
||||
(pdftex.def) Requested size: 339.66945pt x 317.18542pt.
|
||||
[29 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/AES S-Box.png (PNG copy)>]
|
||||
[30 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/AES S-Box.png (PNG copy)>]
|
||||
|
||||
LaTeX Warning: Reference `endliche Körper' on page 30 undefined on input line 222.
|
||||
LaTeX Warning: Reference `endliche Körper' on page 31 undefined on input line 222.
|
||||
|
||||
LaTeX Font Info: Font shape `T1/cmtt/bx/n' in size <10.95> not available
|
||||
(Font) Font shape `T1/cmtt/m/n' tried instead on input line 245.
|
||||
) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex [30]
|
||||
) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex [31]
|
||||
Kapitel 7.
|
||||
Missing character: There is no m in font rsfs10!
|
||||
LaTeX Font Info: Font shape `T1/cmtt/bx/n' in size <14.4> not available
|
||||
(Font) Font shape `T1/cmtt/m/n' tried instead on input line 29.
|
||||
[31
|
||||
[32
|
||||
|
||||
] [32] [33]) [34] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux)
|
||||
] [33] [34]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex [35]
|
||||
Kapitel 8.
|
||||
) [36
|
||||
|
||||
] [37] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux)
|
||||
|
||||
LaTeX Warning: There were undefined references.
|
||||
|
||||
)
|
||||
Here is how much of TeX's memory you used:
|
||||
6319 strings out of 480478
|
||||
88708 string characters out of 5905959
|
||||
355951 words of memory out of 5000000
|
||||
22188 multiletter control sequences out of 15000+600000
|
||||
6325 strings out of 480478
|
||||
88970 string characters out of 5905959
|
||||
355969 words of memory out of 5000000
|
||||
22191 multiletter control sequences out of 15000+600000
|
||||
557083 words of font info for 90 fonts, out of 8000000 for 9000
|
||||
1141 hyphenation exceptions out of 8191
|
||||
30i,10n,37p,377b,255s stack positions out of 5000i,500n,10000p,200000b,80000s
|
||||
30i,14n,37p,377b,255s stack positions out of 5000i,500n,10000p,200000b,80000s
|
||||
{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc}{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmex10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msam10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msbm10.pfb></usr/share/texmf-dist/fonts/type1/public/rsfs/rsfs10.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1200.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1440.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2074.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2488.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1200.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1728.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfti1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sftt1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sftt1440.pfb>
|
||||
Output written on "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" (35 pages, 2631355 bytes).
|
||||
Output written on "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" (38 pages, 2637795 bytes).
|
||||
PDF statistics:
|
||||
254 PDF objects out of 1000 (max. 8388607)
|
||||
164 compressed objects within 2 object streams
|
||||
266 PDF objects out of 1000 (max. 8388607)
|
||||
173 compressed objects within 2 object streams
|
||||
0 named destinations out of 1000 (max. 500000)
|
||||
116 words of extra memory for PDF output out of 10000 (max. 10000000)
|
||||
|
||||
|
Binary file not shown.
Binary file not shown.
@ -56,4 +56,6 @@ rightsub = \grq%
|
||||
|
||||
\input{chapters/Hashfunktionen.tex}
|
||||
|
||||
\input{chapters/MAC-Verfahren.tex}
|
||||
|
||||
\end{document}
|
||||
|
@ -1,108 +1,113 @@
|
||||
\babel@toc {ngerman}{}
|
||||
\contentsline {chapter}{\numberline {1}Substitionsverfahren}{3}%
|
||||
\contentsline {section}{\numberline {1.1}Skytale}{3}%
|
||||
\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{3}%
|
||||
\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{4}%
|
||||
\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{4}%
|
||||
\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{4}%
|
||||
\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{4}%
|
||||
\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{4}%
|
||||
\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{5}%
|
||||
\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{5}%
|
||||
\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{5}%
|
||||
\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{5}%
|
||||
\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{5}%
|
||||
\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{5}%
|
||||
\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{5}%
|
||||
\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{6}%
|
||||
\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{6}%
|
||||
\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{6}%
|
||||
\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{6}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{6}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{6}%
|
||||
\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{7}%
|
||||
\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{7}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{7}%
|
||||
\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{7}%
|
||||
\contentsline {subsection}{\numberline {2.2.5}Matrizen}{7}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{7}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{7}%
|
||||
\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{7}%
|
||||
\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{8}%
|
||||
\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{8}%
|
||||
\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{8}%
|
||||
\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{9}%
|
||||
\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{9}%
|
||||
\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{10}%
|
||||
\contentsline {section}{\numberline {3.1}Vertraulichkeit}{10}%
|
||||
\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{10}%
|
||||
\contentsline {section}{\numberline {3.2}Integrität}{10}%
|
||||
\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{11}%
|
||||
\contentsline {section}{\numberline {3.3}Authenzität der Daten}{11}%
|
||||
\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{11}%
|
||||
\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{11}%
|
||||
\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{11}%
|
||||
\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{11}%
|
||||
\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{11}%
|
||||
\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{12}%
|
||||
\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{12}%
|
||||
\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{12}%
|
||||
\contentsline {section}{\numberline {3.7}Verfügbarkeit}{12}%
|
||||
\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{12}%
|
||||
\contentsline {section}{\numberline {3.8}Anonymität}{12}%
|
||||
\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{13}%
|
||||
\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{13}%
|
||||
\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{13}%
|
||||
\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{13}%
|
||||
\contentsline {section}{\numberline {4.4}Angriffsszenarien}{14}%
|
||||
\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{14}%
|
||||
\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{14}%
|
||||
\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{14}%
|
||||
\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{14}%
|
||||
\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{14}%
|
||||
\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{14}%
|
||||
\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{14}%
|
||||
\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{15}%
|
||||
\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{15}%
|
||||
\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{15}%
|
||||
\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{16}%
|
||||
\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{16}%
|
||||
\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{17}%
|
||||
\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{18}%
|
||||
\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{18}%
|
||||
\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{19}%
|
||||
\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{19}%
|
||||
\contentsline {section}{\numberline {5.5}ChaCha20}{20}%
|
||||
\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{21}%
|
||||
\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{22}%
|
||||
\contentsline {section}{\numberline {6.1}Padding-Verfahren}{22}%
|
||||
\contentsline {section}{\numberline {6.2}Betriebsmodi}{22}%
|
||||
\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{22}%
|
||||
\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{23}%
|
||||
\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{24}%
|
||||
\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{24}%
|
||||
\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{25}%
|
||||
\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{25}%
|
||||
\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{25}%
|
||||
\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{25}%
|
||||
\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{26}%
|
||||
\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{26}%
|
||||
\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{26}%
|
||||
\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{27}%
|
||||
\contentsline {section}{\numberline {6.4}DES}{27}%
|
||||
\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{27}%
|
||||
\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{28}%
|
||||
\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{29}%
|
||||
\contentsline {subsection}{\numberline {6.6.1}AES-128}{29}%
|
||||
\contentsline {chapter}{\numberline {7}Hashfunktionen}{31}%
|
||||
\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{31}%
|
||||
\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{31}%
|
||||
\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{32}%
|
||||
\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{32}%
|
||||
\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{32}%
|
||||
\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{32}%
|
||||
\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{32}%
|
||||
\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{32}%
|
||||
\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{32}%
|
||||
\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{33}%
|
||||
\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{33}%
|
||||
\contentsline {chapter}{\numberline {1}Substitionsverfahren}{4}%
|
||||
\contentsline {section}{\numberline {1.1}Skytale}{4}%
|
||||
\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{4}%
|
||||
\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{5}%
|
||||
\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{5}%
|
||||
\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{5}%
|
||||
\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{5}%
|
||||
\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{5}%
|
||||
\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{6}%
|
||||
\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{6}%
|
||||
\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{6}%
|
||||
\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{6}%
|
||||
\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{6}%
|
||||
\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{6}%
|
||||
\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{6}%
|
||||
\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{7}%
|
||||
\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{7}%
|
||||
\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{7}%
|
||||
\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{7}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{7}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{7}%
|
||||
\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{8}%
|
||||
\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{8}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{8}%
|
||||
\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{8}%
|
||||
\contentsline {subsection}{\numberline {2.2.5}Matrizen}{8}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{8}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{8}%
|
||||
\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{8}%
|
||||
\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{9}%
|
||||
\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{9}%
|
||||
\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{9}%
|
||||
\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{10}%
|
||||
\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{10}%
|
||||
\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{11}%
|
||||
\contentsline {section}{\numberline {3.1}Vertraulichkeit}{11}%
|
||||
\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{11}%
|
||||
\contentsline {section}{\numberline {3.2}Integrität}{11}%
|
||||
\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{12}%
|
||||
\contentsline {section}{\numberline {3.3}Authenzität der Daten}{12}%
|
||||
\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{12}%
|
||||
\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{12}%
|
||||
\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{12}%
|
||||
\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{12}%
|
||||
\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{12}%
|
||||
\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{13}%
|
||||
\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{13}%
|
||||
\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{13}%
|
||||
\contentsline {section}{\numberline {3.7}Verfügbarkeit}{13}%
|
||||
\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{13}%
|
||||
\contentsline {section}{\numberline {3.8}Anonymität}{13}%
|
||||
\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{14}%
|
||||
\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{14}%
|
||||
\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{14}%
|
||||
\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{14}%
|
||||
\contentsline {section}{\numberline {4.4}Angriffsszenarien}{15}%
|
||||
\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{15}%
|
||||
\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{15}%
|
||||
\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{15}%
|
||||
\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{15}%
|
||||
\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{15}%
|
||||
\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{15}%
|
||||
\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{15}%
|
||||
\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{16}%
|
||||
\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{16}%
|
||||
\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{16}%
|
||||
\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{17}%
|
||||
\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{17}%
|
||||
\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{18}%
|
||||
\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{19}%
|
||||
\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{19}%
|
||||
\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{20}%
|
||||
\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{20}%
|
||||
\contentsline {section}{\numberline {5.5}ChaCha20}{21}%
|
||||
\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{22}%
|
||||
\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{23}%
|
||||
\contentsline {section}{\numberline {6.1}Padding-Verfahren}{23}%
|
||||
\contentsline {section}{\numberline {6.2}Betriebsmodi}{23}%
|
||||
\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{23}%
|
||||
\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{24}%
|
||||
\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{25}%
|
||||
\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{25}%
|
||||
\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{26}%
|
||||
\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{26}%
|
||||
\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{26}%
|
||||
\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{26}%
|
||||
\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{27}%
|
||||
\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{27}%
|
||||
\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{27}%
|
||||
\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{28}%
|
||||
\contentsline {section}{\numberline {6.4}DES}{28}%
|
||||
\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{28}%
|
||||
\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{29}%
|
||||
\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{30}%
|
||||
\contentsline {subsection}{\numberline {6.6.1}AES-128}{30}%
|
||||
\contentsline {chapter}{\numberline {7}Hashfunktionen}{32}%
|
||||
\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{32}%
|
||||
\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{32}%
|
||||
\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{33}%
|
||||
\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{33}%
|
||||
\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{33}%
|
||||
\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{33}%
|
||||
\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{33}%
|
||||
\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{33}%
|
||||
\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{33}%
|
||||
\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{34}%
|
||||
\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{34}%
|
||||
\contentsline {chapter}{\numberline {8}MAC-Verfahren}{36}%
|
||||
\contentsline {section}{\numberline {8.1}HMAC}{36}%
|
||||
\contentsline {section}{\numberline {8.2}CMAC, CBC-MAC}{36}%
|
||||
\contentsline {subsection}{\numberline {8.2.1}CMAC}{36}%
|
||||
\contentsline {subsection}{\numberline {8.2.2}CBC-MAC}{37}%
|
||||
|
@ -1,4 +1,4 @@
|
||||
\chapter{Blockverschlüsselungsverfahren}
|
||||
\chapter{Blockverschlüsselungsverfahren}\label{Blockverschlüsselungsverfahren}
|
||||
Ein Verschlüsselungsverfahren wird als Blockverschlüsselungsverfahren bezeichnet,
|
||||
wenn die Menge der Nachrichten $\mathscr M$ durch die Menge der Blöcker einer festen Länge $n\in \mathbb{N}$ gegeben ist:
|
||||
$$\mathscr M := ({\mathbb{Z}_2}^8)^n = \{(z_1,z_2,...,z_n)\mid z_i\in{\mathbb{Z}_2}^8\}$$
|
||||
|
@ -1,4 +1,4 @@
|
||||
\chapter{Hashfunktionen}
|
||||
\chapter{Hashfunktionen}\label{Hashfunktionen}
|
||||
Eine Hashfunktion dient als \say{digitaler Fingerabdruck} einer Nachricht.
|
||||
Es wird für jede nachricht ein (nahezu) eindeutiger Wert einer festen Länge bestimmt.
|
||||
Eine Abbildung $H:\mathscr M \rightarrow {\mathbb{Z}_2}^l$,
|
||||
|
38
chapters/MAC-Verfahren.tex
Normal file
38
chapters/MAC-Verfahren.tex
Normal file
@ -0,0 +1,38 @@
|
||||
\chapter{MAC-Verfahren}
|
||||
Der \textit{Message Authentication Code} (MAC) stellt einen \say{digitalen Fingerabdruck} einer Nachricht dar.
|
||||
Dieser hängt von der Nachricht $m$ und einem Schlüssel $k$ ab.
|
||||
Die Abbildung $M:\mathscr K \times \mathscr M \rightarrow {\mathbb{Z}_2}^l$ mit einem konstanten $l\in\mathbb{N}$ wird als MAC-Verfahren bezeichnet,
|
||||
falls ohne einen Schlüssel $k\in\mathscr K$ die Berechnung des MAC-Wertes $t=M_k(m):=M(k,m)$ für kein $m\in\mathscr M$ möglich ist.
|
||||
Dies soll auch dann nicht möglich sein, falls andere ($m_i$,$t_i$)-Paare bekannt sind.
|
||||
|
||||
\section{HMAC}
|
||||
Jede Hashfunktion (siehe \ref{Hashfunktionen}) $H$ lässt sich in ein MAC-Verfahren $M=\text{HMAC-}H$ umwandeln durch:
|
||||
$$M_k(m):=H\left( (k\oplus\text{opad}) || H((k\oplus ipad)||m) \right)$$
|
||||
opad und ipad sind fest definierte Bytearrays der Bytelänge $r/8$.
|
||||
|
||||
\section{CMAC, CBC-MAC}
|
||||
Im Folgenden wird auf zwei MAC-Konstruktionen eingegangen, die auf der Basis von Blockverschlüsselungsverfahren (siehe \ref{Blockverschlüsselungsverfahren}) definiert sind:
|
||||
|
||||
\subsection{CMAC}
|
||||
Die Berechnung des MAC-Wertes $M_k(m)=M(k,m)$ mithilfe eines Blockverschlüsselungsverfahrens $E:\mathscr K \times ({\mathbb{Z}_2}^8)^n \rightarrow({\mathbb{Z}_2}^8)^n$ erfolgt,
|
||||
indem die durch ein Bytearray gegebene Nachricht $m$ wie folgt verändert wird:
|
||||
\begin{enumerate}
|
||||
\item $m$ wird durch ein Padding von der Form \say{80 00 ... 00} auf ein Vielfaches der Blocklänge $n$ gebracht:
|
||||
$$\tilde{m}:=\begin{cases}
|
||||
m & \text{falls }l(m)\mod n=0 \text{ und } l(m)\ne 0\\
|
||||
m||\underbrace{80 00 ... 00}_{n-(l(m)\mod n)} & \text{falls }l(m)\mod n\ne 0 \text{ oder } l(m)=0
|
||||
\end{cases}$$
|
||||
\item $\tilde{m}$ wird in Blöcke der Länge $n$ zerlegt
|
||||
\item der letzte Block $\tilde{m}_r$ wird wie folgt XOR-Verschlüsselt:
|
||||
$$m_r:=\begin{cases}
|
||||
\tilde{m}_r\oplus k_1 &\text{falls }l(m)\mod n = 0 \text{ und }l(m)\ne 0\\
|
||||
\tilde{m}_r\oplus k_2 &\text{falls }l(m)\mod n \ne 0 \text{ oder }l(m)= 0
|
||||
\end{cases}$$
|
||||
$k_1$ und $k_2$ sind Modifikationen von $k_0 := E_k(0)$
|
||||
\item Die Blöcke inkl. des Verschlüsselten Blocks $m_r$ werden mit $IV=0$ CBC-Verschlüsselt (siehe \ref{CBC})
|
||||
\item Das Ergebnis wird als MAC-Wert ausgegeben
|
||||
\end{enumerate}
|
||||
|
||||
\subsection{CBC-MAC}
|
||||
Falls die Nachrichtenmenge nur Nachrichten mit einer festen Bytelänge, die ein Vielfaches der Blocklänge ist, enthält,
|
||||
kann das CBC-Verfahren (siehe \ref{CBC}) direkt als MAC-Verfahren verwendet werden.
|
Loading…
x
Reference in New Issue
Block a user