MAC-Verfahren finished

This commit is contained in:
Paul 2020-09-18 19:26:43 +02:00
parent 862e89e11f
commit cacbf109c0
11 changed files with 364 additions and 303 deletions

View File

@ -2,143 +2,152 @@
\@nameuse{bbl@beforestart}
\catcode `"\active
\babel@aux{ngerman}{}
\@writefile{toc}{\contentsline {chapter}{\numberline {1}Substitionsverfahren}{3}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {1}Substitionsverfahren}{4}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {1.1}Skytale}{3}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{3}\protected@file@percent }
\newlabel{monoalphabet}{{1.2}{3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{4}\protected@file@percent }
\newlabel{häufigkeit}{{1.2.2}{4}}
\@writefile{toc}{\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{5}\protected@file@percent }
\newlabel{otp}{{1.3.2}{5}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{5}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{5}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.1}Skytale}{4}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{4}\protected@file@percent }
\newlabel{monoalphabet}{{1.2}{4}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{5}\protected@file@percent }
\newlabel{häufigkeit}{{1.2.2}{5}}
\@writefile{toc}{\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{6}\protected@file@percent }
\newlabel{otp}{{1.3.2}{6}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{7}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{6}\protected@file@percent }
\newlabel{Der Ring Z}{{2.2}{6}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{6}\protected@file@percent }
\newlabel{modulare_addition}{{2.2.1}{6}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{7}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{7}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{7}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{7}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.5}Matrizen}{7}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{7}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{7}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{7}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{8}\protected@file@percent }
\newlabel{euklid}{{2.3.1}{8}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{8}\protected@file@percent }
\newlabel{erweiterter Euklid}{{2.3.2}{8}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{9}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{9}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{10}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{7}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{7}\protected@file@percent }
\newlabel{Der Ring Z}{{2.2}{7}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{7}\protected@file@percent }
\newlabel{modulare_addition}{{2.2.1}{7}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{7}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{7}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.5}Matrizen}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{9}\protected@file@percent }
\newlabel{euklid}{{2.3.1}{9}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{9}\protected@file@percent }
\newlabel{erweiterter Euklid}{{2.3.2}{9}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{9}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{10}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{10}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{11}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {3.1}Vertraulichkeit}{10}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{10}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.2}Integrität}{10}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{11}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.3}Authenzität der Daten}{11}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{11}\protected@file@percent }
\newlabel{signature}{{3.3.1}{11}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{11}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{11}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{11}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{11}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.7}Verfügbarkeit}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.8}Anonymität}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{13}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.1}Vertraulichkeit}{11}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{11}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.2}Integrität}{11}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.3}Authenzität der Daten}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{12}\protected@file@percent }
\newlabel{signature}{{3.3.1}{12}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{13}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{13}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{13}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.7}Verfügbarkeit}{13}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{13}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.8}Anonymität}{13}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{14}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{13}\protected@file@percent }
\newlabel{kerckhoff}{{4.1}{13}}
\@writefile{toc}{\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{13}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{13}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.4}Angriffsszenarien}{14}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{14}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{14}\protected@file@percent }
\newlabel{known-plaintext}{{4.4.2}{14}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{14}\protected@file@percent }
\newlabel{chosen-plaintext}{{4.4.3}{14}}
\@writefile{toc}{\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{14}\protected@file@percent }
\newlabel{brute-force}{{4.5}{14}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{14}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{14}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{14}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{15}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{15}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{15}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{16}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{14}\protected@file@percent }
\newlabel{kerckhoff}{{4.1}{14}}
\@writefile{toc}{\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{14}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{14}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.4}Angriffsszenarien}{15}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{15}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{15}\protected@file@percent }
\newlabel{known-plaintext}{{4.4.2}{15}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{15}\protected@file@percent }
\newlabel{chosen-plaintext}{{4.4.3}{15}}
\@writefile{toc}{\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{15}\protected@file@percent }
\newlabel{brute-force}{{4.5}{15}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{15}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{15}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{15}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{16}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{16}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{16}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{17}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{16}\protected@file@percent }
\newlabel{synchrone Stromverschlüsselung}{{5.1}{16}}
\@writefile{toc}{\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{17}\protected@file@percent }
\newlabel{zustandsabhängige Stromverschlüsselung}{{5.2}{17}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{18}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{18}\protected@file@percent }
\newlabel{synchron additive Stromverschlüsselung}{{5.2.1.1}{18}}
\@writefile{toc}{\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{19}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{19}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.5}ChaCha20}{20}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{21}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{22}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{17}\protected@file@percent }
\newlabel{synchrone Stromverschlüsselung}{{5.1}{17}}
\@writefile{toc}{\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{18}\protected@file@percent }
\newlabel{zustandsabhängige Stromverschlüsselung}{{5.2}{18}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{19}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{19}\protected@file@percent }
\newlabel{synchron additive Stromverschlüsselung}{{5.2.1.1}{19}}
\@writefile{toc}{\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{20}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{20}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.5}ChaCha20}{21}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{22}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{23}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {6.1}Padding-Verfahren}{22}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.2}Betriebsmodi}{22}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{22}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{23}\protected@file@percent }
\newlabel{CBC}{{6.2.2}{23}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{24}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{24}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{25}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{25}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{25}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{25}\protected@file@percent }
\newlabel{OFB}{{6.2.5}{25}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{26}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{26}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{26}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{27}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.4}DES}{27}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{27}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{28}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{29}\protected@file@percent }
\newlabel{aes}{{6.6}{29}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.6.1}AES-128}{29}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {7}Hashfunktionen}{31}\protected@file@percent }
\newlabel{Blockverschlüsselungsverfahren}{{6}{23}}
\@writefile{toc}{\contentsline {section}{\numberline {6.1}Padding-Verfahren}{23}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.2}Betriebsmodi}{23}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{23}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{24}\protected@file@percent }
\newlabel{CBC}{{6.2.2}{24}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{25}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{25}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{26}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{26}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{26}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{26}\protected@file@percent }
\newlabel{OFB}{{6.2.5}{26}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{27}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{27}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{27}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{28}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.4}DES}{28}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{28}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{29}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{30}\protected@file@percent }
\newlabel{aes}{{6.6}{30}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.6.1}AES-128}{30}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {7}Hashfunktionen}{32}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{31}\protected@file@percent }
\newlabel{schwache Kollisionsfreiheit}{{7.1}{31}}
\@writefile{toc}{\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{31}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{32}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{32}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{32}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{32}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{32}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{32}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{32}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{33}\protected@file@percent }
\newlabel{Hashfunktionen}{{7}{32}}
\@writefile{toc}{\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{32}\protected@file@percent }
\newlabel{schwache Kollisionsfreiheit}{{7.1}{32}}
\@writefile{toc}{\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{32}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{34}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{34}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {8}MAC-Verfahren}{36}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {8.1}HMAC}{36}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {8.2}CMAC, CBC-MAC}{36}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {8.2.1}CMAC}{36}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {8.2.2}CBC-MAC}{37}\protected@file@percent }

View File

@ -1,5 +1,5 @@
# Fdb version 3
["pdflatex"] 1600447913 "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" "Zusammenfassung_DC" 1600447914
["pdflatex"] 1600449989 "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" "Zusammenfassung_DC" 1600449989
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/3DES.png" 1600198739 21419 7bf85db371a659f085d9c727a1835013 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/AES S-Box.png" 1600269267 23090 2ccce6631c19f6339868594d4b8f11fd ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Abhörung.png" 1599946545 2649 d6dd82c7c38c06d31f966207a71dc01b ""
@ -23,12 +23,13 @@
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone additive Stromverschlüsselung.png" 1600003271 10891 bfed2f0ea0241a4a2a4bf215a3d59c32 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/zustandsabhängige Stromverschlüsselung.png" 1600002333 10276 422a1760594d1c860f8d7aa6dc5ed032 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Übertragungsmanipulation.png" 1599947212 3178 33bbd19fca19c787748d9158d802ceb1 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux" 1600447914 14069 a2d0e80e3e3b2bdaec79cb0e226d55dc "pdflatex"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" 1600440432 1128 fcefc494983c6ad67020eaf1da08b11b ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc" 1600447914 8357 ba9fb5647f721b3df7dc2919d835781f "pdflatex"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex" 1600357819 17225 db24f9d3d23fd17831ff4473e048373c ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex" 1600447912 10224 5864379c24b338259d3114889aafebd8 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux" 1600449989 14728 218d8302697279964c9c5cac607bb3f7 "pdflatex"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" 1600448009 1164 63060c3089d19db142722eb600fa368b ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc" 1600449989 8648 2da1b659a745416645125d00d326d2be "pdflatex"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex" 1600448893 17264 63a210833f62fb093168d19f774d7af2 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex" 1600448588 10246 7885d54a32da2f0500e74d589ed65022 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex" 1599950390 6191 fdec0aff09dab6668264963cb44ee2f3 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex" 1600449988 2852 e14fb50fd5672a6215d5d27dd7fa0b13 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex" 1600284018 6736 3dece8651acf670a27e1fb6d604e2027 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Stromverschlüsselungsverfahren.tex" 1600194483 9836 ddaca4f3d88a46ce7c40ec5d75657c71 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex" 1600001305 6264 cba30a66f463934bc822d2ee54ac4b90 ""
@ -155,7 +156,7 @@
"/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map" 1599837712 334180 163417853e75f7c89e92e140d6d6e976 ""
"/var/lib/texmf/web2c/pdftex/pdflatex.fmt" 1599837703 2514050 ecf9fe402c479fca46412778ddf38de8 ""
(generated)
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.log"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.log"

View File

@ -246,6 +246,8 @@ INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ectt0800.tfm
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ectt1440.tfm
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux
INPUT /usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc
INPUT /usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc

View File

@ -1,4 +1,4 @@
This is pdfTeX, Version 3.14159265-2.6-1.40.21 (TeX Live 2020/Arch Linux) (preloaded format=pdflatex 2020.9.11) 18 SEP 2020 18:51
This is pdfTeX, Version 3.14159265-2.6-1.40.21 (TeX Live 2020/Arch Linux) (preloaded format=pdflatex 2020.9.11) 18 SEP 2020 19:26
entering extended mode
restricted \write18 enabled.
file:line:error style messages enabled.
@ -291,11 +291,11 @@ File: ursfs.fd 1998/03/24 rsfs font definition file (jk)
LaTeX Font Info: Trying to load font information for T1+cmtt on input line 99.
(/usr/share/texmf-dist/tex/latex/base/t1cmtt.fd
File: t1cmtt.fd 2019/12/16 v2.5j Standard LaTeX font definitions
))
) [2])
\tf@toc=\write3
[2] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex
[3] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex
Kapitel 1.
<./images/Skytale.png, id=21, 614.6965pt x 351.3125pt>
<./images/Skytale.png, id=24, 614.6965pt x 351.3125pt>
File: ./images/Skytale.png Graphic file (type png)
<use ./images/Skytale.png>
Package pdftex.def Info: ./images/Skytale.png used on input line 6.
@ -305,10 +305,10 @@ Underfull \hbox (badness 10000) in paragraph at lines 11--12
[]
[3
[4
</home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Skytale.png>]
<./images/Vignère-Verfahren.png, id=32, 444.41896pt x 257.5138pt>
<./images/Vignère-Verfahren.png, id=35, 444.41896pt x 257.5138pt>
File: ./images/Vignère-Verfahren.png Graphic file (type png)
<use ./images/Vignère-Verfahren.png>
Package pdftex.def Info: ./images/Vignère-Verfahren.png used on input line 50.
@ -318,41 +318,41 @@ Underfull \hbox (badness 10000) in paragraph at lines 47--51
[]
[4 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Vignère-Verfahren.png (PNG copy)>]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex [5]
[5 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Vignère-Verfahren.png (PNG copy)>]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex [6]
Kapitel 2.
[6
[7
] [7]
] [8]
Underfull \hbox (badness 10000) in paragraph at lines 108--109
[]
[8]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex [9]
[9]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex [10]
Kapitel 3.
<./images/Abhörung.png, id=60, 158.66173pt x 78.08482pt>
<./images/Abhörung.png, id=63, 158.66173pt x 78.08482pt>
File: ./images/Abhörung.png Graphic file (type png)
<use ./images/Abhörung.png>
Package pdftex.def Info: ./images/Abhörung.png used on input line 6.
(pdftex.def) Requested size: 158.66132pt x 78.08463pt.
<./images/Übertragungsmanipulation.png, id=61, 160.3231pt x 72.27pt>
<./images/Übertragungsmanipulation.png, id=64, 160.3231pt x 72.27pt>
File: ./images/Übertragungsmanipulation.png Graphic file (type png)
<use ./images/Übertragungsmanipulation.png>
Package pdftex.def Info: ./images/Übertragungsmanipulation.png used on input line 23.
(pdftex.def) Requested size: 160.3227pt x 72.2698pt.
[10
[11
</home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Abhörung.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Übertragungsmanipulation.png (PNG copy)>]
<./images/Authenzitätsstörung_0.png, id=66, 156.16966pt x 61.47104pt>
<./images/Authenzitätsstörung_0.png, id=69, 156.16966pt x 61.47104pt>
File: ./images/Authenzitätsstörung_0.png Graphic file (type png)
<use ./images/Authenzitätsstörung_0.png>
Package pdftex.def Info: ./images/Authenzitätsstörung_0.png used on input line 30.
(pdftex.def) Requested size: 156.16927pt x 61.47087pt.
<./images/Authenzitätsstörung_1.png, id=67, 147.03207pt x 62.30173pt>
<./images/Authenzitätsstörung_1.png, id=70, 147.03207pt x 62.30173pt>
File: ./images/Authenzitätsstörung_1.png Graphic file (type png)
<use ./images/Authenzitätsstörung_1.png>
Package pdftex.def Info: ./images/Authenzitätsstörung_1.png used on input line 31.
(pdftex.def) Requested size: 147.03171pt x 62.30157pt.
<./images/Authenzitätsstörung_2.png, id=68, 153.67758pt x 72.27pt>
<./images/Authenzitätsstörung_2.png, id=71, 153.67758pt x 72.27pt>
File: ./images/Authenzitätsstörung_2.png Graphic file (type png)
<use ./images/Authenzitätsstörung_2.png>
Package pdftex.def Info: ./images/Authenzitätsstörung_2.png used on input line 32.
@ -362,7 +362,7 @@ Overfull \hbox (23.6558pt too wide) in paragraph at lines 37--38
[]\T1/cmr/m/n/10.95 es wird ein zwei-ter Kom-mu-ni-ka-ti-ons-weg für die Au-then-ti-fi-ka-ti-on ver-wen-det (2-Factor-Authentification)
[]
[11 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_0.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_1.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_2.png (PNG copy)>]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Verschlüsselungsverfahren.tex [12]
[12 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_0.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_1.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_2.png (PNG copy)>]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Verschlüsselungsverfahren.tex [13]
Kapitel 4.
Underfull \hbox (badness 10000) in paragraph at lines 3--4
@ -374,7 +374,7 @@ Underfull \hbox (badness 10000) in paragraph at lines 5--6
[]
[13
[14
]
Underfull \hbox (badness 10000) in paragraph at lines 50--53
@ -386,14 +386,14 @@ Overfull \hbox (30.70032pt too wide) in paragraph at lines 69--70
[]\T1/cmr/m/n/10.95 Es soll kei-nen An-griff auf die Klar-text-nach-richt $\OML/cmm/m/it/10.95 m$ \T1/cmr/m/n/10.95 ge-ben, der durch-schnitt-lich we-ni-ger als $[] [][]\OML/cmm/m/it/10.95 ; [][]$
[]
[14]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Stromverschlüsselungsverfahren.tex [15]
[15]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Stromverschlüsselungsverfahren.tex [16]
Kapitel 5.
Overfull \hbox (29.27113pt too wide) in paragraph at lines 8--10
\T1/cmr/m/n/10.95 Bei man-chen Ver-fah-ren kön-nen bei der Be-rech-nung des $\OML/cmm/m/it/10.95 i$\T1/cmr/m/n/10.95 -ten Ge-heim-text-zei-chens $\OML/cmm/m/it/10.95 c[] \OT1/cmr/m/n/10.95 = \OML/cmm/m/it/10.95 E[]\OT1/cmr/m/n/10.95 (\OML/cmm/m/it/10.95 k; \OT1/cmr/m/n/10.95 (\OML/cmm/m/it/10.95 m[]; m[]; :::; m[]\OT1/cmr/m/n/10.95 ))$
[]
<./images/Stromverschlüsselung.png, id=85, 472.66241pt x 229.27034pt>
<./images/Stromverschlüsselung.png, id=88, 472.66241pt x 229.27034pt>
File: ./images/Stromverschlüsselung.png Graphic file (type png)
<use ./images/Stromverschlüsselung.png>
Package pdftex.def Info: ./images/Stromverschlüsselung.png used on input line 11.
@ -403,7 +403,7 @@ Overfull \hbox (5.96439pt too wide) in paragraph at lines 11--12
[][]
[]
<./images/synchrone Stromverschlüsselung.png, id=86, 469.33966pt x 215.97931pt>
<./images/synchrone Stromverschlüsselung.png, id=89, 469.33966pt x 215.97931pt>
File: ./images/synchrone Stromverschlüsselung.png Graphic file (type png)
<use ./images/synchrone Stromverschlüsselung.png>
Package pdftex.def Info: ./images/synchrone Stromverschlüsselung.png used on input line 21.
@ -413,10 +413,10 @@ Overfull \hbox (2.64163pt too wide) in paragraph at lines 21--22
[][]
[]
[16
[17
</home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Stromverschlüsselung.png (PNG copy)>]
<./images/zustandsabhängige Stromverschlüsselung.png, id=90, 482.63069pt x 217.64069pt>
<./images/zustandsabhängige Stromverschlüsselung.png, id=93, 482.63069pt x 217.64069pt>
File: ./images/zustandsabhängige Stromverschlüsselung.png Graphic file (type png)
<use ./images/zustandsabhängige Stromverschlüsselung.png>
Package pdftex.def Info: ./images/zustandsabhängige Stromverschlüsselung.png used on input line 38.
@ -426,8 +426,8 @@ Overfull \hbox (15.93263pt too wide) in paragraph at lines 38--39
[][][]
[]
[17 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone Stromverschlüsselung.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/zustandsabhängige Stromverschlüsselung.png (PNG copy)>]
<./images/additive zustandsabhängige Stromverschlüsselung.png, id=94, 471.00104pt x 219.30206pt>
[18 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone Stromverschlüsselung.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/zustandsabhängige Stromverschlüsselung.png (PNG copy)>]
<./images/additive zustandsabhängige Stromverschlüsselung.png, id=98, 471.00104pt x 219.30206pt>
File: ./images/additive zustandsabhängige Stromverschlüsselung.png Graphic file (type png)
<use ./images/additive zustandsabhängige Stromverschlüsselung.png>
Package pdftex.def Info: ./images/additive zustandsabhängige Stromverschlüsselung.png used on input line 46.
@ -437,7 +437,7 @@ Overfull \hbox (4.30301pt too wide) in paragraph at lines 46--47
[][]
[]
<./images/synchrone additive Stromverschlüsselung.png, id=95, 471.83173pt x 218.47137pt>
<./images/synchrone additive Stromverschlüsselung.png, id=99, 471.83173pt x 218.47137pt>
File: ./images/synchrone additive Stromverschlüsselung.png Graphic file (type png)
<use ./images/synchrone additive Stromverschlüsselung.png>
Package pdftex.def Info: ./images/synchrone additive Stromverschlüsselung.png used on input line 54.
@ -447,9 +447,9 @@ Overfull \hbox (5.1337pt too wide) in paragraph at lines 54--55
[][]
[]
[18 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/additive zustandsabhängige Stromverschlüsselung.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone additive Stromverschlüsselung.png (PNG copy)>]
[19 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/additive zustandsabhängige Stromverschlüsselung.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone additive Stromverschlüsselung.png (PNG copy)>]
Missing character: There is no k in font rsfs10!
<./images/Schlüsselstromgenerator mit Nonce.png, id=100, 473.4931pt x 215.97931pt>
<./images/Schlüsselstromgenerator mit Nonce.png, id=103, 473.4931pt x 215.97931pt>
File: ./images/Schlüsselstromgenerator mit Nonce.png Graphic file (type png)
<use ./images/Schlüsselstromgenerator mit Nonce.png>
Package pdftex.def Info: ./images/Schlüsselstromgenerator mit Nonce.png used on input line 82.
@ -459,38 +459,38 @@ Overfull \hbox (17.17014pt too wide) in paragraph at lines 81--83
[]
[]
[19 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Schlüsselstromgenerator mit Nonce.png (PNG copy)>]
[20 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Schlüsselstromgenerator mit Nonce.png (PNG copy)>]
Overfull \hbox (77.3615pt too wide) in paragraph at lines 138--138
[]\T1/cmr/bx/n/14.4 Cipher-Instanzen: Ver-schlüs-se-lungs-al-go-rith-men in Java-Laufzeitumgebungen
[]
) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex [20] [21]
) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex [21] [22]
Kapitel 6.
Underfull \hbox (badness 10000) in paragraph at lines 4--6
[]
[22
[23
]
<./images/ECB.png, id=115, 466.84758pt x 215.97931pt>
<./images/ECB.png, id=118, 466.84758pt x 215.97931pt>
File: ./images/ECB.png Graphic file (type png)
<use ./images/ECB.png>
Package pdftex.def Info: ./images/ECB.png used on input line 34.
(pdftex.def) Requested size: 466.84644pt x 215.97878pt.
<./images/ECB_Nonce.png, id=116, 471.00104pt x 221.79414pt>
<./images/ECB_Nonce.png, id=119, 471.00104pt x 221.79414pt>
File: ./images/ECB_Nonce.png Graphic file (type png)
<use ./images/ECB_Nonce.png>
Package pdftex.def Info: ./images/ECB_Nonce.png used on input line 36.
(pdftex.def) Requested size: 470.99988pt x 221.7936pt.
<./images/CBC_enc.png, id=117, 474.32379pt x 219.30206pt>
<./images/CBC_enc.png, id=120, 474.32379pt x 219.30206pt>
File: ./images/CBC_enc.png Graphic file (type png)
<use ./images/CBC_enc.png>
Package pdftex.def Info: ./images/CBC_enc.png used on input line 45.
(pdftex.def) Requested size: 474.32263pt x 219.30151pt.
[23 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB_Nonce.png (PNG copy)>]
<./images/CBC_dec.png, id=121, 469.33966pt x 214.31793pt>
[24 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB_Nonce.png (PNG copy)>]
<./images/CBC_dec.png, id=125, 469.33966pt x 214.31793pt>
File: ./images/CBC_dec.png Graphic file (type png)
<use ./images/CBC_dec.png>
Package pdftex.def Info: ./images/CBC_dec.png used on input line 51.
@ -500,12 +500,12 @@ Overfull \hbox (61.4574pt too wide) in paragraph at lines 59--64
\T1/cmr/m/n/10.95 Wenn die Län-ge der Nach-richt $\OML/cmm/m/it/10.95 m$ \T1/cmr/m/n/10.95 ein Viel-fa-ches des Block-län-ge $\OML/cmm/m/it/10.95 l$ \T1/cmr/m/n/10.95 ist wird das nor-ma-le CBC-Verschlüsselungsverfahren
[]
[24 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_enc.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_dec.png (PNG copy)>]
[25 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_enc.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_dec.png (PNG copy)>]
Overfull \hbox (61.4574pt too wide) in paragraph at lines 68--70
\T1/cmr/m/n/10.95 Wenn die Län-ge der Nach-richt $\OML/cmm/m/it/10.95 m$ \T1/cmr/m/n/10.95 ein Viel-fa-ches des Block-län-ge $\OML/cmm/m/it/10.95 l$ \T1/cmr/m/n/10.95 ist wird das nor-ma-le CBC-Verschlüsselungsverfahren
[]
<./images/CTR.png, id=126, 515.02759pt x 240.0693pt>
<./images/CTR.png, id=129, 515.02759pt x 240.0693pt>
File: ./images/CTR.png Graphic file (type png)
<use ./images/CTR.png>
Package pdftex.def Info: ./images/CTR.png used on input line 85.
@ -515,7 +515,7 @@ Overfull \hbox (31.32945pt too wide) in paragraph at lines 84--86
[]
[]
<./images/OFB.png, id=127, 516.42938pt x 235.63031pt>
<./images/OFB.png, id=130, 516.42938pt x 235.63031pt>
File: ./images/OFB.png Graphic file (type png)
<use ./images/OFB.png>
Package pdftex.def Info: ./images/OFB.png used on input line 90.
@ -530,8 +530,8 @@ Underfull \hbox (badness 10000) in paragraph at lines 88--91
[]
[25 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CTR.png (PNG copy)>]
<./images/CFB.png, id=131, 518.6878pt x 239.39438pt>
[26 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CTR.png (PNG copy)>]
<./images/CFB.png, id=134, 518.6878pt x 239.39438pt>
File: ./images/CFB.png Graphic file (type png)
<use ./images/CFB.png>
Package pdftex.def Info: ./images/CFB.png used on input line 101.
@ -541,55 +541,59 @@ Overfull \hbox (34.98967pt too wide) in paragraph at lines 98--102
[]
[]
[26 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/OFB.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CFB.png (PNG copy)>]
<./images/3DES.png, id=135, 274.77657pt x 331.99031pt>
[27 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/OFB.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CFB.png (PNG copy)>]
<./images/3DES.png, id=138, 274.77657pt x 331.99031pt>
File: ./images/3DES.png Graphic file (type png)
<use ./images/3DES.png>
Package pdftex.def Info: ./images/3DES.png used on input line 144.
(pdftex.def) Requested size: 219.82153pt x 265.59259pt.
[27]
<./images/meet-in-the-middle.png, id=140, 260.47313pt x 247.67531pt>
[28]
<./images/meet-in-the-middle.png, id=143, 260.47313pt x 247.67531pt>
File: ./images/meet-in-the-middle.png Graphic file (type png)
<use ./images/meet-in-the-middle.png>
Package pdftex.def Info: ./images/meet-in-the-middle.png used on input line 150.
(pdftex.def) Requested size: 260.47249pt x 247.6747pt.
[28 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/3DES.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/meet-in-the-middle.png (PNG copy)>]
<./images/AES S-Box.png, id=144, 424.58624pt x 396.48125pt>
[29 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/3DES.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/meet-in-the-middle.png (PNG copy)>]
<./images/AES S-Box.png, id=147, 424.58624pt x 396.48125pt>
File: ./images/AES S-Box.png Graphic file (type png)
<use ./images/AES S-Box.png>
Package pdftex.def Info: ./images/AES S-Box.png used on input line 196.
(pdftex.def) Requested size: 339.66945pt x 317.18542pt.
[29 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/AES S-Box.png (PNG copy)>]
[30 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/AES S-Box.png (PNG copy)>]
LaTeX Warning: Reference `endliche Körper' on page 30 undefined on input line 222.
LaTeX Warning: Reference `endliche Körper' on page 31 undefined on input line 222.
LaTeX Font Info: Font shape `T1/cmtt/bx/n' in size <10.95> not available
(Font) Font shape `T1/cmtt/m/n' tried instead on input line 245.
) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex [30]
) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex [31]
Kapitel 7.
Missing character: There is no m in font rsfs10!
LaTeX Font Info: Font shape `T1/cmtt/bx/n' in size <14.4> not available
(Font) Font shape `T1/cmtt/m/n' tried instead on input line 29.
[31
[32
] [32] [33]) [34] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux)
] [33] [34]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex [35]
Kapitel 8.
) [36
] [37] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux)
LaTeX Warning: There were undefined references.
)
Here is how much of TeX's memory you used:
6319 strings out of 480478
88708 string characters out of 5905959
355951 words of memory out of 5000000
22188 multiletter control sequences out of 15000+600000
6325 strings out of 480478
88970 string characters out of 5905959
355969 words of memory out of 5000000
22191 multiletter control sequences out of 15000+600000
557083 words of font info for 90 fonts, out of 8000000 for 9000
1141 hyphenation exceptions out of 8191
30i,10n,37p,377b,255s stack positions out of 5000i,500n,10000p,200000b,80000s
30i,14n,37p,377b,255s stack positions out of 5000i,500n,10000p,200000b,80000s
{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc}{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmex10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msam10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msbm10.pfb></usr/share/texmf-dist/fonts/type1/public/rsfs/rsfs10.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1200.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1440.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2074.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2488.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1200.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1728.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfti1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sftt1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sftt1440.pfb>
Output written on "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" (35 pages, 2631355 bytes).
Output written on "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" (38 pages, 2637795 bytes).
PDF statistics:
254 PDF objects out of 1000 (max. 8388607)
164 compressed objects within 2 object streams
266 PDF objects out of 1000 (max. 8388607)
173 compressed objects within 2 object streams
0 named destinations out of 1000 (max. 500000)
116 words of extra memory for PDF output out of 10000 (max. 10000000)

Binary file not shown.

Binary file not shown.

View File

@ -56,4 +56,6 @@ rightsub = \grq%
\input{chapters/Hashfunktionen.tex}
\input{chapters/MAC-Verfahren.tex}
\end{document}

View File

@ -1,108 +1,113 @@
\babel@toc {ngerman}{}
\contentsline {chapter}{\numberline {1}Substitionsverfahren}{3}%
\contentsline {section}{\numberline {1.1}Skytale}{3}%
\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{3}%
\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{4}%
\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{4}%
\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{4}%
\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{4}%
\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{4}%
\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{5}%
\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{5}%
\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{5}%
\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{5}%
\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{5}%
\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{5}%
\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{5}%
\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{6}%
\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{6}%
\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{6}%
\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{6}%
\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{6}%
\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{6}%
\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{7}%
\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{7}%
\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{7}%
\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{7}%
\contentsline {subsection}{\numberline {2.2.5}Matrizen}{7}%
\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{7}%
\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{7}%
\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{7}%
\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{8}%
\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{8}%
\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{8}%
\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{9}%
\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{9}%
\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{10}%
\contentsline {section}{\numberline {3.1}Vertraulichkeit}{10}%
\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{10}%
\contentsline {section}{\numberline {3.2}Integrität}{10}%
\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{11}%
\contentsline {section}{\numberline {3.3}Authenzität der Daten}{11}%
\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{11}%
\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{11}%
\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{11}%
\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{11}%
\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{11}%
\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{12}%
\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{12}%
\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{12}%
\contentsline {section}{\numberline {3.7}Verfügbarkeit}{12}%
\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{12}%
\contentsline {section}{\numberline {3.8}Anonymität}{12}%
\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{13}%
\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{13}%
\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{13}%
\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{13}%
\contentsline {section}{\numberline {4.4}Angriffsszenarien}{14}%
\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{14}%
\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{14}%
\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{14}%
\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{14}%
\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{14}%
\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{14}%
\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{14}%
\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{15}%
\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{15}%
\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{15}%
\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{16}%
\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{16}%
\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{17}%
\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{18}%
\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{18}%
\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{19}%
\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{19}%
\contentsline {section}{\numberline {5.5}ChaCha20}{20}%
\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{21}%
\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{22}%
\contentsline {section}{\numberline {6.1}Padding-Verfahren}{22}%
\contentsline {section}{\numberline {6.2}Betriebsmodi}{22}%
\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{22}%
\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{23}%
\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{24}%
\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{24}%
\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{25}%
\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{25}%
\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{25}%
\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{25}%
\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{26}%
\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{26}%
\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{26}%
\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{27}%
\contentsline {section}{\numberline {6.4}DES}{27}%
\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{27}%
\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{28}%
\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{29}%
\contentsline {subsection}{\numberline {6.6.1}AES-128}{29}%
\contentsline {chapter}{\numberline {7}Hashfunktionen}{31}%
\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{31}%
\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{31}%
\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{32}%
\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{32}%
\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{32}%
\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{32}%
\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{32}%
\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{32}%
\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{32}%
\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{33}%
\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{33}%
\contentsline {chapter}{\numberline {1}Substitionsverfahren}{4}%
\contentsline {section}{\numberline {1.1}Skytale}{4}%
\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{4}%
\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{5}%
\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{5}%
\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{5}%
\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{5}%
\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{5}%
\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{6}%
\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{6}%
\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{6}%
\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{6}%
\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{6}%
\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{6}%
\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{6}%
\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{7}%
\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{7}%
\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{7}%
\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{7}%
\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{7}%
\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{7}%
\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{8}%
\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{8}%
\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{8}%
\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{8}%
\contentsline {subsection}{\numberline {2.2.5}Matrizen}{8}%
\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{8}%
\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{8}%
\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{8}%
\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{9}%
\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{9}%
\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{9}%
\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{10}%
\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{10}%
\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{11}%
\contentsline {section}{\numberline {3.1}Vertraulichkeit}{11}%
\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{11}%
\contentsline {section}{\numberline {3.2}Integrität}{11}%
\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{12}%
\contentsline {section}{\numberline {3.3}Authenzität der Daten}{12}%
\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{12}%
\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{12}%
\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{12}%
\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{12}%
\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{12}%
\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{13}%
\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{13}%
\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{13}%
\contentsline {section}{\numberline {3.7}Verfügbarkeit}{13}%
\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{13}%
\contentsline {section}{\numberline {3.8}Anonymität}{13}%
\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{14}%
\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{14}%
\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{14}%
\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{14}%
\contentsline {section}{\numberline {4.4}Angriffsszenarien}{15}%
\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{15}%
\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{15}%
\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{15}%
\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{15}%
\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{15}%
\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{15}%
\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{15}%
\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{16}%
\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{16}%
\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{16}%
\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{17}%
\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{17}%
\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{18}%
\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{19}%
\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{19}%
\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{20}%
\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{20}%
\contentsline {section}{\numberline {5.5}ChaCha20}{21}%
\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{22}%
\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{23}%
\contentsline {section}{\numberline {6.1}Padding-Verfahren}{23}%
\contentsline {section}{\numberline {6.2}Betriebsmodi}{23}%
\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{23}%
\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{24}%
\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{25}%
\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{25}%
\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{26}%
\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{26}%
\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{26}%
\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{26}%
\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{27}%
\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{27}%
\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{27}%
\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{28}%
\contentsline {section}{\numberline {6.4}DES}{28}%
\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{28}%
\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{29}%
\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{30}%
\contentsline {subsection}{\numberline {6.6.1}AES-128}{30}%
\contentsline {chapter}{\numberline {7}Hashfunktionen}{32}%
\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{32}%
\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{32}%
\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{33}%
\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{33}%
\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{33}%
\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{33}%
\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{33}%
\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{33}%
\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{33}%
\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{34}%
\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{34}%
\contentsline {chapter}{\numberline {8}MAC-Verfahren}{36}%
\contentsline {section}{\numberline {8.1}HMAC}{36}%
\contentsline {section}{\numberline {8.2}CMAC, CBC-MAC}{36}%
\contentsline {subsection}{\numberline {8.2.1}CMAC}{36}%
\contentsline {subsection}{\numberline {8.2.2}CBC-MAC}{37}%

View File

@ -1,4 +1,4 @@
\chapter{Blockverschlüsselungsverfahren}
\chapter{Blockverschlüsselungsverfahren}\label{Blockverschlüsselungsverfahren}
Ein Verschlüsselungsverfahren wird als Blockverschlüsselungsverfahren bezeichnet,
wenn die Menge der Nachrichten $\mathscr M$ durch die Menge der Blöcker einer festen Länge $n\in \mathbb{N}$ gegeben ist:
$$\mathscr M := ({\mathbb{Z}_2}^8)^n = \{(z_1,z_2,...,z_n)\mid z_i\in{\mathbb{Z}_2}^8\}$$

View File

@ -1,4 +1,4 @@
\chapter{Hashfunktionen}
\chapter{Hashfunktionen}\label{Hashfunktionen}
Eine Hashfunktion dient als \say{digitaler Fingerabdruck} einer Nachricht.
Es wird für jede nachricht ein (nahezu) eindeutiger Wert einer festen Länge bestimmt.
Eine Abbildung $H:\mathscr M \rightarrow {\mathbb{Z}_2}^l$,

View File

@ -0,0 +1,38 @@
\chapter{MAC-Verfahren}
Der \textit{Message Authentication Code} (MAC) stellt einen \say{digitalen Fingerabdruck} einer Nachricht dar.
Dieser hängt von der Nachricht $m$ und einem Schlüssel $k$ ab.
Die Abbildung $M:\mathscr K \times \mathscr M \rightarrow {\mathbb{Z}_2}^l$ mit einem konstanten $l\in\mathbb{N}$ wird als MAC-Verfahren bezeichnet,
falls ohne einen Schlüssel $k\in\mathscr K$ die Berechnung des MAC-Wertes $t=M_k(m):=M(k,m)$ für kein $m\in\mathscr M$ möglich ist.
Dies soll auch dann nicht möglich sein, falls andere ($m_i$,$t_i$)-Paare bekannt sind.
\section{HMAC}
Jede Hashfunktion (siehe \ref{Hashfunktionen}) $H$ lässt sich in ein MAC-Verfahren $M=\text{HMAC-}H$ umwandeln durch:
$$M_k(m):=H\left( (k\oplus\text{opad}) || H((k\oplus ipad)||m) \right)$$
opad und ipad sind fest definierte Bytearrays der Bytelänge $r/8$.
\section{CMAC, CBC-MAC}
Im Folgenden wird auf zwei MAC-Konstruktionen eingegangen, die auf der Basis von Blockverschlüsselungsverfahren (siehe \ref{Blockverschlüsselungsverfahren}) definiert sind:
\subsection{CMAC}
Die Berechnung des MAC-Wertes $M_k(m)=M(k,m)$ mithilfe eines Blockverschlüsselungsverfahrens $E:\mathscr K \times ({\mathbb{Z}_2}^8)^n \rightarrow({\mathbb{Z}_2}^8)^n$ erfolgt,
indem die durch ein Bytearray gegebene Nachricht $m$ wie folgt verändert wird:
\begin{enumerate}
\item $m$ wird durch ein Padding von der Form \say{80 00 ... 00} auf ein Vielfaches der Blocklänge $n$ gebracht:
$$\tilde{m}:=\begin{cases}
m & \text{falls }l(m)\mod n=0 \text{ und } l(m)\ne 0\\
m||\underbrace{80 00 ... 00}_{n-(l(m)\mod n)} & \text{falls }l(m)\mod n\ne 0 \text{ oder } l(m)=0
\end{cases}$$
\item $\tilde{m}$ wird in Blöcke der Länge $n$ zerlegt
\item der letzte Block $\tilde{m}_r$ wird wie folgt XOR-Verschlüsselt:
$$m_r:=\begin{cases}
\tilde{m}_r\oplus k_1 &\text{falls }l(m)\mod n = 0 \text{ und }l(m)\ne 0\\
\tilde{m}_r\oplus k_2 &\text{falls }l(m)\mod n \ne 0 \text{ oder }l(m)= 0
\end{cases}$$
$k_1$ und $k_2$ sind Modifikationen von $k_0 := E_k(0)$
\item Die Blöcke inkl. des Verschlüsselten Blocks $m_r$ werden mit $IV=0$ CBC-Verschlüsselt (siehe \ref{CBC})
\item Das Ergebnis wird als MAC-Wert ausgegeben
\end{enumerate}
\subsection{CBC-MAC}
Falls die Nachrichtenmenge nur Nachrichten mit einer festen Bytelänge, die ein Vielfaches der Blocklänge ist, enthält,
kann das CBC-Verfahren (siehe \ref{CBC}) direkt als MAC-Verfahren verwendet werden.