diff --git a/Zusammenfassung_DC.aux b/Zusammenfassung_DC.aux index bf630f5..49d48f0 100644 --- a/Zusammenfassung_DC.aux +++ b/Zusammenfassung_DC.aux @@ -2,143 +2,152 @@ \@nameuse{bbl@beforestart} \catcode `"\active \babel@aux{ngerman}{} -\@writefile{toc}{\contentsline {chapter}{\numberline {1}Substitionsverfahren}{3}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {1}Substitionsverfahren}{4}\protected@file@percent } \@writefile{lof}{\addvspace {10\p@ }} \@writefile{lot}{\addvspace {10\p@ }} -\@writefile{toc}{\contentsline {section}{\numberline {1.1}Skytale}{3}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{3}\protected@file@percent } -\newlabel{monoalphabet}{{1.2}{3}} -\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{4}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{4}\protected@file@percent } -\newlabel{häufigkeit}{{1.2.2}{4}} -\@writefile{toc}{\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{4}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{4}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{4}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{5}\protected@file@percent } -\newlabel{otp}{{1.3.2}{5}} -\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{5}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{5}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{5}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{5}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{5}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{5}\protected@file@percent } -\@writefile{toc}{\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{6}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {1.1}Skytale}{4}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{4}\protected@file@percent } +\newlabel{monoalphabet}{{1.2}{4}} +\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{5}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{5}\protected@file@percent } +\newlabel{häufigkeit}{{1.2.2}{5}} +\@writefile{toc}{\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{5}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{5}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{5}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{6}\protected@file@percent } +\newlabel{otp}{{1.3.2}{6}} +\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{6}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{6}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{6}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{6}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{6}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{6}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{7}\protected@file@percent } \@writefile{lof}{\addvspace {10\p@ }} \@writefile{lot}{\addvspace {10\p@ }} -\@writefile{toc}{\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{6}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{6}\protected@file@percent } -\newlabel{Der Ring Z}{{2.2}{6}} -\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{6}\protected@file@percent } -\newlabel{modulare_addition}{{2.2.1}{6}} -\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{6}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{6}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{7}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{7}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{7}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{7}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.5}Matrizen}{7}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{7}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{7}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{7}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{8}\protected@file@percent } -\newlabel{euklid}{{2.3.1}{8}} -\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{8}\protected@file@percent } -\newlabel{erweiterter Euklid}{{2.3.2}{8}} -\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{8}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{9}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{9}\protected@file@percent } -\@writefile{toc}{\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{10}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{7}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{7}\protected@file@percent } +\newlabel{Der Ring Z}{{2.2}{7}} +\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{7}\protected@file@percent } +\newlabel{modulare_addition}{{2.2.1}{7}} +\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{7}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{7}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{8}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{8}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{8}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{8}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.5}Matrizen}{8}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{8}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{8}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{8}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{9}\protected@file@percent } +\newlabel{euklid}{{2.3.1}{9}} +\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{9}\protected@file@percent } +\newlabel{erweiterter Euklid}{{2.3.2}{9}} +\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{9}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{10}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{10}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{11}\protected@file@percent } \@writefile{lof}{\addvspace {10\p@ }} \@writefile{lot}{\addvspace {10\p@ }} -\@writefile{toc}{\contentsline {section}{\numberline {3.1}Vertraulichkeit}{10}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{10}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {3.2}Integrität}{10}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{11}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {3.3}Authenzität der Daten}{11}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{11}\protected@file@percent } -\newlabel{signature}{{3.3.1}{11}} -\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{11}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{11}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{11}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{11}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{12}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{12}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{12}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {3.7}Verfügbarkeit}{12}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{12}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {3.8}Anonymität}{12}\protected@file@percent } -\@writefile{toc}{\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{13}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {3.1}Vertraulichkeit}{11}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{11}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {3.2}Integrität}{11}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{12}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {3.3}Authenzität der Daten}{12}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{12}\protected@file@percent } +\newlabel{signature}{{3.3.1}{12}} +\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{12}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{12}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{12}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{12}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{13}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{13}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{13}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {3.7}Verfügbarkeit}{13}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{13}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {3.8}Anonymität}{13}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{14}\protected@file@percent } \@writefile{lof}{\addvspace {10\p@ }} \@writefile{lot}{\addvspace {10\p@ }} -\@writefile{toc}{\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{13}\protected@file@percent } -\newlabel{kerckhoff}{{4.1}{13}} -\@writefile{toc}{\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{13}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{13}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {4.4}Angriffsszenarien}{14}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{14}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{14}\protected@file@percent } -\newlabel{known-plaintext}{{4.4.2}{14}} -\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{14}\protected@file@percent } -\newlabel{chosen-plaintext}{{4.4.3}{14}} -\@writefile{toc}{\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{14}\protected@file@percent } -\newlabel{brute-force}{{4.5}{14}} -\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{14}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{14}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{14}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{15}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{15}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{15}\protected@file@percent } -\@writefile{toc}{\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{16}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{14}\protected@file@percent } +\newlabel{kerckhoff}{{4.1}{14}} +\@writefile{toc}{\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{14}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{14}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {4.4}Angriffsszenarien}{15}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{15}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{15}\protected@file@percent } +\newlabel{known-plaintext}{{4.4.2}{15}} +\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{15}\protected@file@percent } +\newlabel{chosen-plaintext}{{4.4.3}{15}} +\@writefile{toc}{\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{15}\protected@file@percent } +\newlabel{brute-force}{{4.5}{15}} +\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{15}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{15}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{15}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{16}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{16}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{16}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{17}\protected@file@percent } \@writefile{lof}{\addvspace {10\p@ }} \@writefile{lot}{\addvspace {10\p@ }} -\@writefile{toc}{\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{16}\protected@file@percent } -\newlabel{synchrone Stromverschlüsselung}{{5.1}{16}} -\@writefile{toc}{\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{17}\protected@file@percent } -\newlabel{zustandsabhängige Stromverschlüsselung}{{5.2}{17}} -\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{18}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{18}\protected@file@percent } -\newlabel{synchron additive Stromverschlüsselung}{{5.2.1.1}{18}} -\@writefile{toc}{\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{19}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{19}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {5.5}ChaCha20}{20}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{21}\protected@file@percent } -\@writefile{toc}{\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{22}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{17}\protected@file@percent } +\newlabel{synchrone Stromverschlüsselung}{{5.1}{17}} +\@writefile{toc}{\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{18}\protected@file@percent } +\newlabel{zustandsabhängige Stromverschlüsselung}{{5.2}{18}} +\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{19}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{19}\protected@file@percent } +\newlabel{synchron additive Stromverschlüsselung}{{5.2.1.1}{19}} +\@writefile{toc}{\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{20}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{20}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {5.5}ChaCha20}{21}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{22}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{23}\protected@file@percent } \@writefile{lof}{\addvspace {10\p@ }} \@writefile{lot}{\addvspace {10\p@ }} -\@writefile{toc}{\contentsline {section}{\numberline {6.1}Padding-Verfahren}{22}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {6.2}Betriebsmodi}{22}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{22}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{23}\protected@file@percent } -\newlabel{CBC}{{6.2.2}{23}} -\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{24}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{24}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{25}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{25}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{25}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{25}\protected@file@percent } -\newlabel{OFB}{{6.2.5}{25}} -\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{26}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{26}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{26}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{27}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {6.4}DES}{27}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{27}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{28}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{29}\protected@file@percent } -\newlabel{aes}{{6.6}{29}} -\@writefile{toc}{\contentsline {subsection}{\numberline {6.6.1}AES-128}{29}\protected@file@percent } -\@writefile{toc}{\contentsline {chapter}{\numberline {7}Hashfunktionen}{31}\protected@file@percent } +\newlabel{Blockverschlüsselungsverfahren}{{6}{23}} +\@writefile{toc}{\contentsline {section}{\numberline {6.1}Padding-Verfahren}{23}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {6.2}Betriebsmodi}{23}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{23}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{24}\protected@file@percent } +\newlabel{CBC}{{6.2.2}{24}} +\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{25}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{25}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{26}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{26}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{26}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{26}\protected@file@percent } +\newlabel{OFB}{{6.2.5}{26}} +\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{27}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{27}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{27}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{28}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {6.4}DES}{28}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{28}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{29}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{30}\protected@file@percent } +\newlabel{aes}{{6.6}{30}} +\@writefile{toc}{\contentsline {subsection}{\numberline {6.6.1}AES-128}{30}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {7}Hashfunktionen}{32}\protected@file@percent } \@writefile{lof}{\addvspace {10\p@ }} \@writefile{lot}{\addvspace {10\p@ }} -\@writefile{toc}{\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{31}\protected@file@percent } -\newlabel{schwache Kollisionsfreiheit}{{7.1}{31}} -\@writefile{toc}{\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{31}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{32}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{32}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{32}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{32}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{32}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{32}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{32}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{33}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{33}\protected@file@percent } +\newlabel{Hashfunktionen}{{7}{32}} +\@writefile{toc}{\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{32}\protected@file@percent } +\newlabel{schwache Kollisionsfreiheit}{{7.1}{32}} +\@writefile{toc}{\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{32}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{33}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{33}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{33}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{33}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{33}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{33}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{33}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{34}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{34}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {8}MAC-Verfahren}{36}\protected@file@percent } +\@writefile{lof}{\addvspace {10\p@ }} +\@writefile{lot}{\addvspace {10\p@ }} +\@writefile{toc}{\contentsline {section}{\numberline {8.1}HMAC}{36}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {8.2}CMAC, CBC-MAC}{36}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {8.2.1}CMAC}{36}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {8.2.2}CBC-MAC}{37}\protected@file@percent } diff --git a/Zusammenfassung_DC.fdb_latexmk b/Zusammenfassung_DC.fdb_latexmk index 65b2b23..d16ea2e 100644 --- a/Zusammenfassung_DC.fdb_latexmk +++ b/Zusammenfassung_DC.fdb_latexmk @@ -1,5 +1,5 @@ # Fdb version 3 -["pdflatex"] 1600447913 "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" "Zusammenfassung_DC" 1600447914 +["pdflatex"] 1600449989 "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" "Zusammenfassung_DC" 1600449989 "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/3DES.png" 1600198739 21419 7bf85db371a659f085d9c727a1835013 "" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/AES S-Box.png" 1600269267 23090 2ccce6631c19f6339868594d4b8f11fd "" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Abhörung.png" 1599946545 2649 d6dd82c7c38c06d31f966207a71dc01b "" @@ -23,12 +23,13 @@ "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone additive Stromverschlüsselung.png" 1600003271 10891 bfed2f0ea0241a4a2a4bf215a3d59c32 "" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/zustandsabhängige Stromverschlüsselung.png" 1600002333 10276 422a1760594d1c860f8d7aa6dc5ed032 "" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Übertragungsmanipulation.png" 1599947212 3178 33bbd19fca19c787748d9158d802ceb1 "" - "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux" 1600447914 14069 a2d0e80e3e3b2bdaec79cb0e226d55dc "pdflatex" - "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" 1600440432 1128 fcefc494983c6ad67020eaf1da08b11b "" - "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc" 1600447914 8357 ba9fb5647f721b3df7dc2919d835781f "pdflatex" - "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex" 1600357819 17225 db24f9d3d23fd17831ff4473e048373c "" - "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex" 1600447912 10224 5864379c24b338259d3114889aafebd8 "" + "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux" 1600449989 14728 218d8302697279964c9c5cac607bb3f7 "pdflatex" + "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" 1600448009 1164 63060c3089d19db142722eb600fa368b "" + "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc" 1600449989 8648 2da1b659a745416645125d00d326d2be "pdflatex" + "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex" 1600448893 17264 63a210833f62fb093168d19f774d7af2 "" + "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex" 1600448588 10246 7885d54a32da2f0500e74d589ed65022 "" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex" 1599950390 6191 fdec0aff09dab6668264963cb44ee2f3 "" + "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex" 1600449988 2852 e14fb50fd5672a6215d5d27dd7fa0b13 "" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex" 1600284018 6736 3dece8651acf670a27e1fb6d604e2027 "" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Stromverschlüsselungsverfahren.tex" 1600194483 9836 ddaca4f3d88a46ce7c40ec5d75657c71 "" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex" 1600001305 6264 cba30a66f463934bc822d2ee54ac4b90 "" @@ -155,7 +156,7 @@ "/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map" 1599837712 334180 163417853e75f7c89e92e140d6d6e976 "" "/var/lib/texmf/web2c/pdftex/pdflatex.fmt" 1599837703 2514050 ecf9fe402c479fca46412778ddf38de8 "" (generated) - "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc" - "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.log" + "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux" + "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.log" diff --git a/Zusammenfassung_DC.fls b/Zusammenfassung_DC.fls index c2d4fb1..a6c0613 100644 --- a/Zusammenfassung_DC.fls +++ b/Zusammenfassung_DC.fls @@ -246,6 +246,8 @@ INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ectt0800.tfm INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ectt1440.tfm +INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex +INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux INPUT /usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc INPUT /usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc diff --git a/Zusammenfassung_DC.log b/Zusammenfassung_DC.log index 3358fb8..b6e589f 100644 --- a/Zusammenfassung_DC.log +++ b/Zusammenfassung_DC.log @@ -1,4 +1,4 @@ -This is pdfTeX, Version 3.14159265-2.6-1.40.21 (TeX Live 2020/Arch Linux) (preloaded format=pdflatex 2020.9.11) 18 SEP 2020 18:51 +This is pdfTeX, Version 3.14159265-2.6-1.40.21 (TeX Live 2020/Arch Linux) (preloaded format=pdflatex 2020.9.11) 18 SEP 2020 19:26 entering extended mode restricted \write18 enabled. file:line:error style messages enabled. @@ -291,11 +291,11 @@ File: ursfs.fd 1998/03/24 rsfs font definition file (jk) LaTeX Font Info: Trying to load font information for T1+cmtt on input line 99. (/usr/share/texmf-dist/tex/latex/base/t1cmtt.fd File: t1cmtt.fd 2019/12/16 v2.5j Standard LaTeX font definitions -)) +) [2]) \tf@toc=\write3 - [2] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex + [3] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex Kapitel 1. -<./images/Skytale.png, id=21, 614.6965pt x 351.3125pt> +<./images/Skytale.png, id=24, 614.6965pt x 351.3125pt> File: ./images/Skytale.png Graphic file (type png) Package pdftex.def Info: ./images/Skytale.png used on input line 6. @@ -305,10 +305,10 @@ Underfull \hbox (badness 10000) in paragraph at lines 11--12 [] -[3 +[4 ] -<./images/Vignère-Verfahren.png, id=32, 444.41896pt x 257.5138pt> +<./images/Vignère-Verfahren.png, id=35, 444.41896pt x 257.5138pt> File: ./images/Vignère-Verfahren.png Graphic file (type png) Package pdftex.def Info: ./images/Vignère-Verfahren.png used on input line 50. @@ -318,41 +318,41 @@ Underfull \hbox (badness 10000) in paragraph at lines 47--51 [] -[4 ]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex [5] +[5 ]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex [6] Kapitel 2. -[6 +[7 -] [7] +] [8] Underfull \hbox (badness 10000) in paragraph at lines 108--109 [] -[8]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex [9] +[9]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex [10] Kapitel 3. -<./images/Abhörung.png, id=60, 158.66173pt x 78.08482pt> +<./images/Abhörung.png, id=63, 158.66173pt x 78.08482pt> File: ./images/Abhörung.png Graphic file (type png) Package pdftex.def Info: ./images/Abhörung.png used on input line 6. (pdftex.def) Requested size: 158.66132pt x 78.08463pt. -<./images/Übertragungsmanipulation.png, id=61, 160.3231pt x 72.27pt> +<./images/Übertragungsmanipulation.png, id=64, 160.3231pt x 72.27pt> File: ./images/Übertragungsmanipulation.png Graphic file (type png) Package pdftex.def Info: ./images/Übertragungsmanipulation.png used on input line 23. (pdftex.def) Requested size: 160.3227pt x 72.2698pt. -[10 +[11 ] -<./images/Authenzitätsstörung_0.png, id=66, 156.16966pt x 61.47104pt> +<./images/Authenzitätsstörung_0.png, id=69, 156.16966pt x 61.47104pt> File: ./images/Authenzitätsstörung_0.png Graphic file (type png) Package pdftex.def Info: ./images/Authenzitätsstörung_0.png used on input line 30. (pdftex.def) Requested size: 156.16927pt x 61.47087pt. -<./images/Authenzitätsstörung_1.png, id=67, 147.03207pt x 62.30173pt> +<./images/Authenzitätsstörung_1.png, id=70, 147.03207pt x 62.30173pt> File: ./images/Authenzitätsstörung_1.png Graphic file (type png) Package pdftex.def Info: ./images/Authenzitätsstörung_1.png used on input line 31. (pdftex.def) Requested size: 147.03171pt x 62.30157pt. -<./images/Authenzitätsstörung_2.png, id=68, 153.67758pt x 72.27pt> +<./images/Authenzitätsstörung_2.png, id=71, 153.67758pt x 72.27pt> File: ./images/Authenzitätsstörung_2.png Graphic file (type png) Package pdftex.def Info: ./images/Authenzitätsstörung_2.png used on input line 32. @@ -362,7 +362,7 @@ Overfull \hbox (23.6558pt too wide) in paragraph at lines 37--38 []\T1/cmr/m/n/10.95 es wird ein zwei-ter Kom-mu-ni-ka-ti-ons-weg für die Au-then-ti-fi-ka-ti-on ver-wen-det (2-Factor-Authentification) [] -[11 ]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Verschlüsselungsverfahren.tex [12] +[12 ]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Verschlüsselungsverfahren.tex [13] Kapitel 4. Underfull \hbox (badness 10000) in paragraph at lines 3--4 @@ -374,7 +374,7 @@ Underfull \hbox (badness 10000) in paragraph at lines 5--6 [] -[13 +[14 ] Underfull \hbox (badness 10000) in paragraph at lines 50--53 @@ -386,14 +386,14 @@ Overfull \hbox (30.70032pt too wide) in paragraph at lines 69--70 []\T1/cmr/m/n/10.95 Es soll kei-nen An-griff auf die Klar-text-nach-richt $\OML/cmm/m/it/10.95 m$ \T1/cmr/m/n/10.95 ge-ben, der durch-schnitt-lich we-ni-ger als $[] [][]\OML/cmm/m/it/10.95 ; [][]$ [] -[14]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Stromverschlüsselungsverfahren.tex [15] +[15]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Stromverschlüsselungsverfahren.tex [16] Kapitel 5. Overfull \hbox (29.27113pt too wide) in paragraph at lines 8--10 \T1/cmr/m/n/10.95 Bei man-chen Ver-fah-ren kön-nen bei der Be-rech-nung des $\OML/cmm/m/it/10.95 i$\T1/cmr/m/n/10.95 -ten Ge-heim-text-zei-chens $\OML/cmm/m/it/10.95 c[] \OT1/cmr/m/n/10.95 = \OML/cmm/m/it/10.95 E[]\OT1/cmr/m/n/10.95 (\OML/cmm/m/it/10.95 k; \OT1/cmr/m/n/10.95 (\OML/cmm/m/it/10.95 m[]; m[]; :::; m[]\OT1/cmr/m/n/10.95 ))$ [] -<./images/Stromverschlüsselung.png, id=85, 472.66241pt x 229.27034pt> +<./images/Stromverschlüsselung.png, id=88, 472.66241pt x 229.27034pt> File: ./images/Stromverschlüsselung.png Graphic file (type png) Package pdftex.def Info: ./images/Stromverschlüsselung.png used on input line 11. @@ -403,7 +403,7 @@ Overfull \hbox (5.96439pt too wide) in paragraph at lines 11--12 [][] [] -<./images/synchrone Stromverschlüsselung.png, id=86, 469.33966pt x 215.97931pt> +<./images/synchrone Stromverschlüsselung.png, id=89, 469.33966pt x 215.97931pt> File: ./images/synchrone Stromverschlüsselung.png Graphic file (type png) Package pdftex.def Info: ./images/synchrone Stromverschlüsselung.png used on input line 21. @@ -413,10 +413,10 @@ Overfull \hbox (2.64163pt too wide) in paragraph at lines 21--22 [][] [] -[16 +[17 ] -<./images/zustandsabhängige Stromverschlüsselung.png, id=90, 482.63069pt x 217.64069pt> +<./images/zustandsabhängige Stromverschlüsselung.png, id=93, 482.63069pt x 217.64069pt> File: ./images/zustandsabhängige Stromverschlüsselung.png Graphic file (type png) Package pdftex.def Info: ./images/zustandsabhängige Stromverschlüsselung.png used on input line 38. @@ -426,8 +426,8 @@ Overfull \hbox (15.93263pt too wide) in paragraph at lines 38--39 [][][] [] -[17 ] -<./images/additive zustandsabhängige Stromverschlüsselung.png, id=94, 471.00104pt x 219.30206pt> +[18 ] +<./images/additive zustandsabhängige Stromverschlüsselung.png, id=98, 471.00104pt x 219.30206pt> File: ./images/additive zustandsabhängige Stromverschlüsselung.png Graphic file (type png) Package pdftex.def Info: ./images/additive zustandsabhängige Stromverschlüsselung.png used on input line 46. @@ -437,7 +437,7 @@ Overfull \hbox (4.30301pt too wide) in paragraph at lines 46--47 [][] [] -<./images/synchrone additive Stromverschlüsselung.png, id=95, 471.83173pt x 218.47137pt> +<./images/synchrone additive Stromverschlüsselung.png, id=99, 471.83173pt x 218.47137pt> File: ./images/synchrone additive Stromverschlüsselung.png Graphic file (type png) Package pdftex.def Info: ./images/synchrone additive Stromverschlüsselung.png used on input line 54. @@ -447,9 +447,9 @@ Overfull \hbox (5.1337pt too wide) in paragraph at lines 54--55 [][] [] -[18 ] +[19 ] Missing character: There is no k in font rsfs10! -<./images/Schlüsselstromgenerator mit Nonce.png, id=100, 473.4931pt x 215.97931pt> +<./images/Schlüsselstromgenerator mit Nonce.png, id=103, 473.4931pt x 215.97931pt> File: ./images/Schlüsselstromgenerator mit Nonce.png Graphic file (type png) Package pdftex.def Info: ./images/Schlüsselstromgenerator mit Nonce.png used on input line 82. @@ -459,38 +459,38 @@ Overfull \hbox (17.17014pt too wide) in paragraph at lines 81--83 [] [] -[19 ] +[20 ] Overfull \hbox (77.3615pt too wide) in paragraph at lines 138--138 []\T1/cmr/bx/n/14.4 Cipher-Instanzen: Ver-schlüs-se-lungs-al-go-rith-men in Java-Laufzeitumgebungen [] -) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex [20] [21] +) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex [21] [22] Kapitel 6. Underfull \hbox (badness 10000) in paragraph at lines 4--6 [] -[22 +[23 ] -<./images/ECB.png, id=115, 466.84758pt x 215.97931pt> +<./images/ECB.png, id=118, 466.84758pt x 215.97931pt> File: ./images/ECB.png Graphic file (type png) Package pdftex.def Info: ./images/ECB.png used on input line 34. (pdftex.def) Requested size: 466.84644pt x 215.97878pt. -<./images/ECB_Nonce.png, id=116, 471.00104pt x 221.79414pt> +<./images/ECB_Nonce.png, id=119, 471.00104pt x 221.79414pt> File: ./images/ECB_Nonce.png Graphic file (type png) Package pdftex.def Info: ./images/ECB_Nonce.png used on input line 36. (pdftex.def) Requested size: 470.99988pt x 221.7936pt. -<./images/CBC_enc.png, id=117, 474.32379pt x 219.30206pt> +<./images/CBC_enc.png, id=120, 474.32379pt x 219.30206pt> File: ./images/CBC_enc.png Graphic file (type png) Package pdftex.def Info: ./images/CBC_enc.png used on input line 45. (pdftex.def) Requested size: 474.32263pt x 219.30151pt. - [23 ] -<./images/CBC_dec.png, id=121, 469.33966pt x 214.31793pt> + [24 ] +<./images/CBC_dec.png, id=125, 469.33966pt x 214.31793pt> File: ./images/CBC_dec.png Graphic file (type png) Package pdftex.def Info: ./images/CBC_dec.png used on input line 51. @@ -500,12 +500,12 @@ Overfull \hbox (61.4574pt too wide) in paragraph at lines 59--64 \T1/cmr/m/n/10.95 Wenn die Län-ge der Nach-richt $\OML/cmm/m/it/10.95 m$ \T1/cmr/m/n/10.95 ein Viel-fa-ches des Block-län-ge $\OML/cmm/m/it/10.95 l$ \T1/cmr/m/n/10.95 ist wird das nor-ma-le CBC-Verschlüsselungsverfahren [] -[24 ] +[25 ] Overfull \hbox (61.4574pt too wide) in paragraph at lines 68--70 \T1/cmr/m/n/10.95 Wenn die Län-ge der Nach-richt $\OML/cmm/m/it/10.95 m$ \T1/cmr/m/n/10.95 ein Viel-fa-ches des Block-län-ge $\OML/cmm/m/it/10.95 l$ \T1/cmr/m/n/10.95 ist wird das nor-ma-le CBC-Verschlüsselungsverfahren [] -<./images/CTR.png, id=126, 515.02759pt x 240.0693pt> +<./images/CTR.png, id=129, 515.02759pt x 240.0693pt> File: ./images/CTR.png Graphic file (type png) Package pdftex.def Info: ./images/CTR.png used on input line 85. @@ -515,7 +515,7 @@ Overfull \hbox (31.32945pt too wide) in paragraph at lines 84--86 [] [] -<./images/OFB.png, id=127, 516.42938pt x 235.63031pt> +<./images/OFB.png, id=130, 516.42938pt x 235.63031pt> File: ./images/OFB.png Graphic file (type png) Package pdftex.def Info: ./images/OFB.png used on input line 90. @@ -530,8 +530,8 @@ Underfull \hbox (badness 10000) in paragraph at lines 88--91 [] -[25 ] -<./images/CFB.png, id=131, 518.6878pt x 239.39438pt> +[26 ] +<./images/CFB.png, id=134, 518.6878pt x 239.39438pt> File: ./images/CFB.png Graphic file (type png) Package pdftex.def Info: ./images/CFB.png used on input line 101. @@ -541,55 +541,59 @@ Overfull \hbox (34.98967pt too wide) in paragraph at lines 98--102 [] [] -[26 ] -<./images/3DES.png, id=135, 274.77657pt x 331.99031pt> +[27 ] +<./images/3DES.png, id=138, 274.77657pt x 331.99031pt> File: ./images/3DES.png Graphic file (type png) Package pdftex.def Info: ./images/3DES.png used on input line 144. (pdftex.def) Requested size: 219.82153pt x 265.59259pt. - [27] -<./images/meet-in-the-middle.png, id=140, 260.47313pt x 247.67531pt> + [28] +<./images/meet-in-the-middle.png, id=143, 260.47313pt x 247.67531pt> File: ./images/meet-in-the-middle.png Graphic file (type png) Package pdftex.def Info: ./images/meet-in-the-middle.png used on input line 150. (pdftex.def) Requested size: 260.47249pt x 247.6747pt. - [28 ] -<./images/AES S-Box.png, id=144, 424.58624pt x 396.48125pt> + [29 ] +<./images/AES S-Box.png, id=147, 424.58624pt x 396.48125pt> File: ./images/AES S-Box.png Graphic file (type png) Package pdftex.def Info: ./images/AES S-Box.png used on input line 196. (pdftex.def) Requested size: 339.66945pt x 317.18542pt. - [29 ] + [30 ] -LaTeX Warning: Reference `endliche Körper' on page 30 undefined on input line 222. +LaTeX Warning: Reference `endliche Körper' on page 31 undefined on input line 222. LaTeX Font Info: Font shape `T1/cmtt/bx/n' in size <10.95> not available (Font) Font shape `T1/cmtt/m/n' tried instead on input line 245. -) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex [30] +) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex [31] Kapitel 7. Missing character: There is no m in font rsfs10! LaTeX Font Info: Font shape `T1/cmtt/bx/n' in size <14.4> not available (Font) Font shape `T1/cmtt/m/n' tried instead on input line 29. -[31 +[32 -] [32] [33]) [34] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux) +] [33] [34]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex [35] +Kapitel 8. +) [36 + +] [37] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux) LaTeX Warning: There were undefined references. ) Here is how much of TeX's memory you used: - 6319 strings out of 480478 - 88708 string characters out of 5905959 - 355951 words of memory out of 5000000 - 22188 multiletter control sequences out of 15000+600000 + 6325 strings out of 480478 + 88970 string characters out of 5905959 + 355969 words of memory out of 5000000 + 22191 multiletter control sequences out of 15000+600000 557083 words of font info for 90 fonts, out of 8000000 for 9000 1141 hyphenation exceptions out of 8191 - 30i,10n,37p,377b,255s stack positions out of 5000i,500n,10000p,200000b,80000s + 30i,14n,37p,377b,255s stack positions out of 5000i,500n,10000p,200000b,80000s {/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc}{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc} -Output written on "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" (35 pages, 2631355 bytes). +Output written on "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" (38 pages, 2637795 bytes). PDF statistics: - 254 PDF objects out of 1000 (max. 8388607) - 164 compressed objects within 2 object streams + 266 PDF objects out of 1000 (max. 8388607) + 173 compressed objects within 2 object streams 0 named destinations out of 1000 (max. 500000) 116 words of extra memory for PDF output out of 10000 (max. 10000000) diff --git a/Zusammenfassung_DC.pdf b/Zusammenfassung_DC.pdf index 60cf02f..d8f1d12 100644 Binary files a/Zusammenfassung_DC.pdf and b/Zusammenfassung_DC.pdf differ diff --git a/Zusammenfassung_DC.synctex.gz b/Zusammenfassung_DC.synctex.gz index ece17a3..55e7104 100644 Binary files a/Zusammenfassung_DC.synctex.gz and b/Zusammenfassung_DC.synctex.gz differ diff --git a/Zusammenfassung_DC.tex b/Zusammenfassung_DC.tex index 7d886a1..bf11389 100644 --- a/Zusammenfassung_DC.tex +++ b/Zusammenfassung_DC.tex @@ -56,4 +56,6 @@ rightsub = \grq% \input{chapters/Hashfunktionen.tex} +\input{chapters/MAC-Verfahren.tex} + \end{document} diff --git a/Zusammenfassung_DC.toc b/Zusammenfassung_DC.toc index 829470d..d9c3184 100644 --- a/Zusammenfassung_DC.toc +++ b/Zusammenfassung_DC.toc @@ -1,108 +1,113 @@ \babel@toc {ngerman}{} -\contentsline {chapter}{\numberline {1}Substitionsverfahren}{3}% -\contentsline {section}{\numberline {1.1}Skytale}{3}% -\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{3}% -\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{4}% -\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{4}% -\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{4}% -\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{4}% -\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{4}% -\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{5}% -\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{5}% -\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{5}% -\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{5}% -\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{5}% -\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{5}% -\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{5}% -\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{6}% -\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{6}% -\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{6}% -\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{6}% -\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{6}% -\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{6}% -\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{7}% -\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{7}% -\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{7}% -\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{7}% -\contentsline {subsection}{\numberline {2.2.5}Matrizen}{7}% -\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{7}% -\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{7}% -\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{7}% -\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{8}% -\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{8}% -\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{8}% -\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{9}% -\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{9}% -\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{10}% -\contentsline {section}{\numberline {3.1}Vertraulichkeit}{10}% -\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{10}% -\contentsline {section}{\numberline {3.2}Integrität}{10}% -\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{11}% -\contentsline {section}{\numberline {3.3}Authenzität der Daten}{11}% -\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{11}% -\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{11}% -\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{11}% -\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{11}% -\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{11}% -\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{12}% -\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{12}% -\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{12}% -\contentsline {section}{\numberline {3.7}Verfügbarkeit}{12}% -\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{12}% -\contentsline {section}{\numberline {3.8}Anonymität}{12}% -\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{13}% -\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{13}% -\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{13}% -\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{13}% -\contentsline {section}{\numberline {4.4}Angriffsszenarien}{14}% -\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{14}% -\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{14}% -\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{14}% -\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{14}% -\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{14}% -\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{14}% -\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{14}% -\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{15}% -\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{15}% -\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{15}% -\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{16}% -\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{16}% -\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{17}% -\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{18}% -\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{18}% -\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{19}% -\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{19}% -\contentsline {section}{\numberline {5.5}ChaCha20}{20}% -\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{21}% -\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{22}% -\contentsline {section}{\numberline {6.1}Padding-Verfahren}{22}% -\contentsline {section}{\numberline {6.2}Betriebsmodi}{22}% -\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{22}% -\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{23}% -\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{24}% -\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{24}% -\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{25}% -\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{25}% -\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{25}% -\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{25}% -\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{26}% -\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{26}% -\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{26}% -\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{27}% -\contentsline {section}{\numberline {6.4}DES}{27}% -\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{27}% -\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{28}% -\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{29}% -\contentsline {subsection}{\numberline {6.6.1}AES-128}{29}% -\contentsline {chapter}{\numberline {7}Hashfunktionen}{31}% -\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{31}% -\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{31}% -\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{32}% -\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{32}% -\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{32}% -\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{32}% -\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{32}% -\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{32}% -\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{32}% -\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{33}% -\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{33}% +\contentsline {chapter}{\numberline {1}Substitionsverfahren}{4}% +\contentsline {section}{\numberline {1.1}Skytale}{4}% +\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{4}% +\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{5}% +\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{5}% +\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{5}% +\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{5}% +\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{5}% +\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{6}% +\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{6}% +\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{6}% +\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{6}% +\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{6}% +\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{6}% +\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{6}% +\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{7}% +\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{7}% +\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{7}% +\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{7}% +\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{7}% +\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{7}% +\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{8}% +\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{8}% +\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{8}% +\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{8}% +\contentsline {subsection}{\numberline {2.2.5}Matrizen}{8}% +\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{8}% +\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{8}% +\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{8}% +\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{9}% +\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{9}% +\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{9}% +\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{10}% +\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{10}% +\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{11}% +\contentsline {section}{\numberline {3.1}Vertraulichkeit}{11}% +\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{11}% +\contentsline {section}{\numberline {3.2}Integrität}{11}% +\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{12}% +\contentsline {section}{\numberline {3.3}Authenzität der Daten}{12}% +\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{12}% +\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{12}% +\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{12}% +\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{12}% +\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{12}% +\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{13}% +\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{13}% +\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{13}% +\contentsline {section}{\numberline {3.7}Verfügbarkeit}{13}% +\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{13}% +\contentsline {section}{\numberline {3.8}Anonymität}{13}% +\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{14}% +\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{14}% +\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{14}% +\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{14}% +\contentsline {section}{\numberline {4.4}Angriffsszenarien}{15}% +\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{15}% +\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{15}% +\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{15}% +\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{15}% +\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{15}% +\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{15}% +\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{15}% +\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{16}% +\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{16}% +\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{16}% +\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{17}% +\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{17}% +\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{18}% +\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{19}% +\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{19}% +\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{20}% +\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{20}% +\contentsline {section}{\numberline {5.5}ChaCha20}{21}% +\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{22}% +\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{23}% +\contentsline {section}{\numberline {6.1}Padding-Verfahren}{23}% +\contentsline {section}{\numberline {6.2}Betriebsmodi}{23}% +\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{23}% +\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{24}% +\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{25}% +\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{25}% +\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{26}% +\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{26}% +\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{26}% +\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{26}% +\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{27}% +\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{27}% +\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{27}% +\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{28}% +\contentsline {section}{\numberline {6.4}DES}{28}% +\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{28}% +\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{29}% +\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{30}% +\contentsline {subsection}{\numberline {6.6.1}AES-128}{30}% +\contentsline {chapter}{\numberline {7}Hashfunktionen}{32}% +\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{32}% +\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{32}% +\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{33}% +\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{33}% +\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{33}% +\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{33}% +\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{33}% +\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{33}% +\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{33}% +\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{34}% +\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{34}% +\contentsline {chapter}{\numberline {8}MAC-Verfahren}{36}% +\contentsline {section}{\numberline {8.1}HMAC}{36}% +\contentsline {section}{\numberline {8.2}CMAC, CBC-MAC}{36}% +\contentsline {subsection}{\numberline {8.2.1}CMAC}{36}% +\contentsline {subsection}{\numberline {8.2.2}CBC-MAC}{37}% diff --git a/chapters/Blockverschlüsselungsverfahren.tex b/chapters/Blockverschlüsselungsverfahren.tex index 4aae3ec..ca7e662 100644 --- a/chapters/Blockverschlüsselungsverfahren.tex +++ b/chapters/Blockverschlüsselungsverfahren.tex @@ -1,4 +1,4 @@ -\chapter{Blockverschlüsselungsverfahren} +\chapter{Blockverschlüsselungsverfahren}\label{Blockverschlüsselungsverfahren} Ein Verschlüsselungsverfahren wird als Blockverschlüsselungsverfahren bezeichnet, wenn die Menge der Nachrichten $\mathscr M$ durch die Menge der Blöcker einer festen Länge $n\in \mathbb{N}$ gegeben ist: $$\mathscr M := ({\mathbb{Z}_2}^8)^n = \{(z_1,z_2,...,z_n)\mid z_i\in{\mathbb{Z}_2}^8\}$$ diff --git a/chapters/Hashfunktionen.tex b/chapters/Hashfunktionen.tex index d0ab074..9190d09 100644 --- a/chapters/Hashfunktionen.tex +++ b/chapters/Hashfunktionen.tex @@ -1,4 +1,4 @@ -\chapter{Hashfunktionen} +\chapter{Hashfunktionen}\label{Hashfunktionen} Eine Hashfunktion dient als \say{digitaler Fingerabdruck} einer Nachricht. Es wird für jede nachricht ein (nahezu) eindeutiger Wert einer festen Länge bestimmt. Eine Abbildung $H:\mathscr M \rightarrow {\mathbb{Z}_2}^l$, diff --git a/chapters/MAC-Verfahren.tex b/chapters/MAC-Verfahren.tex new file mode 100644 index 0000000..1f13db4 --- /dev/null +++ b/chapters/MAC-Verfahren.tex @@ -0,0 +1,38 @@ +\chapter{MAC-Verfahren} + Der \textit{Message Authentication Code} (MAC) stellt einen \say{digitalen Fingerabdruck} einer Nachricht dar. + Dieser hängt von der Nachricht $m$ und einem Schlüssel $k$ ab. + Die Abbildung $M:\mathscr K \times \mathscr M \rightarrow {\mathbb{Z}_2}^l$ mit einem konstanten $l\in\mathbb{N}$ wird als MAC-Verfahren bezeichnet, + falls ohne einen Schlüssel $k\in\mathscr K$ die Berechnung des MAC-Wertes $t=M_k(m):=M(k,m)$ für kein $m\in\mathscr M$ möglich ist. + Dies soll auch dann nicht möglich sein, falls andere ($m_i$,$t_i$)-Paare bekannt sind. + + \section{HMAC} + Jede Hashfunktion (siehe \ref{Hashfunktionen}) $H$ lässt sich in ein MAC-Verfahren $M=\text{HMAC-}H$ umwandeln durch: + $$M_k(m):=H\left( (k\oplus\text{opad}) || H((k\oplus ipad)||m) \right)$$ + opad und ipad sind fest definierte Bytearrays der Bytelänge $r/8$. + + \section{CMAC, CBC-MAC} + Im Folgenden wird auf zwei MAC-Konstruktionen eingegangen, die auf der Basis von Blockverschlüsselungsverfahren (siehe \ref{Blockverschlüsselungsverfahren}) definiert sind: + + \subsection{CMAC} + Die Berechnung des MAC-Wertes $M_k(m)=M(k,m)$ mithilfe eines Blockverschlüsselungsverfahrens $E:\mathscr K \times ({\mathbb{Z}_2}^8)^n \rightarrow({\mathbb{Z}_2}^8)^n$ erfolgt, + indem die durch ein Bytearray gegebene Nachricht $m$ wie folgt verändert wird: + \begin{enumerate} + \item $m$ wird durch ein Padding von der Form \say{80 00 ... 00} auf ein Vielfaches der Blocklänge $n$ gebracht: + $$\tilde{m}:=\begin{cases} + m & \text{falls }l(m)\mod n=0 \text{ und } l(m)\ne 0\\ + m||\underbrace{80 00 ... 00}_{n-(l(m)\mod n)} & \text{falls }l(m)\mod n\ne 0 \text{ oder } l(m)=0 + \end{cases}$$ + \item $\tilde{m}$ wird in Blöcke der Länge $n$ zerlegt + \item der letzte Block $\tilde{m}_r$ wird wie folgt XOR-Verschlüsselt: + $$m_r:=\begin{cases} + \tilde{m}_r\oplus k_1 &\text{falls }l(m)\mod n = 0 \text{ und }l(m)\ne 0\\ + \tilde{m}_r\oplus k_2 &\text{falls }l(m)\mod n \ne 0 \text{ oder }l(m)= 0 + \end{cases}$$ + $k_1$ und $k_2$ sind Modifikationen von $k_0 := E_k(0)$ + \item Die Blöcke inkl. des Verschlüsselten Blocks $m_r$ werden mit $IV=0$ CBC-Verschlüsselt (siehe \ref{CBC}) + \item Das Ergebnis wird als MAC-Wert ausgegeben + \end{enumerate} + + \subsection{CBC-MAC} + Falls die Nachrichtenmenge nur Nachrichten mit einer festen Bytelänge, die ein Vielfaches der Blocklänge ist, enthält, + kann das CBC-Verfahren (siehe \ref{CBC}) direkt als MAC-Verfahren verwendet werden.