first script completed
This commit is contained in:
parent
3cd6069a0c
commit
df9ef77df8
@ -2,64 +2,84 @@
|
||||
\@nameuse{bbl@beforestart}
|
||||
\catcode `"\active
|
||||
\babel@aux{ngerman}{}
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {1}Substitionsverfahren}{2}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {1}Substitionsverfahren}{3}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.1}Skytale}{2}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{2}\protected@file@percent }
|
||||
\newlabel{monoalphabet}{{1.2}{2}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{3}\protected@file@percent }
|
||||
\newlabel{häufigkeit}{{1.2.2}{3}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{4}\protected@file@percent }
|
||||
\newlabel{otp}{{1.3.2}{4}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.1}Skytale}{3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{3}\protected@file@percent }
|
||||
\newlabel{monoalphabet}{{1.2}{3}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{4}\protected@file@percent }
|
||||
\newlabel{häufigkeit}{{1.2.2}{4}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{5}\protected@file@percent }
|
||||
\newlabel{otp}{{1.3.2}{5}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{6}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.5}Matrizen}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{9}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.5}Matrizen}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{9}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{9}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{10}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.1}Vertraulichkeit}{9}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{9}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.2}Integrität}{9}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{10}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.3}Authenzität der Daten}{10}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{10}\protected@file@percent }
|
||||
\newlabel{signature}{{3.3.1}{10}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{10}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{10}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{10}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{10}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.7}Verfügbarkeit}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.8}Anonymität}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.1}Vertraulichkeit}{10}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{10}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.2}Integrität}{10}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.3}Authenzität der Daten}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{11}\protected@file@percent }
|
||||
\newlabel{signature}{{3.3.1}{11}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.7}Verfügbarkeit}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.8}Anonymität}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{13}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{13}\protected@file@percent }
|
||||
\newlabel{kerckhoff}{{4.1}{13}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{13}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{13}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.4}Angriffsszenarien}{14}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{14}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{14}\protected@file@percent }
|
||||
\newlabel{known-plaintext}{{4.4.2}{14}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{14}\protected@file@percent }
|
||||
\newlabel{chosen-plaintext}{{4.4.3}{14}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{14}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{14}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{14}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{14}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{15}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{15}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{15}\protected@file@percent }
|
||||
|
@ -1,5 +1,5 @@
|
||||
# Fdb version 3
|
||||
["pdflatex"] 1599950391 "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" "Zusammenfassung_DC" 1599950391
|
||||
["pdflatex"] 1599991592 "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" "Zusammenfassung_DC" 1599991592
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Abhörung.png" 1599946545 2649 d6dd82c7c38c06d31f966207a71dc01b ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_0.png" 1599947572 2910 b2497355ec1d31d5fce9d57d122a91f3 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_1.png" 1599947589 3427 a39ecab3779301930ce6bed4cf3141a1 ""
|
||||
@ -7,12 +7,14 @@
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Skytale.png" 1599914207 1414106 7498f70ad27e17e63eb468c2321baa5c ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Vignère-Verfahren.png" 1599929213 15507 459514839914b680af2e81b7bdc33933 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Übertragungsmanipulation.png" 1599947212 3178 33bbd19fca19c787748d9158d802ceb1 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux" 1599950391 6319 f314a740889be8ae83f138f9c245985e "pdflatex"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" 1599946269 810 d469336027523dd358543824d1f7fb91 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc" 1599950391 3815 7527edeb5c81aaefb732277aeb7a8936 "pdflatex"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux" 1599991592 8314 d109024baa07c01aa1bfa26a02004e2b "pdflatex"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" 1599986796 963 7f83ce9ff54f353430cdef52268dca47 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc" 1599991592 5006 10247552f15612768e31bdd452580da1 "pdflatex"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex" 1599950390 6191 fdec0aff09dab6668264963cb44ee2f3 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex" 1599946107 6653 1e82ed4e8bdea8018839387aa5932182 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex" 1599947681 6264 214499e6ce77b96709bdeb70afd2c276 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Verschlüsselungsverfahren.tex" 1599991591 7302 288cd9586a653dd7d1727a7c0d8a4e82 ""
|
||||
"/usr/local/share/texmf/tex/latex/dirtytalk/dirtytalk.sty" 1599986679 1915 75d8498f106e3f673b6267693e944869 ""
|
||||
"/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc" 1591545468 2971 def0b6c1f0b107b3b936def894055589 ""
|
||||
"/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc" 1591545468 2900 1537cc8184ad1792082cd229ecc269f4 ""
|
||||
"/usr/share/texmf-dist/fonts/map/fontname/texfonts.map" 1591545468 3524 cb3e574dea2d1052e39280babc910dc8 ""
|
||||
@ -81,6 +83,8 @@
|
||||
"/usr/share/texmf-dist/tex/generic/babel/txtbabel.def" 1591545468 5211 2c3605e674ad86cdc9fdcfcd3de3a1da ""
|
||||
"/usr/share/texmf-dist/tex/generic/iftex/iftex.sty" 1591545468 6501 4011d89d9621e0b0901138815ba5ff29 ""
|
||||
"/usr/share/texmf-dist/tex/generic/iftex/ifvtex.sty" 1591545468 1057 525c2192b5febbd8c1f662c9468335bb ""
|
||||
"/usr/share/texmf-dist/tex/generic/kvsetkeys/kvsetkeys.sty" 1591545468 13807 952b0226d4efca026f0e19dd266dcc22 ""
|
||||
"/usr/share/texmf-dist/tex/generic/ltxcmds/ltxcmds.sty" 1591545468 18552 1e1cc7b75da0dfaacce7cdcb27d306bf ""
|
||||
"/usr/share/texmf-dist/tex/latex/amsfonts/amsfonts.sty" 1591545468 5949 3f3fd50a8cc94c3d4cbf4fc66cd3df1c ""
|
||||
"/usr/share/texmf-dist/tex/latex/amsfonts/umsa.fd" 1591545468 961 6518c6525a34feb5e8250ffa91731cff ""
|
||||
"/usr/share/texmf-dist/tex/latex/amsfonts/umsb.fd" 1591545468 961 d02606146ba5601b5645f987c92e6193 ""
|
||||
@ -90,6 +94,7 @@
|
||||
"/usr/share/texmf-dist/tex/latex/amsmath/amsopn.sty" 1591545468 4116 32e6abd27229755a83a8b7f18e583890 ""
|
||||
"/usr/share/texmf-dist/tex/latex/amsmath/amstext.sty" 1591545468 2432 8ff93b1137020e8f21930562a874ae66 ""
|
||||
"/usr/share/texmf-dist/tex/latex/base/fontenc.sty" 1591545468 4947 0c2888dd88121ae675fc6e82213623ba ""
|
||||
"/usr/share/texmf-dist/tex/latex/base/ifthen.sty" 1591545468 5159 892429808d9e0e2b3548aaefd9a06ed0 ""
|
||||
"/usr/share/texmf-dist/tex/latex/base/inputenc.sty" 1591545468 5050 8933a39ad74377accd18991c5eb90c58 ""
|
||||
"/usr/share/texmf-dist/tex/latex/base/report.cls" 1591545468 23082 a0e9a5941c744eda6abe56770037a201 ""
|
||||
"/usr/share/texmf-dist/tex/latex/base/size11.clo" 1591545468 8462 61fdf79debfc3dc4dab35ec6cf83fbf7 ""
|
||||
@ -104,6 +109,7 @@
|
||||
"/usr/share/texmf-dist/tex/latex/graphics/trig.sty" 1591545468 3976 d7fa7d81d2870d509d25b17d0245e735 ""
|
||||
"/usr/share/texmf-dist/tex/latex/jknapltx/mathrsfs.sty" 1591545468 300 12fa6f636b617656f2810ee82cb05015 ""
|
||||
"/usr/share/texmf-dist/tex/latex/jknapltx/ursfs.fd" 1591545468 548 cc4e3557704bfed27c7002773fad6c90 ""
|
||||
"/usr/share/texmf-dist/tex/latex/kvoptions/kvoptions.sty" 1591545468 22520 c4c2dab203104295e1e618be7e5c0f5b ""
|
||||
"/usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdfmode.def" 1591545468 25742 5de23a2d2bc67a3139433e702e64a437 ""
|
||||
"/usr/share/texmf-dist/tex/latex/latexconfig/epstopdf-sys.cfg" 1591545468 678 4792914a8f45be57bb98413425e4c7af ""
|
||||
"/usr/share/texmf-dist/tex/latex/listings/listings.cfg" 1591545468 1830 e31effa752c61538383451ae21332364 ""
|
||||
@ -115,6 +121,6 @@
|
||||
"/var/lib/texmf/web2c/pdftex/pdflatex.fmt" 1599837703 2514050 ecf9fe402c479fca46412778ddf38de8 ""
|
||||
(generated)
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.log"
|
||||
|
@ -63,6 +63,16 @@ INPUT /usr/share/texmf-dist/tex/latex/listings/lstmisc.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/listings/lstmisc.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/listings/listings.cfg
|
||||
INPUT /usr/share/texmf-dist/tex/latex/listings/listings.cfg
|
||||
INPUT /usr/local/share/texmf/tex/latex/dirtytalk/dirtytalk.sty
|
||||
INPUT /usr/local/share/texmf/tex/latex/dirtytalk/dirtytalk.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/kvoptions/kvoptions.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/kvoptions/kvoptions.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/ltxcmds/ltxcmds.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/ltxcmds/ltxcmds.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/kvsetkeys/kvsetkeys.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/kvsetkeys/kvsetkeys.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/base/ifthen.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/base/ifthen.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdfmode.def
|
||||
INPUT /usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdfmode.def
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux
|
||||
@ -167,6 +177,8 @@ INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Auth
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_2.png
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_2.png
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_2.png
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Verschlüsselungsverfahren.tex
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Verschlüsselungsverfahren.tex
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux
|
||||
INPUT /usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc
|
||||
INPUT /usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc
|
||||
|
@ -1,4 +1,4 @@
|
||||
This is pdfTeX, Version 3.14159265-2.6-1.40.21 (TeX Live 2020/Arch Linux) (preloaded format=pdflatex 2020.9.11) 13 SEP 2020 00:39
|
||||
This is pdfTeX, Version 3.14159265-2.6-1.40.21 (TeX Live 2020/Arch Linux) (preloaded format=pdflatex 2020.9.11) 13 SEP 2020 12:06
|
||||
entering extended mode
|
||||
restricted \write18 enabled.
|
||||
file:line:error style messages enabled.
|
||||
@ -183,25 +183,37 @@ File: lstmisc.sty 2020/03/24 1.8d (Carsten Heinz)
|
||||
File: listings.cfg 2020/03/24 1.8d listings configuration
|
||||
))
|
||||
Package: listings 2020/03/24 1.8d (Carsten Heinz)
|
||||
(/usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdfmode.def
|
||||
(/usr/local/share/texmf/tex/latex/dirtytalk/dirtytalk.sty
|
||||
Package: dirtytalk 2010/11/21 A package making "quoting" easier
|
||||
(/usr/share/texmf-dist/tex/latex/kvoptions/kvoptions.sty
|
||||
Package: kvoptions 2019/11/29 v3.13 Key value format for package options (HO)
|
||||
(/usr/share/texmf-dist/tex/generic/ltxcmds/ltxcmds.sty
|
||||
Package: ltxcmds 2019/12/15 v1.24 LaTeX kernel commands for general use (HO)
|
||||
) (/usr/share/texmf-dist/tex/generic/kvsetkeys/kvsetkeys.sty
|
||||
Package: kvsetkeys 2019/12/15 v1.18 Key value parser (HO)
|
||||
)) (/usr/share/texmf-dist/tex/latex/base/ifthen.sty
|
||||
Package: ifthen 2014/09/29 v1.1c Standard LaTeX ifthen package (DPC)
|
||||
)
|
||||
\c@dirtytalk@qdepth=\count267
|
||||
) (/usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdfmode.def
|
||||
File: l3backend-pdfmode.def 2020-06-03 L3 backend support: PDF mode
|
||||
\l__kernel_color_stack_int=\count267
|
||||
\l__kernel_color_stack_int=\count268
|
||||
\l__pdf_internal_box=\box49
|
||||
) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux)
|
||||
LaTeX Font Info: Checking defaults for OML/cmm/m/it on input line 27.
|
||||
LaTeX Font Info: ... okay on input line 27.
|
||||
LaTeX Font Info: Checking defaults for OMS/cmsy/m/n on input line 27.
|
||||
LaTeX Font Info: ... okay on input line 27.
|
||||
LaTeX Font Info: Checking defaults for OT1/cmr/m/n on input line 27.
|
||||
LaTeX Font Info: ... okay on input line 27.
|
||||
LaTeX Font Info: Checking defaults for T1/cmr/m/n on input line 27.
|
||||
LaTeX Font Info: ... okay on input line 27.
|
||||
LaTeX Font Info: Checking defaults for TS1/cmr/m/n on input line 27.
|
||||
LaTeX Font Info: ... okay on input line 27.
|
||||
LaTeX Font Info: Checking defaults for OMX/cmex/m/n on input line 27.
|
||||
LaTeX Font Info: ... okay on input line 27.
|
||||
LaTeX Font Info: Checking defaults for U/cmr/m/n on input line 27.
|
||||
LaTeX Font Info: ... okay on input line 27.
|
||||
LaTeX Font Info: Checking defaults for OML/cmm/m/it on input line 35.
|
||||
LaTeX Font Info: ... okay on input line 35.
|
||||
LaTeX Font Info: Checking defaults for OMS/cmsy/m/n on input line 35.
|
||||
LaTeX Font Info: ... okay on input line 35.
|
||||
LaTeX Font Info: Checking defaults for OT1/cmr/m/n on input line 35.
|
||||
LaTeX Font Info: ... okay on input line 35.
|
||||
LaTeX Font Info: Checking defaults for T1/cmr/m/n on input line 35.
|
||||
LaTeX Font Info: ... okay on input line 35.
|
||||
LaTeX Font Info: Checking defaults for TS1/cmr/m/n on input line 35.
|
||||
LaTeX Font Info: ... okay on input line 35.
|
||||
LaTeX Font Info: Checking defaults for OMX/cmex/m/n on input line 35.
|
||||
LaTeX Font Info: ... okay on input line 35.
|
||||
LaTeX Font Info: Checking defaults for U/cmr/m/n on input line 35.
|
||||
LaTeX Font Info: ... okay on input line 35.
|
||||
|
||||
*geometry* driver: auto-detecting
|
||||
*geometry* detected driver: pdftex
|
||||
@ -239,16 +251,16 @@ LaTeX Font Info: ... okay on input line 27.
|
||||
|
||||
(/usr/share/texmf-dist/tex/context/base/mkii/supp-pdf.mkii
|
||||
[Loading MPS to PDF converter (version 2006.09.02).]
|
||||
\scratchcounter=\count268
|
||||
\scratchcounter=\count269
|
||||
\scratchdimen=\dimen159
|
||||
\scratchbox=\box50
|
||||
\nofMPsegments=\count269
|
||||
\nofMParguments=\count270
|
||||
\nofMPsegments=\count270
|
||||
\nofMParguments=\count271
|
||||
\everyMPshowfont=\toks25
|
||||
\MPscratchCnt=\count271
|
||||
\MPscratchCnt=\count272
|
||||
\MPscratchDim=\dimen160
|
||||
\MPnumerator=\count272
|
||||
\makeMPintoPDFobject=\count273
|
||||
\MPnumerator=\count273
|
||||
\makeMPintoPDFobject=\count274
|
||||
\everyMPtoPDFconversion=\toks26
|
||||
) (/usr/share/texmf-dist/tex/latex/epstopdf-pkg/epstopdf-base.sty
|
||||
Package: epstopdf-base 2020-01-24 v2.11 Base part for package epstopdf
|
||||
@ -256,28 +268,28 @@ Package epstopdf-base Info: Redefining graphics rule for `.eps' on input line 48
|
||||
(/usr/share/texmf-dist/tex/latex/latexconfig/epstopdf-sys.cfg
|
||||
File: epstopdf-sys.cfg 2010/07/13 v1.3 Configuration of (r)epstopdf for TeX Live
|
||||
))
|
||||
\c@lstlisting=\count274
|
||||
LaTeX Font Info: Trying to load font information for U+msa on input line 30.
|
||||
\c@lstlisting=\count275
|
||||
LaTeX Font Info: Trying to load font information for U+msa on input line 38.
|
||||
(/usr/share/texmf-dist/tex/latex/amsfonts/umsa.fd
|
||||
File: umsa.fd 2013/01/14 v3.01 AMS symbols A
|
||||
)
|
||||
LaTeX Font Info: Trying to load font information for U+msb on input line 30.
|
||||
LaTeX Font Info: Trying to load font information for U+msb on input line 38.
|
||||
(/usr/share/texmf-dist/tex/latex/amsfonts/umsb.fd
|
||||
File: umsb.fd 2013/01/14 v3.01 AMS symbols B
|
||||
)
|
||||
LaTeX Font Info: Trying to load font information for U+rsfs on input line 30.
|
||||
LaTeX Font Info: Trying to load font information for U+rsfs on input line 38.
|
||||
(/usr/share/texmf-dist/tex/latex/jknapltx/ursfs.fd
|
||||
File: ursfs.fd 1998/03/24 rsfs font definition file (jk)
|
||||
) [1
|
||||
|
||||
|
||||
{/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map}] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc)
|
||||
\tf@toc=\write3
|
||||
[1
|
||||
{/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map}] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc [1
|
||||
|
||||
] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex
|
||||
])
|
||||
\tf@toc=\write3
|
||||
[2] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex
|
||||
Kapitel 1.
|
||||
<./images/Skytale.png, id=17, 614.6965pt x 351.3125pt>
|
||||
<./images/Skytale.png, id=20, 614.6965pt x 351.3125pt>
|
||||
File: ./images/Skytale.png Graphic file (type png)
|
||||
<use ./images/Skytale.png>
|
||||
Package pdftex.def Info: ./images/Skytale.png used on input line 6.
|
||||
@ -287,10 +299,10 @@ Underfull \hbox (badness 10000) in paragraph at lines 11--12
|
||||
|
||||
[]
|
||||
|
||||
[2
|
||||
[3
|
||||
|
||||
</home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Skytale.png>]
|
||||
<./images/Vignère-Verfahren.png, id=28, 444.41896pt x 257.5138pt>
|
||||
<./images/Vignère-Verfahren.png, id=31, 444.41896pt x 257.5138pt>
|
||||
File: ./images/Vignère-Verfahren.png Graphic file (type png)
|
||||
<use ./images/Vignère-Verfahren.png>
|
||||
Package pdftex.def Info: ./images/Vignère-Verfahren.png used on input line 50.
|
||||
@ -300,41 +312,41 @@ Underfull \hbox (badness 10000) in paragraph at lines 47--51
|
||||
|
||||
[]
|
||||
|
||||
[3 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Vignère-Verfahren.png (PNG copy)>]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex [4]
|
||||
[4 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Vignère-Verfahren.png (PNG copy)>]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex [5]
|
||||
Kapitel 2.
|
||||
[5
|
||||
[6
|
||||
|
||||
] [6]
|
||||
] [7]
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 108--109
|
||||
|
||||
[]
|
||||
|
||||
[7]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex [8]
|
||||
[8]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex [9]
|
||||
Kapitel 3.
|
||||
<./images/Abhörung.png, id=56, 158.66173pt x 78.08482pt>
|
||||
<./images/Abhörung.png, id=59, 158.66173pt x 78.08482pt>
|
||||
File: ./images/Abhörung.png Graphic file (type png)
|
||||
<use ./images/Abhörung.png>
|
||||
Package pdftex.def Info: ./images/Abhörung.png used on input line 6.
|
||||
(pdftex.def) Requested size: 158.66132pt x 78.08463pt.
|
||||
<./images/Übertragungsmanipulation.png, id=57, 160.3231pt x 72.27pt>
|
||||
<./images/Übertragungsmanipulation.png, id=60, 160.3231pt x 72.27pt>
|
||||
File: ./images/Übertragungsmanipulation.png Graphic file (type png)
|
||||
<use ./images/Übertragungsmanipulation.png>
|
||||
Package pdftex.def Info: ./images/Übertragungsmanipulation.png used on input line 23.
|
||||
(pdftex.def) Requested size: 160.3227pt x 72.2698pt.
|
||||
[9
|
||||
[10
|
||||
|
||||
</home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Abhörung.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Übertragungsmanipulation.png (PNG copy)>]
|
||||
<./images/Authenzitätsstörung_0.png, id=62, 156.16966pt x 61.47104pt>
|
||||
<./images/Authenzitätsstörung_0.png, id=65, 156.16966pt x 61.47104pt>
|
||||
File: ./images/Authenzitätsstörung_0.png Graphic file (type png)
|
||||
<use ./images/Authenzitätsstörung_0.png>
|
||||
Package pdftex.def Info: ./images/Authenzitätsstörung_0.png used on input line 30.
|
||||
(pdftex.def) Requested size: 156.16927pt x 61.47087pt.
|
||||
<./images/Authenzitätsstörung_1.png, id=63, 147.03207pt x 62.30173pt>
|
||||
<./images/Authenzitätsstörung_1.png, id=66, 147.03207pt x 62.30173pt>
|
||||
File: ./images/Authenzitätsstörung_1.png Graphic file (type png)
|
||||
<use ./images/Authenzitätsstörung_1.png>
|
||||
Package pdftex.def Info: ./images/Authenzitätsstörung_1.png used on input line 31.
|
||||
(pdftex.def) Requested size: 147.03171pt x 62.30157pt.
|
||||
<./images/Authenzitätsstörung_2.png, id=64, 153.67758pt x 72.27pt>
|
||||
<./images/Authenzitätsstörung_2.png, id=67, 153.67758pt x 72.27pt>
|
||||
File: ./images/Authenzitätsstörung_2.png Graphic file (type png)
|
||||
<use ./images/Authenzitätsstörung_2.png>
|
||||
Package pdftex.def Info: ./images/Authenzitätsstörung_2.png used on input line 32.
|
||||
@ -344,20 +356,44 @@ Overfull \hbox (23.6558pt too wide) in paragraph at lines 37--38
|
||||
[]\T1/cmr/m/n/10.95 es wird ein zwei-ter Kom-mu-ni-ka-ti-ons-weg für die Au-then-ti-fi-ka-ti-on ver-wen-det (2-Factor-Authentification)
|
||||
[]
|
||||
|
||||
[10 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_0.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_1.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_2.png (PNG copy)>]) [11] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux) )
|
||||
[11 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_0.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_1.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_2.png (PNG copy)>]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Verschlüsselungsverfahren.tex [12]
|
||||
Kapitel 4.
|
||||
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 3--4
|
||||
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 5--6
|
||||
|
||||
[]
|
||||
|
||||
[13
|
||||
|
||||
]
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 50--53
|
||||
|
||||
[]
|
||||
|
||||
|
||||
Overfull \hbox (30.70032pt too wide) in paragraph at lines 69--70
|
||||
[]\T1/cmr/m/n/10.95 Es soll kei-nen An-griff auf die Klar-text-nach-richt $\OML/cmm/m/it/10.95 m$ \T1/cmr/m/n/10.95 ge-ben, der durch-schnitt-lich we-ni-ger als $[] [][]\OML/cmm/m/it/10.95 ; [][]$
|
||||
[]
|
||||
|
||||
[14]) [15] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux) )
|
||||
Here is how much of TeX's memory you used:
|
||||
5343 strings out of 480478
|
||||
73319 string characters out of 5905959
|
||||
342791 words of memory out of 5000000
|
||||
21273 multiletter control sequences out of 15000+600000
|
||||
5753 strings out of 480478
|
||||
79873 string characters out of 5905959
|
||||
350732 words of memory out of 5000000
|
||||
21661 multiletter control sequences out of 15000+600000
|
||||
553344 words of font info for 81 fonts, out of 8000000 for 9000
|
||||
1141 hyphenation exceptions out of 8191
|
||||
30i,9n,37p,353b,217s stack positions out of 5000i,500n,10000p,200000b,80000s
|
||||
30i,9n,37p,377b,255s stack positions out of 5000i,500n,10000p,200000b,80000s
|
||||
{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc}{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmex10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msbm10.pfb></usr/share/texmf-dist/fonts/type1/public/rsfs/rsfs10.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1200.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1440.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2074.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2488.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1200.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1728.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfti1095.pfb>
|
||||
Output written on "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" (12 pages, 2271338 bytes).
|
||||
Output written on "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" (16 pages, 2289929 bytes).
|
||||
PDF statistics:
|
||||
140 PDF objects out of 1000 (max. 8388607)
|
||||
96 compressed objects within 1 object stream
|
||||
154 PDF objects out of 1000 (max. 8388607)
|
||||
105 compressed objects within 2 object streams
|
||||
0 named destinations out of 1000 (max. 500000)
|
||||
36 words of extra memory for PDF output out of 10000 (max. 10000000)
|
||||
|
||||
|
Binary file not shown.
Binary file not shown.
@ -18,6 +18,14 @@
|
||||
%for code highlighting
|
||||
\usepackage{xcolor}
|
||||
\usepackage{listings}
|
||||
%quotation
|
||||
\usepackage[%
|
||||
left = \glqq,%
|
||||
right = \grqq,%
|
||||
leftsub = \glq,%
|
||||
rightsub = \grq%
|
||||
]{dirtytalk}
|
||||
|
||||
|
||||
%opening
|
||||
\title{Zusammenfassung DC}
|
||||
@ -40,4 +48,6 @@
|
||||
|
||||
\input{chapters/IT-Sicherheit.tex}
|
||||
|
||||
\input{chapters/Verschlüsselungsverfahren.tex}
|
||||
|
||||
\end{document}
|
||||
|
@ -1,52 +1,67 @@
|
||||
\babel@toc {ngerman}{}
|
||||
\contentsline {chapter}{\numberline {1}Substitionsverfahren}{2}%
|
||||
\contentsline {section}{\numberline {1.1}Skytale}{2}%
|
||||
\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{2}%
|
||||
\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{3}%
|
||||
\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{3}%
|
||||
\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{3}%
|
||||
\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{3}%
|
||||
\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{3}%
|
||||
\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{4}%
|
||||
\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{4}%
|
||||
\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{4}%
|
||||
\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{4}%
|
||||
\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{4}%
|
||||
\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{4}%
|
||||
\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{4}%
|
||||
\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{5}%
|
||||
\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{5}%
|
||||
\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{5}%
|
||||
\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{5}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{5}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{5}%
|
||||
\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{6}%
|
||||
\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{6}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{6}%
|
||||
\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{6}%
|
||||
\contentsline {subsection}{\numberline {2.2.5}Matrizen}{6}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{6}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{6}%
|
||||
\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{6}%
|
||||
\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{7}%
|
||||
\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{7}%
|
||||
\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{7}%
|
||||
\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{8}%
|
||||
\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{8}%
|
||||
\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{9}%
|
||||
\contentsline {section}{\numberline {3.1}Vertraulichkeit}{9}%
|
||||
\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{9}%
|
||||
\contentsline {section}{\numberline {3.2}Integrität}{9}%
|
||||
\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{10}%
|
||||
\contentsline {section}{\numberline {3.3}Authenzität der Daten}{10}%
|
||||
\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{10}%
|
||||
\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{10}%
|
||||
\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{10}%
|
||||
\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{10}%
|
||||
\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{10}%
|
||||
\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{11}%
|
||||
\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{11}%
|
||||
\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{11}%
|
||||
\contentsline {section}{\numberline {3.7}Verfügbarkeit}{11}%
|
||||
\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{11}%
|
||||
\contentsline {section}{\numberline {3.8}Anonymität}{11}%
|
||||
\contentsline {chapter}{\numberline {1}Substitionsverfahren}{3}%
|
||||
\contentsline {section}{\numberline {1.1}Skytale}{3}%
|
||||
\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{3}%
|
||||
\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{4}%
|
||||
\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{4}%
|
||||
\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{4}%
|
||||
\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{4}%
|
||||
\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{4}%
|
||||
\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{5}%
|
||||
\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{5}%
|
||||
\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{5}%
|
||||
\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{5}%
|
||||
\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{5}%
|
||||
\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{5}%
|
||||
\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{5}%
|
||||
\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{6}%
|
||||
\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{6}%
|
||||
\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{6}%
|
||||
\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{6}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{6}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{6}%
|
||||
\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{7}%
|
||||
\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{7}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{7}%
|
||||
\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{7}%
|
||||
\contentsline {subsection}{\numberline {2.2.5}Matrizen}{7}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{7}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{7}%
|
||||
\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{7}%
|
||||
\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{8}%
|
||||
\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{8}%
|
||||
\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{8}%
|
||||
\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{9}%
|
||||
\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{9}%
|
||||
\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{10}%
|
||||
\contentsline {section}{\numberline {3.1}Vertraulichkeit}{10}%
|
||||
\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{10}%
|
||||
\contentsline {section}{\numberline {3.2}Integrität}{10}%
|
||||
\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{11}%
|
||||
\contentsline {section}{\numberline {3.3}Authenzität der Daten}{11}%
|
||||
\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{11}%
|
||||
\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{11}%
|
||||
\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{11}%
|
||||
\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{11}%
|
||||
\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{11}%
|
||||
\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{12}%
|
||||
\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{12}%
|
||||
\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{12}%
|
||||
\contentsline {section}{\numberline {3.7}Verfügbarkeit}{12}%
|
||||
\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{12}%
|
||||
\contentsline {section}{\numberline {3.8}Anonymität}{12}%
|
||||
\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{13}%
|
||||
\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{13}%
|
||||
\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{13}%
|
||||
\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{13}%
|
||||
\contentsline {section}{\numberline {4.4}Angriffsszenarien}{14}%
|
||||
\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{14}%
|
||||
\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{14}%
|
||||
\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{14}%
|
||||
\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{14}%
|
||||
\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{14}%
|
||||
\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{14}%
|
||||
\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{14}%
|
||||
\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{15}%
|
||||
\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{15}%
|
||||
\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{15}%
|
||||
|
92
chapters/Verschlüsselungsverfahren.tex
Normal file
92
chapters/Verschlüsselungsverfahren.tex
Normal file
@ -0,0 +1,92 @@
|
||||
\chapter{Verschlüsselungsverfahren}
|
||||
\section{Das Kerckhoffs'sche Prinzip}\label{kerckhoff}
|
||||
\say{Ein Verschlüsselungssystem darf nicht der Geheimhaltung bedürfen und soll ohne Schaden in Feindeshand fallen können.}\\
|
||||
|
||||
\noindent Folglich ist für die Entschlüsselung der Nachricht nicht die Kenntnis über das Verfahren, sondern der Schlüssel die relevante Information.\\
|
||||
|
||||
\noindent\say{Es soll nicht möglich sein, einen Geheimtext ohne Kenntnis des hierfür vorgesehenen Schlüssels \textbf{effizient} zu entschlüsseln.}
|
||||
|
||||
\section{Mathematische Modelierung von Verschlüsselungsverfahren}
|
||||
Klartextnachrichten und Geheimtextnachrichten sind Elemente einer Menge $\mathscr{M}$.\\
|
||||
Schlüssel sind Elemente eines Menge $\mathscr{K}$, die als Schlüsselraum bezeichnet wird.\\
|
||||
Die Verschlüsselungsverfahren bestehen aus einem Paar von Funktionen zur Verschlüsselung ($E$) und Entschlüsselung ($D$):
|
||||
$$E:\mathscr{K}\times\mathscr{M}\rightarrow\mathscr{M}$$
|
||||
$$D:\mathscr{K}\times\mathscr{M}\rightarrow\mathscr{M}$$
|
||||
Hierbei sind die definierten Abbildungen bijektiv ($D_k:=E_k^{-1}$):
|
||||
$$E_k:\mathscr{M}\rightarrow\mathscr{M},\space E_k(m):=E(k,m)$$
|
||||
$$D_k:\mathscr{M}\rightarrow\mathscr{M},\space D_k(m):=D(k,m)$$
|
||||
Die Nachrichtenmenge $\mathscr{M}$ besteht in Realität aus einer endlichen Folgen (Tupeln) von Bit- oder Bytewerten.
|
||||
Diese können entweder die gleiche Länge besitzen (Blockverschlüsselung) oder von beliebiger Länge sein (Stromverschlüsselung).
|
||||
$$\mathscr{M} = \mathscr{L}^n = \{(z_1,z_2,...,z_n)\mid z_i\in\mathscr{L}\} \text{ für ein festes } n\in \mathbb{N} \text{ (Blockverschlüsselung)}$$
|
||||
$$\mathscr{M} = \mathscr{L}^{>0} = \bigcup_{n\in\mathbb{N}} \mathscr{L}^n = \{(z_1,z_2,...,z_n)\mid z_i\in\mathscr{L}, n\in\mathbb{N}\} \text{ (Stromverschlüsselung)}$$
|
||||
|
||||
\section{Schlüsselaustausch}
|
||||
Um mithilfe eines symmetrischen Schlüssels Daten austauschen zu können muss der Schlüssel auf eine Sichere Art und Weise ausgetauscht werden.
|
||||
Dies ist zwar offline möglich, stellt allerdings kein praktikables Verfahren für die Kommunikation im Internet dar.
|
||||
Daher werden für einen sicheren Schlüsselaustausch über eine unsichere Infrastruktur asymmetrische Verschlüsselungsverfahren benötigt.
|
||||
|
||||
\section{Angriffsszenarien}
|
||||
Da für eine effiziente Entschlüsselung einer Geheimtextnachrichten die Kenntnis des Schlüssels essentiell ist versuchen die meisten Angriffe diesen herauszufinden.
|
||||
|
||||
\subsection{Ciphertext-only Angriffe}
|
||||
\begin{tabbing}
|
||||
Vorraussetzung: \= ein oder mehrere Geheimtexte $c_i=E_k(m_i)$ bekannt\\
|
||||
Angriffsziel: \> Bestimmung von $m$ oder von $k$
|
||||
\end{tabbing}
|
||||
|
||||
\subsection{Known-plaintext Angriffe}\label{known-plaintext}
|
||||
\begin{tabbing}
|
||||
Vorraussetzung: \= Geheimtext $c=E_k(m)$ und eine Reihe von bekannten Paaren $(m_i,E_k(m_i))$ sind bekannt\\
|
||||
Angriffsziel: \> Bestimmung von $m$ oder von $k$
|
||||
\end{tabbing}
|
||||
|
||||
\subsection{Chosen-plaintext Angriffe}\label{chosen-plaintext}
|
||||
\begin{tabbing}
|
||||
Vorraussetzung: \= Geheimtext $c=E_k(m)$ und für eine Reihe von beliebig vorgegebenen Klartextnachrichten $m_i$ kann die zugehörige Geheimtextnachricht $c_i=E_k(m_i)$ errechnet werden\\
|
||||
Angriffsziel: \> Bestimmung von $m$ oder von $k$
|
||||
\end{tabbing}
|
||||
|
||||
\section{Brute-Force Angriffe}
|
||||
Da die Vorraussetzung für ein gutes Verschlüsselungsverfahren ist, dass es nicht \textbf{effizient} entschlüsselt werden kann (siehe \ref{kerckhoff}) muss die \textbf{Effizienz} definiert sein.
|
||||
An dieser Stelle setzen Brute-Force Angriffe an.
|
||||
Sie versuchen wie der Name schon sagt mit roher Rechenleistung den Schlüssel zu ermitteln.\\
|
||||
\subsection{Beispiel: Brute-Force Angriff auf $k$}
|
||||
Unter der Annahme, dass ein known-plaintext Angriff (siehe \ref{known-plaintext}) vorliegt lässt sich der Schlüssel bestimmen,
|
||||
indem alle möglichen Schlüssel $k$ des Schlüsselraums $\mathscr{K}$ \say{ausprobiert} werden.
|
||||
Hierbei können für die einzelnen bekannten Klartextnachrichten mehrere Schlüssel passen:
|
||||
$$\mathscr{K}_i := \{\tilde{k}\in \mathscr{K} \mid E_{\tilde{k}}(m_i)=c_i\}$$
|
||||
Bei einer ausreichenden Menge bekannter Klartextnachrichten lässt sich der Schlüssel aus der Schnittmenge der möglichen Schlüssel bestimmen:
|
||||
$$\bigcap_{i=1}^N \mathscr{K}_i=\{k\}$$
|
||||
|
||||
\subsection{Beispiel: Brute-Force Angriff auf $m$}
|
||||
Liegen die Vorraussetzungen für einen chosen-plaintext Angriff vor, so kann die Klartextnachrichten herausgefunden werden,
|
||||
indem alle möglichen Klartextnachrichten $\tilde{m}\in\mathscr{M}$ \say{ausprobiert} werden:
|
||||
$$E_k(\tilde{m}) = c = E_k(m) \Longrightarrow \tilde{m}=m$$
|
||||
|
||||
\subsection{Anforderungen zum Schutz vor Brute-Force}
|
||||
\begin{enumerate}
|
||||
\item Es soll keinen Angriff auf den Schlüssel $k$ geben, der durchschnittlich weniger als $\frac{|\mathscr{K}|}{2}$ Ver- oder Entschlüsselungsoperationen braucht.
|
||||
\item Es soll keinen Angriff auf die Klartextnachricht $m$ geben, der durchschnittlich weniger als $\min \big\{\frac{|\mathscr{K}|}{2}, \frac{|\mathscr{M}|}{2} \big\}$ Ver- oder Entschlüsselungsoperationen braucht.
|
||||
\end{enumerate}
|
||||
|
||||
\section{Wörterbuchangriffe}
|
||||
Nachrichtenpaare (Geheim- und Klarttext), die mithilfe eines Schlüssels $k$ verschlüsselt wurden können in einem Wörterbuch abgespeichert werden.
|
||||
Mithilfe des Wörterbuchs können diese Paare jederzeit entschlüsselt werden.
|
||||
Zudem kann für einen chosen-plaintext Angriff (siehe \ref{chosen-plaintext}) ein Wörterbuch mit häufig vorkommenden Wörtern erstellt werden,
|
||||
sodass eine Entschlüsselung in wesentlich kürzerer Zeit möglich wird.
|
||||
|
||||
\subsection{Schutz vor Wörterbuchangriffen}
|
||||
Um einem Wörterbuchangriff vorzubeugen ist es wichtig, dass sich der Geheimtext bei jeder Verschlüsselung des gleichen Klartextes unterscheidet.
|
||||
Dies wird meist dadurch erreicht, dass die Klartextnachricht vor Anwendung des Verschlüsselungsverfahrens abgeändert wird.
|
||||
Meist wird hierfür eine Nonce (Number used Once) verwendet.
|
||||
Die Nonce kann ein Zähler, ein Zeitstempel oder eine Zufallszahl sein.
|
||||
Der Nonce-Wert muss beiden Seiten bekannt sein.
|
||||
Hierbei kann er entweder mitverschlüsselt übertragen werden oder besteht aus einem Wert (z.B. Zähler), der beiden Seiten bekannt ist.
|
||||
|
||||
\subsubsection{Nonce-Verschlüsselung}
|
||||
Ein Nonce-Wert $v\in\mathscr{M}$ wird dazu genutzt die Klartextnachricht $m\in\mathscr{M}$ abzuändern:
|
||||
$$\tilde{m}=m+v$$
|
||||
Anschließend wird die veränderte Nachricht verschlüsselt:
|
||||
$$c = E_k(\tilde{m})$$
|
||||
Für die Entschlüsselung wird der Schlüssel $k$ und der Nonce-Wert $v$ benötigt:
|
||||
$$m=D_k(c)+v$$
|
Loading…
x
Reference in New Issue
Block a user