DC_Zusammenfassung/Zusammenfassung_DC.aux
2020-09-18 19:26:43 +02:00

154 lines
14 KiB
TeX

\relax
\@nameuse{bbl@beforestart}
\catcode `"\active
\babel@aux{ngerman}{}
\@writefile{toc}{\contentsline {chapter}{\numberline {1}Substitionsverfahren}{4}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {1.1}Skytale}{4}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{4}\protected@file@percent }
\newlabel{monoalphabet}{{1.2}{4}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{5}\protected@file@percent }
\newlabel{häufigkeit}{{1.2.2}{5}}
\@writefile{toc}{\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{6}\protected@file@percent }
\newlabel{otp}{{1.3.2}{6}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{7}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{7}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{7}\protected@file@percent }
\newlabel{Der Ring Z}{{2.2}{7}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{7}\protected@file@percent }
\newlabel{modulare_addition}{{2.2.1}{7}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{7}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{7}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.5}Matrizen}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{9}\protected@file@percent }
\newlabel{euklid}{{2.3.1}{9}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{9}\protected@file@percent }
\newlabel{erweiterter Euklid}{{2.3.2}{9}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{9}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{10}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{10}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{11}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {3.1}Vertraulichkeit}{11}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{11}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.2}Integrität}{11}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.3}Authenzität der Daten}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{12}\protected@file@percent }
\newlabel{signature}{{3.3.1}{12}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{13}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{13}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{13}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.7}Verfügbarkeit}{13}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{13}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.8}Anonymität}{13}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{14}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{14}\protected@file@percent }
\newlabel{kerckhoff}{{4.1}{14}}
\@writefile{toc}{\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{14}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{14}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.4}Angriffsszenarien}{15}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{15}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{15}\protected@file@percent }
\newlabel{known-plaintext}{{4.4.2}{15}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{15}\protected@file@percent }
\newlabel{chosen-plaintext}{{4.4.3}{15}}
\@writefile{toc}{\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{15}\protected@file@percent }
\newlabel{brute-force}{{4.5}{15}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{15}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{15}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{15}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{16}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{16}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{16}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{17}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{17}\protected@file@percent }
\newlabel{synchrone Stromverschlüsselung}{{5.1}{17}}
\@writefile{toc}{\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{18}\protected@file@percent }
\newlabel{zustandsabhängige Stromverschlüsselung}{{5.2}{18}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{19}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{19}\protected@file@percent }
\newlabel{synchron additive Stromverschlüsselung}{{5.2.1.1}{19}}
\@writefile{toc}{\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{20}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{20}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.5}ChaCha20}{21}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{22}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{23}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\newlabel{Blockverschlüsselungsverfahren}{{6}{23}}
\@writefile{toc}{\contentsline {section}{\numberline {6.1}Padding-Verfahren}{23}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.2}Betriebsmodi}{23}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{23}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{24}\protected@file@percent }
\newlabel{CBC}{{6.2.2}{24}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{25}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{25}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{26}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{26}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{26}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{26}\protected@file@percent }
\newlabel{OFB}{{6.2.5}{26}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{27}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{27}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{27}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{28}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.4}DES}{28}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{28}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{29}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{30}\protected@file@percent }
\newlabel{aes}{{6.6}{30}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.6.1}AES-128}{30}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {7}Hashfunktionen}{32}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\newlabel{Hashfunktionen}{{7}{32}}
\@writefile{toc}{\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{32}\protected@file@percent }
\newlabel{schwache Kollisionsfreiheit}{{7.1}{32}}
\@writefile{toc}{\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{32}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{34}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{34}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {8}MAC-Verfahren}{36}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {8.1}HMAC}{36}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {8.2}CMAC, CBC-MAC}{36}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {8.2.1}CMAC}{36}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {8.2.2}CBC-MAC}{37}\protected@file@percent }