finished presentation
This commit is contained in:
parent
9a3c67e159
commit
5bba263afc
BIN
presentation.pdf
BIN
presentation.pdf
Binary file not shown.
|
@ -154,7 +154,6 @@ showstringspaces=false %
|
|||
\end{frame}
|
||||
|
||||
\section{Substitutions-Chiffren}
|
||||
https://www.cryptool.org/en/cto-ciphers/caesar
|
||||
\subsection{Cäsar Chiffre}
|
||||
\begin{frame}{Cäsar Chiffre}
|
||||
\begin{itemize}
|
||||
|
@ -456,6 +455,66 @@ $\rightarrow$ Gleiche Buchstaben werden nicht immer gleich verschlüsselt
|
|||
\end{itemize}
|
||||
\end{frame}
|
||||
|
||||
\section{Enigma}
|
||||
\begin{frame}{Enigma}
|
||||
\begin{itemize}
|
||||
\item Von den Deutschen im 2.~Weltkrieg zur Verschlüsselung verwendet
|
||||
\item Von den Alliierten gebrochen (ohne Wissen der Deutschen)
|
||||
\end{itemize}
|
||||
\begin{center}
|
||||
\includegraphics[scale=0.2]{images/enigma.jpg}
|
||||
\end{center}
|
||||
\end{frame}
|
||||
|
||||
\begin{frame}{Enigma Funktionsweise}
|
||||
\begin{itemize}
|
||||
\item Grundlage: Substitutionschiffre
|
||||
\begin{center}
|
||||
\includegraphics[scale=0.2]{images/enigma-substitution.png}
|
||||
\end{center}
|
||||
\item Rotoren ändern die Substitution nach jedem Buchstaben
|
||||
\begin{center}
|
||||
\includegraphics[scale=0.2]{images/enigma-rotation.png}
|
||||
\hspace{0.0cm}
|
||||
\includegraphics[scale=0.296]{images/enigma-rotor.jpg}
|
||||
\end{center}
|
||||
\item Anfangsposition der Rotoren entspricht dem Schlüssel
|
||||
\begin{center}
|
||||
\includegraphics[scale=0.3]{images/enigma-alphabet-ring.jpg}
|
||||
\end{center}
|
||||
\end{itemize}
|
||||
\end{frame}
|
||||
|
||||
\begin{frame}{Enigma Funktionsweise}
|
||||
\begin{itemize}
|
||||
\item Aus den Anfangspositionen der Rotoren erhält man $$26 \cdot 26 \cdot 26 = 17\ 576$$ mögliche Verschlüsselungen für einen Buchstaben
|
||||
\item Es gibt mehrere mögliche Rotoren (numeriert mit \texttt{I} bis \texttt{VII}) von denen $3$ Stück (in beliebiger Reihenfolge) ausgewählt werden
|
||||
$$\rightarrow 8 \cdot 7 \cdot 6 = 336\text{ Möglichkeiten}$$
|
||||
Insgesamt: $17\ 576 \cdot 336 = 5\ 905\ 536$ Möglichkeiten
|
||||
\end{itemize}
|
||||
\end{frame}
|
||||
|
||||
\begin{frame}{Enigma: Innerer Aufbau}
|
||||
\begin{center}
|
||||
\includegraphics[scale=0.45]{images/enigma-circuit.png}
|
||||
\end{center}
|
||||
\end{frame}
|
||||
|
||||
\begin{frame}{Enigma: Steckerbrett}
|
||||
\begin{center}
|
||||
\includegraphics[width=5cm,height=4cm]{images/enigma-plugboard.jpg}
|
||||
\hspace{0cm}
|
||||
\includegraphics[scale=0.3]{images/enigma-plugboard-circuit.png}
|
||||
\end{center}
|
||||
$\rightarrow$ bis zu $158\ 962\ 555\ 217\ 826\ 360\ 000$ Möglichkeiten
|
||||
\end{frame}
|
||||
|
||||
\begin{frame}
|
||||
Use implementation py-enigma\\
|
||||
crib attack\\
|
||||
Brute force without plug board
|
||||
\end{frame}
|
||||
|
||||
\begin{frame}
|
||||
More topics
|
||||
\begin{itemize}
|
||||
|
@ -463,20 +522,15 @@ More topics
|
|||
\item known plaintext attack
|
||||
\item key reuse attack (for one-time-pad)
|
||||
\end{itemize}
|
||||
https://www.cryptool.org/en/cto-ciphers/caesar
|
||||
\end{frame}
|
||||
|
||||
\section{Enigma}
|
||||
\begin{frame}
|
||||
Use implementation py-enigma\\
|
||||
crib attack\\
|
||||
Brute force without plug board
|
||||
\end{frame}
|
||||
|
||||
\section{Public-key Cryptography}
|
||||
\begin{frame}{RSA}
|
||||
content...
|
||||
\end{frame}
|
||||
%\section{Public-key Cryptography}
|
||||
%\begin{frame}{RSA}
|
||||
% content...
|
||||
%\end{frame}
|
||||
|
||||
\section{Some more puzzles}
|
||||
Undeciphered historical codes and ciphers $\rightarrow$ Wikipedia
|
||||
%\section{Some more puzzles}
|
||||
%Undeciphered historical codes and ciphers $\rightarrow$ Wikipedia
|
||||
\end{document}
|
||||
|
|
Loading…
Reference in New Issue
Block a user