100 lines
2.9 KiB
TeX
100 lines
2.9 KiB
TeX
|
\documentclass[12pt,a4paper,german]{article}
|
|||
|
\usepackage{url}
|
|||
|
%\usepackage{graphics}
|
|||
|
\usepackage{times}
|
|||
|
\usepackage[T1]{fontenc}
|
|||
|
\usepackage{ngerman}
|
|||
|
\usepackage[latin1]{inputenc}
|
|||
|
\usepackage{geometry}
|
|||
|
\usepackage{amsfonts}
|
|||
|
\usepackage{amsmath}
|
|||
|
\usepackage{graphicx}
|
|||
|
\usepackage{epsfig}
|
|||
|
\usepackage{paralist}
|
|||
|
\geometry{left=2.0cm,textwidth=17cm,top=3.5cm,textheight=23cm}
|
|||
|
|
|||
|
%%%%%%%%%% Fill out the the definitions %%%%%%%%%
|
|||
|
\def \name {Valentin Brandl} %
|
|||
|
\def \matrikel {108018274494} %
|
|||
|
\def \gruppe {VB} %
|
|||
|
\def \uebung {1} %
|
|||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|||
|
|
|||
|
% DO NOT MODIFY THIS HEADER
|
|||
|
\newcommand{\hwsol}{
|
|||
|
\vspace*{-2cm}
|
|||
|
\noindent \matrikel \quad \name \hfill Gruppe:\gruppe \\
|
|||
|
% \noindent \pmatrikel \quad \pname \\
|
|||
|
\begin{center}{\Large \bf L\"osung f\"ur \"Ubung \# \uebung}\end{center}
|
|||
|
}
|
|||
|
|
|||
|
\begin{document}
|
|||
|
%Import header
|
|||
|
\hwsol
|
|||
|
|
|||
|
|
|||
|
\section*{Aufgabe 1}
|
|||
|
\begin{enumerate}[(a)]
|
|||
|
\item
|
|||
|
\begin{itemize}
|
|||
|
\item Algorithmen sollen offengelegt werden, nur Schl<68>ssel werden geheim gehalten
|
|||
|
\item Es ist schwer, einen Algorithmus geheim zu halten
|
|||
|
\item Prinzip def vielen Augen: ein <20>ffentlicher Algorithmus wird ggf. analysiert und Schwachstellen gefunden
|
|||
|
\end{itemize}
|
|||
|
\item
|
|||
|
\begin{itemize}
|
|||
|
\item Kryptographie: Entwerfen von Algorithmen und Protokollen
|
|||
|
\item Kryptoanalyse: Schwachstellen in existierenden Verfahren suchen
|
|||
|
\end{itemize}
|
|||
|
|
|||
|
\item
|
|||
|
\parbox{\linewidth}{\centering
|
|||
|
\includegraphics[width=\textwidth]{20181011_situation.png}
|
|||
|
}
|
|||
|
Ein Angreifer (Eve) kann die ausgetauschten Nachrichten mitlesen und ver<65>ndern
|
|||
|
\item
|
|||
|
\begin{itemize}
|
|||
|
\item Schl<68>ssel: $k$
|
|||
|
\item Verschl<68>sselung $e(\cdot)$
|
|||
|
\item Schl<68>sselraum $\#k = \vert k \vert$
|
|||
|
\item Chiffrat $y$
|
|||
|
\item Entschl<68>sselung $d(\cdot)$
|
|||
|
\item Klartext $x$
|
|||
|
\end{itemize}
|
|||
|
\end{enumerate}
|
|||
|
|
|||
|
\section*{Aufgabe 2}
|
|||
|
\begin{enumerate}[(a)]
|
|||
|
\item $2^{128}$. Mit $2^{10} \approx 10^3 \to 2^{130} \approx 10^{39}$
|
|||
|
|
|||
|
\item
|
|||
|
\begin{itemize}
|
|||
|
\item 80 Eur pro ASIC
|
|||
|
\item $10^6$ Eur Kapital
|
|||
|
\item $7 \cdot 10^8 \frac{k}{s}$ Leistung
|
|||
|
\end{itemize}
|
|||
|
\begin{eqnarray*}
|
|||
|
10^6 / 80 &=& 12500 \\
|
|||
|
7 \cdot 10^8 \cdot 12500 &=& 8.75 \cdot 10^{12} \frac{k}{s} \\
|
|||
|
\frac{2^{128}k}{8.75 \cdot 10^{12} \frac{k}{s}} &\approx{}& 3.89 \cdot 10^{25} s \\
|
|||
|
&\approx{}& 1.23 \cdot 10^{18} y
|
|||
|
\end{eqnarray*}
|
|||
|
|
|||
|
\item
|
|||
|
\begin{eqnarray*}
|
|||
|
24 h &=& 86400 s \\
|
|||
|
\frac{2^{128}}{x} &=& 86400 \\
|
|||
|
\frac{2^{128}}{86400} &=& x \\
|
|||
|
x &\approx{}& 3.94 \cdot 10^{33} \text{ gesuchte $\frac{k}{s}$} \\
|
|||
|
\frac{x}{12500} &\approx{}& 3.15 \cdot 10^{29} \text{ gesuchte $\frac{k}{s}$ pro ASIC} \\
|
|||
|
\\
|
|||
|
(7 \cdot 10^8) \cdot 2^n &\geq{}& 3.15 \cdot 10^{29} \\
|
|||
|
n &\geq{}& 68.6 \approx 69 \text{ (Leistung muss sich 69 mal verdoppeln)} \\
|
|||
|
69 * 18m &=& 1242m = 103.5 y
|
|||
|
\end{eqnarray*}
|
|||
|
In $103.5$ Jahren w<>re man in der Lage alle $2^{128}$ Schl<68>ssel innerhlab von 24h durch zu probieren.
|
|||
|
\end{enumerate}
|
|||
|
|
|||
|
\end{document}
|
|||
|
|