CrypTool August 2010 Dipl.-Inform. Matthäus Wander

Slides:



Advertisements
Similar presentations
10/22/20101 Westar Formula Rate and your bill. 10/22/20102 What we will be going over Transferring the results from the Westar Formula Rate to the SPP.
Advertisements

Castellana Grotte 12 aprile Alternating training in Italy Dott. Ruggiero Francavilla Dirigente Ufficio III – USR Puglia.
20/5/20101N. Lugaresi C. Cortesi 1°E Liceo scientifico A. Oriani Ravenna Designing leaves for a warmer, crowded world From New Scientist, 05 May 2010.
Information Security of Embedded Systems : Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
What is the End-Goal? Interoperability? Integration? Connectivity?
Summary Overview of Vireo Student Submission of ETDs
AID FOR TRADE JOHN S. WILSON THE WORLD BANK JOHN S. WILSON THE WORLD BANK NEW YORK JULY 15, 2010 NEW YORK JULY 15, 2010.
1/10/20101 WHY Parents have you ever heard WHY Used in scriptures almost countless times Maybe as Christians we should ask WHY Why am I here? What.
INTEGRAL1ADDRESS Workshop, Paris 09 June 2010 INTEGRAL: Integrated ICT Platform for Distributed Control in Electricity Grids Hans Akkermans INTEGRAL Project.
Enterprise Social Networking Tool Comparison October 2010.
25 Novembre 2010 Safe Maintenance through design From machine engineering for safe maintenance to maintenance engineering for safe machine Workshop Maintenance.
16/04/20101 EPEC Private Sector Forum EPECs activities in 2010 Nicholas Jennett Head of EPEC Private Sector Forum 2 June 2010.
LIFE external communications team AEIDL 1 LIFE+ communication Presentation at LIFE+ Kick-off meeting.
Open Days 2010 D. Gubbels Professionalization within the range of volunteer work New challenges for volunteering organizations - Ehrenamt professionalisieren!
ISO/IEC Toolbox for Conformity Assessment
Access to research data: action is needed but what action.
Evaluating Sight Translation: A Corpus-based Approach
Shibboleth Development and Support Services SAML Protected Resources The theory and practice of granularity and management data Ed Dee EDINA.
From reform to managing change
ATS – SS10 – Florian Oeser Agenda Was ist XNA? Warum XNA? XNA + Windows Phone Phone Marketplace Samples & Demo Links Q & A
Under the Hood of Polymorphism CS-2303, C-Term Under the Hood of Polymorphism CS-2303 System Programming Concepts (Slides include materials from.
NJJN JUNE Fulfilling the Promise of Juvenile Justice by Engaging Crime Victims & Survivors and Those Who Serve Them Presented by: ANNE SEYMOUR
DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.
® Microsoft Office 2010 Excel Tutorial 3: Working with Formulas and Functions.
William M. Pottenger, Ph.D., Paul B. Kantor, Ph. D. Kashyap Kolipaka, Shenzhi Li and Nir Grinberg Rutgers University 10/16/20101.
HOW MEDIA CONSUMPTION HAS CHANGED SINCE 2000 News is pervasive, portable, personalized, participatory – and a social experience Lee Rainie Director – Pew.
1 Whats Up: P2P news recommender Anne-Marie Kermarrec Joint work with Antoine Boutet, Davide Frey (INRIA) and Rachid Guerraoui (EPFL) Gossple workshop.
An Analysis of the P2P Traffic Characteristics on File Transfers Between Prefectures and Between Autonomous Systems in the Winny Network Nov. 1,
® Microsoft Office 2010 Managing Your Files. XP Objectives Develop file management strategies Explore files, folders, and libraries Create, name, copy,
August 4, The following PEIMS reporting changes have been made to the PEIMS Collection in order to collect the Classroom Link information.
FELABAN Annual Meeting BAFT-IFSA and FELABAN: BUILDING GLOBAL BRIDGES FOR THE BANKING INDUSTRY Punta del Este, Uruguay November 10, 2010.
Linked Lists in C and C++ CS-2303, C-Term Linked Lists in C and C++ CS-2303 System Programming Concepts (Slides include materials from The C Programming.
What does CAESAR II do? 9/15/2010. Session overview Taking the task from piping design to piping engineering. What questions does CAESAR II answer? A.
A useful testing technique and more…
Hash Tables and Constant Access Time CS-2303, C-Term Hash Tables and Constant Access Time CS-2303 System Programming Concepts (Slides include materials.
Multichannel publishing of statistics (electronic publications and database) - Finnish experience Seminar on dissemination of statistics and launching.
State of Kansas INF43 & INF44 – Process & Error Correction Statewide Management, Accounting and Reporting Tool This Desk Aid instructs users on the INF43.
Tutorial 5: Working with Excel Tables, PivotTables, and PivotCharts
Tutorial 1 Creating a Database
ACOT Intro/Copyright Succeeding in Business with Microsoft Excel 2010: Chapter1.
Anonymizing User Location and Profile Information for Privacy-aware Mobile Services Masanori Mano, Yoshiharu Ishikawa Nagoya University 11/2/
Kaunas UAB NUOSTABIOJI TECHNOLOGIJA Production presentation Made by: Tautvydas Andziulevičius.
Muntaha Gharaibeh RN PhD Associate Professor and Dean of Nursing Director of WHOCC for Human Resource Development in Nursing Faculty of Nursing Jordan.
® Microsoft Office 2010 Excel Tutorial 1: Getting Started with Excel.
Memory Segmentation of Intel 8086
Alcohol and your heart Beth A. Kalicki Heli J. Roy, RD, PhD Pennington Biomedical Research Center.
® Microsoft Office 2010 Integrating Word, Excel and Access.
® Microsoft Office 2010 Integrating Word, Excel, Access, and PowerPoint.
July WELCOME Please take a few moments to review our services.
January Rx-360 Overview and Structure January
A N INVESTIGATION OF A PERIODIC STRUCTURE TO SUPPRESS THE TRANSMISSION OF ENERGY IN AN ELASTIC TUBE, AND EXPERIMENTAL 6 DOF TECHNIQUES TO DETECT IT Ole.
© Wiley Chapter 1 - Introduction to Operations Management Operations Management by R. Dan Reid & Nada R. Sanders 4th Edition © Wiley 2010.
Citizen Participation & Empowerment Chapter 12 Fall
Beyond the super-rich and the super-geeks: Smart homes for the rest of us Ratul Mahajan Microsoft Research HomeNets 2010.
User Working Group Yannis Ioannidis University of Athens, Greece DL.org All Working Groups Meeting, Rome, May 2010.
The Digital Library Reference Model: Functionality Domain Carlo Meghini CNR-ISTI DL.org Autumn School, Athens, 3-8 October 2010.
2010 User Fee Study RESULTS ORIENTATION 2010 User Fee Study RESULTS ORIENTATION Presentation to the Coronado City Council by: Chad Wohlford, MPPA June.
Collaboration Works! 10/20/20101 Planning Research Institutional Effectiveness.
Quick Training Guide New SpringerLink, August 2010.
© we spell.... © we spell... T-E-A-M; longstanding experience, plenty of projects for global players and local business heroes plus the.
Chapter 13 – Aggregate Planning
[Networking Hardwares] [Maninder Kaur]
Tutorial 8 Sharing, Integrating, and Analyzing Data
Progress with the 3T Demonstrator Proposal A.Marchioro CERN April 2010.
Erik Amerikaner Oak Park High School Oak Park, California
Business Continuity Planning and IT Disaster Recovery.
DELVACCA Presents: Non-disclosure Agreements Don’t Get Stung March 11, 2010 Doug Raymond, Drinker Biddle & Reath LLP David J. Anderson, Kulicke & Soffa.
Beyond Structural Markup - Practical Approaches to Semantic Markup - San Francisco, May 20 th 2010 Marc Haines Senior Architect, Ictect Inc. Semantic Technologies.
Web Site ( Getting around the Web Site to Build and Use COIN-OR.
ДАРБИ КАРИЕРНа ориентация
Presentation transcript:

CrypTool 2.0 10. August 2010 Dipl.-Inform. Matthäus Wander 30/03/2017 CrypTool 2.0 10. August 2010 Dipl.-Inform. Matthäus Wander Universität Duisburg-Essen Verteilte Systeme

Kryptographisches Toolkit 30/03/2017 Kryptographisches Toolkit -Sammlung von verschiedenen Tools und Algorithmen der Kryptographie -Editor als zentraler Arbeitsbereich Plugins in den Editor ziehen und zusammen verbinden Programmketten erstellen und ausführen Matthäus Wander 10. August 2010

Visuelle Programmierung 30/03/2017 Visuelle Programmierung RSA -Visuelle Programmierumgebung -Beispiel RSA: Zusammenstecken elementarer mathematischer Operationen Matthäus Wander 10. August 2010

Visuelle Programmierung 30/03/2017 Visuelle Programmierung Diffie-Hellman-Schlüsselaustausch -Beispiel Diffie-Hellman-Schlüsselaustausch mit mathematischen Grundoperationen Matthäus Wander 10. August 2010

Visualisierung von Algorithmen 30/03/2017 Visualisierung von Algorithmen PRESENT -Komplexe Algorithmen sind als eigenständige Komponenten implementiert -Für einige ist eine Visualisierung der Arbeitsweise verfügbar -Beispiel PRESENT: symmetrischer Blockchiffre Matthäus Wander 10. August 2010

Kryptoanalyse Enigma Ciphertext-only Attack 30/03/2017 Kryptanalytische Tools, um die Angreifbarkeit zu demonstrieren Beispiel: Ciphertext-only-Angriff auf die Enigma (nach Gillogly 1995) CT2: Erste öffentliche Implementierung inkl. Sourcecode des Gillogly-Angriffs Matthäus Wander 10. August 2010

Kryptoanalyse (2) Brute-Force-KeySearcher 30/03/2017 -Beispiel: Brute-Force-Angriff auf symmetrische Blockchiffre -Zu jedem möglichen Schlüssel erfolgt ein Entschlüsselungsversuch sowie eine Bewertung per Kostenfunktion, ob der entschlüsselte Klartext einer natürlichen Sprache entspricht Matthäus Wander 10. August 2010

Kryptoanalyse (3) Primfaktorzerlegung mit dem Quadratischen Sieb 30/03/2017 Kryptoanalyse (3) Primfaktorzerlegung mit dem Quadratischen Sieb -Beispiel: Primfaktorzerlegung von großen Zahlen mit der Methode des Quadratischen Siebs -aufbauend auf der öffentlichen msieve-Bibliothek -schnellste bekannte Methode zur Primfaktorzerlegung von Zahlen bis etwa 100 Stellen Matthäus Wander 10. August 2010

Verteilte Kryptoanalyse 30/03/2017 Verteilte Kryptoanalyse Peer-to-Peer-verteilter Brute-Force-KeySearcher -Zur Zeit in Arbeit: verteilte Kryptoanalyse -Beispiel: verteilter Brute-Force-Angriff auf symmetrische Blockchiffre -Selbstorganisierende verteilte Berechnung mittels Peer-to-Peer-Techniken (ohne zentralen Server oder Koordinator) Matthäus Wander 10. August 2010

Verteilte Kryptoanalyse (2) 30/03/2017 Verteilte Kryptoanalyse (2) Peer-to-Peer-verteiltes Quadratisches Sieb -Beispiel: Peer-to-Peer-verteilte Primfaktorzerlegung -Rechts zu sehen: Netzwerkmonitor zur grafischen Darstellung des Peer-to-Peer-Netzwerks Matthäus Wander 10. August 2010

Eckdaten 58 KLOC .NET 4.0 Plugin-Architektur 30/03/2017 Eckdaten 58 KLOC Microsoft Code Metrics Logische Programmzeilen .NET 4.0 Plugin-Architektur Windows Presentation Foundation (WPF) 100 Beispielprojekte mitgeliefert -58 KLOC laut Visual Studio 2010 -Zählung von Programmanweisungen (ohne Leerzeilen und Kommentare) Zählung der reinen Textzeilen dürfte um Faktor 2-3 größer sein .NET 4.0 ermöglicht den Einsatz moderner Entwicklungswerkzeuge und –methoden Die Plugin-Architektur erlaubt die Implementierung von Algorithmen in CT2, ohne dass die Kernkomponenten betroffen sind (Entkopplung von Plugins und Kernkomponenten erleichtert die verteilte Entwicklung) WPF ermöglicht moderne Oberflächen und Visualisierungen. Vektorbasiertes Rendering von Grafiken und Animationen Matthäus Wander 10. August 2010

Organisation Projekt-Website Open Source Subversion Code Repository 30/03/2017 Organisation Projekt-Website http://cryptool2.vs.uni-due.de Download Nightly Build Open Source Apache-Lizenz Subversion Code Repository https://www.cryptool.org/svn/CrypTool2/ Lesezugriff: anonymous, kein Passwort Matthäus Wander 10. August 2010

Organisation (2) Trac Projektverwaltung Diskussionsgruppen 30/03/2017 Organisation (2) Trac Projektverwaltung https://www.cryptool.org/trac/CrypTool2/ Wiki Bugtracker Diskussionsgruppen Skype Chat Mailing-Liste https://www.cryptool.org/trac/CrypTool2/wiki/DiscussionGroups Aktuell ca. 15-20 aktive Entwickler Matthäus Wander 10. August 2010

Mitmachen? Visual Studio Express 2010 30/03/2017 Mitmachen? Visual Studio Express 2010 HowTo unter http://cryptool2.vs.uni-due.de/ Matthäus Wander 10. August 2010

30/03/2017 Mitmachen? (2) Matthäus Wander 10. August 2010