Changeset 8146


Ignore:
Timestamp:
Jun 3, 2019, 8:45:50 AM (3 years ago)
Author:
Christian Bender
Message:

DCAPathFinder: correction of formulations

Location:
trunk/CrypPluginsExperimental/DCAPathFinder/Properties
Files:
3 edited

Legend:

Unmodified
Added
Removed
  • trunk/CrypPluginsExperimental/DCAPathFinder/Properties/Resources.Designer.cs

    r8145 r8146  
    206206       
    207207        /// <summary>
    208         ///   Sucht eine lokalisierte Zeichenfolge, die At this point we apply the idea of differential cryptanalysis to cipher 1. The structure of a cipher is usually public, so that all components and their functionality are known. The security of a cipher should never be based on the secrecy of the construction, but on the secrecy of the key. This requirement is also called Kerckhoff&apos;s principle. ähnelt.
     208        ///   Sucht eine lokalisierte Zeichenfolge, die At this point we apply the idea of differential cryptanalysis to cipher 1. The structure of a cipher is usually public, so that all components and their functionality are known. The security of a cipher should never be based on the secrecy of the construction, but on the secrecy of the key. This requirement is also called Kerckhoffs&apos; principle. ähnelt.
    209209        /// </summary>
    210210        internal static string DifferentialCryptanalysisSlide1Content1 {
     
    296296       
    297297        /// <summary>
    298         ///   Sucht eine lokalisierte Zeichenfolge, die The cryptanalyst knows the parameters m and c, but the internal intermediate values u and v are unknown, since k0 and k1 are unknown. However, the cryptanalyst knows the difference of the internal values. In the following, we will look at two messages m1 and m2 and perform the encryption process partially: ähnelt.
     298        ///   Sucht eine lokalisierte Zeichenfolge, die The cryptanalyst knows the parameters m and c, but the internal intermediate values u and v are unknown, since k0 and k1 are unknown. However, these values cannot be compared directly with the internal values u1 and u2, as these are unknown. In the following, we will look at two messages m1 and m2 and perform the encryption process partially: ähnelt.
    299299        /// </summary>
    300300        internal static string DifferentialCryptanalysisSlide9Content1 {
  • trunk/CrypPluginsExperimental/DCAPathFinder/Properties/Resources.de.resx

    r8145 r8146  
    203203  </data>
    204204  <data name="DifferentialCryptanalysisSlide9Content3" xml:space="preserve">
    205     <value>berechnen durch Differenzbildung von m1 und m2. Als nächstes kann k1 geraten werden und die Werte von v1 und v2 berechnet werden, denn die Funktionsweise der SBox ist öffentlich und damit auch invertierbar. Dadurch kann der Kryptoanalyst</value>
     205    <value>berechnen durch Differenzbildung von m1 und m2. Als Nächstes kann k1 geraten und die Werte von v1 und v2 berechnet werden, denn die Funktionsweise der SBox ist öffentlich und damit auch invertierbar. Dadurch kann der Kryptoanalyst</value>
    206206  </data>
    207207  <data name="DifferentialCryptanalysisSlide9Content4" xml:space="preserve">
  • trunk/CrypPluginsExperimental/DCAPathFinder/Properties/Resources.resx

    r8145 r8146  
    167167  </data>
    168168  <data name="DifferentialCryptanalysisSlide1Content1" xml:space="preserve">
    169     <value>At this point we apply the idea of differential cryptanalysis to cipher 1. The structure of a cipher is usually public, so that all components and their functionality are known. The security of a cipher should never be based on the secrecy of the construction, but on the secrecy of the key. This requirement is also called Kerckhoff's principle.</value>
     169    <value>At this point we apply the idea of differential cryptanalysis to cipher 1. The structure of a cipher is usually public, so that all components and their functionality are known. The security of a cipher should never be based on the secrecy of the construction, but on the secrecy of the key. This requirement is also called Kerckhoffs' principle.</value>
    170170  </data>
    171171  <data name="DifferentialCryptanalysisSlide1Content2" xml:space="preserve">
     
    197197  </data>
    198198  <data name="DifferentialCryptanalysisSlide9Content1" xml:space="preserve">
    199     <value>The cryptanalyst knows the parameters m and c, but the internal intermediate values u and v are unknown, since k0 and k1 are unknown. However, the cryptanalyst knows the difference of the internal values. In the following, we will look at two messages m1 and m2 and perform the encryption process partially:</value>
     199    <value>The cryptanalyst knows the parameters m and c, but the internal intermediate values u and v are unknown, since k0 and k1 are unknown. However, these values cannot be compared directly with the internal values u1 and u2, as these are unknown. In the following, we will look at two messages m1 and m2 and perform the encryption process partially:</value>
    200200  </data>
    201201  <data name="DifferentialCryptanalysisSlide9Content2" xml:space="preserve">
Note: See TracChangeset for help on using the changeset viewer.