Changeset 8148


Ignore:
Timestamp:
Jun 3, 2019, 8:57:55 PM (3 years ago)
Author:
Christian Bender
Message:

DCAPathFinder: UI implementation of tutorial 1

Location:
trunk/CrypPluginsExperimental/DCAPathFinder
Files:
15 added
8 edited

Legend:

Unmodified
Added
Removed
  • trunk/CrypPluginsExperimental/DCAPathFinder/DCAPathFinder.cs

    r8145 r8148  
    134134            _activePresentation.Dispatcher.Invoke(DispatcherPriority.Send, (SendOrPostCallback)delegate
    135135            {
    136                 _activePresentation.StepCounter = 8;
     136                _activePresentation.StepCounter = 6;
    137137                _activePresentation.SetupView();
    138138            }, null);
  • trunk/CrypPluginsExperimental/DCAPathFinder/DCAPathFinder.csproj

    r8145 r8148  
    103103      <DependentUpon>DifferentialCryptanalysisSlide1.xaml</DependentUpon>
    104104    </Compile>
     105    <Compile Include="UI\Tutorial1\DifferentialCryptanalysisSlide10.xaml.cs">
     106      <DependentUpon>DifferentialCryptanalysisSlide10.xaml</DependentUpon>
     107    </Compile>
    105108    <Compile Include="UI\Tutorial1\DifferentialCryptanalysisSlide2.xaml.cs">
    106109      <DependentUpon>DifferentialCryptanalysisSlide2.xaml</DependentUpon>
     
    221224      <Generator>MSBuild:Compile</Generator>
    222225    </Page>
     226    <Page Include="UI\Tutorial1\DifferentialCryptanalysisSlide10.xaml">
     227      <SubType>Designer</SubType>
     228      <Generator>MSBuild:Compile</Generator>
     229    </Page>
    223230    <Page Include="UI\Tutorial1\DifferentialCryptanalysisSlide2.xaml">
    224231      <SubType>Designer</SubType>
     
    325332  <ItemGroup>
    326333    <Resource Include="Images\u1XORu2Eq.png" />
     334  </ItemGroup>
     335  <ItemGroup>
     336    <Resource Include="Images\k1restore.png" />
    327337  </ItemGroup>
    328338  <Import Project="$(MSBuildToolsPath)\Microsoft.CSharp.targets" />
  • trunk/CrypPluginsExperimental/DCAPathFinder/Properties/Resources.Designer.cs

    r8146 r8148  
    206206       
    207207        /// <summary>
     208        ///   Sucht eine lokalisierte Zeichenfolge, die The value of ähnelt.
     209        /// </summary>
     210        internal static string DifferentialCryptanalysisSlide10Content1 {
     211            get {
     212                return ResourceManager.GetString("DifferentialCryptanalysisSlide10Content1", resourceCulture);
     213            }
     214        }
     215       
     216        /// <summary>
     217        ///   Sucht eine lokalisierte Zeichenfolge, die is already known. The cryptoanalyst now tries all values t of k ähnelt.
     218        /// </summary>
     219        internal static string DifferentialCryptanalysisSlide10Content2Run1 {
     220            get {
     221                return ResourceManager.GetString("DifferentialCryptanalysisSlide10Content2Run1", resourceCulture);
     222            }
     223        }
     224       
     225        /// <summary>
     226        ///   Sucht eine lokalisierte Zeichenfolge, die 1 ähnelt.
     227        /// </summary>
     228        internal static string DifferentialCryptanalysisSlide10Content2Run2 {
     229            get {
     230                return ResourceManager.GetString("DifferentialCryptanalysisSlide10Content2Run2", resourceCulture);
     231            }
     232        }
     233       
     234        /// <summary>
     235        ///   Sucht eine lokalisierte Zeichenfolge, die and every time ähnelt.
     236        /// </summary>
     237        internal static string DifferentialCryptanalysisSlide10Content2Run3 {
     238            get {
     239                return ResourceManager.GetString("DifferentialCryptanalysisSlide10Content2Run3", resourceCulture);
     240            }
     241        }
     242       
     243        /// <summary>
     244        ///   Sucht eine lokalisierte Zeichenfolge, die is valid, t is noted as a candidate for k ähnelt.
     245        /// </summary>
     246        internal static string DifferentialCryptanalysisSlide10Content3Run1 {
     247            get {
     248                return ResourceManager.GetString("DifferentialCryptanalysisSlide10Content3Run1", resourceCulture);
     249            }
     250        }
     251       
     252        /// <summary>
     253        ///   Sucht eine lokalisierte Zeichenfolge, die 1 ähnelt.
     254        /// </summary>
     255        internal static string DifferentialCryptanalysisSlide10Content3Run2 {
     256            get {
     257                return ResourceManager.GetString("DifferentialCryptanalysisSlide10Content3Run2", resourceCulture);
     258            }
     259        }
     260       
     261        /// <summary>
     262        ///   Sucht eine lokalisierte Zeichenfolge, die . If more than one candidate remains at the end, the attack will be reshuffled with new pairs of plaintext and keytext. ähnelt.
     263        /// </summary>
     264        internal static string DifferentialCryptanalysisSlide10Content3Run3 {
     265            get {
     266                return ResourceManager.GetString("DifferentialCryptanalysisSlide10Content3Run3", resourceCulture);
     267            }
     268        }
     269       
     270        /// <summary>
     271        ///   Sucht eine lokalisierte Zeichenfolge, die By clicking the &quot;next-button&quot; again, differential cryptanalysis can be performed on cipher 1 in the &quot;Key Recovery&quot; component. ähnelt.
     272        /// </summary>
     273        internal static string DifferentialCryptanalysisSlide10Content4 {
     274            get {
     275                return ResourceManager.GetString("DifferentialCryptanalysisSlide10Content4", resourceCulture);
     276            }
     277        }
     278       
     279        /// <summary>
     280        ///   Sucht eine lokalisierte Zeichenfolge, die Differential cryptanalysis of cipher 1 ähnelt.
     281        /// </summary>
     282        internal static string DifferentialCryptanalysisSlide10Header {
     283            get {
     284                return ResourceManager.GetString("DifferentialCryptanalysisSlide10Header", resourceCulture);
     285            }
     286        }
     287       
     288        /// <summary>
    208289        ///   Sucht eine lokalisierte Zeichenfolge, die At this point we apply the idea of differential cryptanalysis to cipher 1. The structure of a cipher is usually public, so that all components and their functionality are known. The security of a cipher should never be based on the secrecy of the construction, but on the secrecy of the key. This requirement is also called Kerckhoffs&apos; principle. ähnelt.
    209290        /// </summary>
     
    215296       
    216297        /// <summary>
    217         ///   Sucht eine lokalisierte Zeichenfolge, die Cipher 1 consists of key addition and substitution. The structure can be viewed in the ToyCipher component. We now try to restore the two unknown round keys k0 and k1. To do this, we first look at the individual steps of the encryption. First a key addition to the input block is performed with k0. We get: ähnelt.
    218         /// </summary>
    219         internal static string DifferentialCryptanalysisSlide1Content2 {
    220             get {
    221                 return ResourceManager.GetString("DifferentialCryptanalysisSlide1Content2", resourceCulture);
     298        ///   Sucht eine lokalisierte Zeichenfolge, die Cipher 1 consists of key addition and substitution. The structure can be viewed in the ToyCipher component. We now try to restore the two unknown round keys k ähnelt.
     299        /// </summary>
     300        internal static string DifferentialCryptanalysisSlide1Content2Run1 {
     301            get {
     302                return ResourceManager.GetString("DifferentialCryptanalysisSlide1Content2Run1", resourceCulture);
     303            }
     304        }
     305       
     306        /// <summary>
     307        ///   Sucht eine lokalisierte Zeichenfolge, die 0 ähnelt.
     308        /// </summary>
     309        internal static string DifferentialCryptanalysisSlide1Content2Run2 {
     310            get {
     311                return ResourceManager.GetString("DifferentialCryptanalysisSlide1Content2Run2", resourceCulture);
     312            }
     313        }
     314       
     315        /// <summary>
     316        ///   Sucht eine lokalisierte Zeichenfolge, die and k ähnelt.
     317        /// </summary>
     318        internal static string DifferentialCryptanalysisSlide1Content2Run3 {
     319            get {
     320                return ResourceManager.GetString("DifferentialCryptanalysisSlide1Content2Run3", resourceCulture);
     321            }
     322        }
     323       
     324        /// <summary>
     325        ///   Sucht eine lokalisierte Zeichenfolge, die 1 ähnelt.
     326        /// </summary>
     327        internal static string DifferentialCryptanalysisSlide1Content2Run4 {
     328            get {
     329                return ResourceManager.GetString("DifferentialCryptanalysisSlide1Content2Run4", resourceCulture);
     330            }
     331        }
     332       
     333        /// <summary>
     334        ///   Sucht eine lokalisierte Zeichenfolge, die . To do this, we first look at the individual steps of the encryption. First a key addition to the input block is performed with k ähnelt.
     335        /// </summary>
     336        internal static string DifferentialCryptanalysisSlide1Content2Run5 {
     337            get {
     338                return ResourceManager.GetString("DifferentialCryptanalysisSlide1Content2Run5", resourceCulture);
     339            }
     340        }
     341       
     342        /// <summary>
     343        ///   Sucht eine lokalisierte Zeichenfolge, die 0 ähnelt.
     344        /// </summary>
     345        internal static string DifferentialCryptanalysisSlide1Content2Run6 {
     346            get {
     347                return ResourceManager.GetString("DifferentialCryptanalysisSlide1Content2Run6", resourceCulture);
     348            }
     349        }
     350       
     351        /// <summary>
     352        ///   Sucht eine lokalisierte Zeichenfolge, die . We get: ähnelt.
     353        /// </summary>
     354        internal static string DifferentialCryptanalysisSlide1Content2Run7 {
     355            get {
     356                return ResourceManager.GetString("DifferentialCryptanalysisSlide1Content2Run7", resourceCulture);
    222357            }
    223358        }
     
    242377       
    243378        /// <summary>
    244         ///   Sucht eine lokalisierte Zeichenfolge, die Finally, a key addition with k1 takes place again: ähnelt.
    245         /// </summary>
    246         internal static string DifferentialCryptanalysisSlide2Content1 {
    247             get {
    248                 return ResourceManager.GetString("DifferentialCryptanalysisSlide2Content1", resourceCulture);
     379        ///   Sucht eine lokalisierte Zeichenfolge, die Finally, a key addition with k ähnelt.
     380        /// </summary>
     381        internal static string DifferentialCryptanalysisSlide2Content1Run1 {
     382            get {
     383                return ResourceManager.GetString("DifferentialCryptanalysisSlide2Content1Run1", resourceCulture);
     384            }
     385        }
     386       
     387        /// <summary>
     388        ///   Sucht eine lokalisierte Zeichenfolge, die 1 ähnelt.
     389        /// </summary>
     390        internal static string DifferentialCryptanalysisSlide2Content1Run2 {
     391            get {
     392                return ResourceManager.GetString("DifferentialCryptanalysisSlide2Content1Run2", resourceCulture);
     393            }
     394        }
     395       
     396        /// <summary>
     397        ///   Sucht eine lokalisierte Zeichenfolge, die  takes place again: ähnelt.
     398        /// </summary>
     399        internal static string DifferentialCryptanalysisSlide2Content1Run3 {
     400            get {
     401                return ResourceManager.GetString("DifferentialCryptanalysisSlide2Content1Run3", resourceCulture);
    249402            }
    250403        }
     
    296449       
    297450        /// <summary>
    298         ///   Sucht eine lokalisierte Zeichenfolge, die The cryptanalyst knows the parameters m and c, but the internal intermediate values u and v are unknown, since k0 and k1 are unknown. However, these values cannot be compared directly with the internal values u1 and u2, as these are unknown. In the following, we will look at two messages m1 and m2 and perform the encryption process partially: ähnelt.
    299         /// </summary>
    300         internal static string DifferentialCryptanalysisSlide9Content1 {
    301             get {
    302                 return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content1", resourceCulture);
    303             }
    304         }
    305        
    306         /// <summary>
    307         ///   Sucht eine lokalisierte Zeichenfolge, die We can ähnelt.
    308         /// </summary>
    309         internal static string DifferentialCryptanalysisSlide9Content2 {
    310             get {
    311                 return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content2", resourceCulture);
    312             }
    313         }
    314        
    315         /// <summary>
    316         ///   Sucht eine lokalisierte Zeichenfolge, die calculated by difference formation of m1 and m2. Next you can guess k1 and calculate the values of v1 and v2, because the functionality of the SBox is public and therefore invertible. This allows the cryptoanalyst to ähnelt.
    317         /// </summary>
    318         internal static string DifferentialCryptanalysisSlide9Content3 {
    319             get {
    320                 return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content3", resourceCulture);
    321             }
    322         }
    323        
    324         /// <summary>
    325         ///   Sucht eine lokalisierte Zeichenfolge, die calculate. However, these values cannot be directly compared with the internal values u1 and u2, since these are unknown. ähnelt.
    326         /// </summary>
    327         internal static string DifferentialCryptanalysisSlide9Content4 {
    328             get {
    329                 return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content4", resourceCulture);
    330             }
    331         }
    332        
    333         /// <summary>
    334         ///   Sucht eine lokalisierte Zeichenfolge, die However, the cryptoanalyst knows that the following applies if the round key k1 is correct: ähnelt.
    335         /// </summary>
    336         internal static string DifferentialCryptanalysisSlide9Content5 {
    337             get {
    338                 return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content5", resourceCulture);
     451        ///   Sucht eine lokalisierte Zeichenfolge, die The cryptoanalyst knows the parameters m and c, but the internal intermediate values u and v are unknown, as k ähnelt.
     452        /// </summary>
     453        internal static string DifferentialCryptanalysisSlide9Content1Run1 {
     454            get {
     455                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content1Run1", resourceCulture);
     456            }
     457        }
     458       
     459        /// <summary>
     460        ///   Sucht eine lokalisierte Zeichenfolge, die 0 ähnelt.
     461        /// </summary>
     462        internal static string DifferentialCryptanalysisSlide9Content1Run2 {
     463            get {
     464                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content1Run2", resourceCulture);
     465            }
     466        }
     467       
     468        /// <summary>
     469        ///   Sucht eine lokalisierte Zeichenfolge, die and k ähnelt.
     470        /// </summary>
     471        internal static string DifferentialCryptanalysisSlide9Content1Run3 {
     472            get {
     473                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content1Run3", resourceCulture);
     474            }
     475        }
     476       
     477        /// <summary>
     478        ///   Sucht eine lokalisierte Zeichenfolge, die 1 ähnelt.
     479        /// </summary>
     480        internal static string DifferentialCryptanalysisSlide9Content1Run4 {
     481            get {
     482                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content1Run4", resourceCulture);
     483            }
     484        }
     485       
     486        /// <summary>
     487        ///   Sucht eine lokalisierte Zeichenfolge, die are unknown. However, the cryptanalyst knows the difference between the internal values. In the following we will look at two messages m ähnelt.
     488        /// </summary>
     489        internal static string DifferentialCryptanalysisSlide9Content1Run5 {
     490            get {
     491                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content1Run5", resourceCulture);
     492            }
     493        }
     494       
     495        /// <summary>
     496        ///   Sucht eine lokalisierte Zeichenfolge, die 1 ähnelt.
     497        /// </summary>
     498        internal static string DifferentialCryptanalysisSlide9Content1Run6 {
     499            get {
     500                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content1Run6", resourceCulture);
     501            }
     502        }
     503       
     504        /// <summary>
     505        ///   Sucht eine lokalisierte Zeichenfolge, die and m ähnelt.
     506        /// </summary>
     507        internal static string DifferentialCryptanalysisSlide9Content1Run7 {
     508            get {
     509                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content1Run7", resourceCulture);
     510            }
     511        }
     512       
     513        /// <summary>
     514        ///   Sucht eine lokalisierte Zeichenfolge, die 2 ähnelt.
     515        /// </summary>
     516        internal static string DifferentialCryptanalysisSlide9Content1Run8 {
     517            get {
     518                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content1Run8", resourceCulture);
     519            }
     520        }
     521       
     522        /// <summary>
     523        ///   Sucht eine lokalisierte Zeichenfolge, die and perform the encryption process partially: ähnelt.
     524        /// </summary>
     525        internal static string DifferentialCryptanalysisSlide9Content1Run9 {
     526            get {
     527                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content1Run9", resourceCulture);
     528            }
     529        }
     530       
     531        /// <summary>
     532        ///   Sucht eine lokalisierte Zeichenfolge, die This knowledge can be used to get k ähnelt.
     533        /// </summary>
     534        internal static string DifferentialCryptanalysisSlide9Content2Run1 {
     535            get {
     536                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content2Run1", resourceCulture);
     537            }
     538        }
     539       
     540        /// <summary>
     541        ///   Sucht eine lokalisierte Zeichenfolge, die 2 ähnelt.
     542        /// </summary>
     543        internal static string DifferentialCryptanalysisSlide9Content2Run10 {
     544            get {
     545                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content2Run10", resourceCulture);
     546            }
     547        }
     548       
     549        /// <summary>
     550        ///   Sucht eine lokalisierte Zeichenfolge, die ). We can calculate ähnelt.
     551        /// </summary>
     552        internal static string DifferentialCryptanalysisSlide9Content2Run11 {
     553            get {
     554                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content2Run11", resourceCulture);
     555            }
     556        }
     557       
     558        /// <summary>
     559        ///   Sucht eine lokalisierte Zeichenfolge, die 1 ähnelt.
     560        /// </summary>
     561        internal static string DifferentialCryptanalysisSlide9Content2Run2 {
     562            get {
     563                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content2Run2", resourceCulture);
     564            }
     565        }
     566       
     567        /// <summary>
     568        ///   Sucht eine lokalisierte Zeichenfolge, die . We consider two plaintext keytext pairs (m ähnelt.
     569        /// </summary>
     570        internal static string DifferentialCryptanalysisSlide9Content2Run3 {
     571            get {
     572                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content2Run3", resourceCulture);
     573            }
     574        }
     575       
     576        /// <summary>
     577        ///   Sucht eine lokalisierte Zeichenfolge, die 1 ähnelt.
     578        /// </summary>
     579        internal static string DifferentialCryptanalysisSlide9Content2Run4 {
     580            get {
     581                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content2Run4", resourceCulture);
     582            }
     583        }
     584       
     585        /// <summary>
     586        ///   Sucht eine lokalisierte Zeichenfolge, die , c ähnelt.
     587        /// </summary>
     588        internal static string DifferentialCryptanalysisSlide9Content2Run5 {
     589            get {
     590                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content2Run5", resourceCulture);
     591            }
     592        }
     593       
     594        /// <summary>
     595        ///   Sucht eine lokalisierte Zeichenfolge, die 1 ähnelt.
     596        /// </summary>
     597        internal static string DifferentialCryptanalysisSlide9Content2Run6 {
     598            get {
     599                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content2Run6", resourceCulture);
     600            }
     601        }
     602       
     603        /// <summary>
     604        ///   Sucht eine lokalisierte Zeichenfolge, die ) and (m ähnelt.
     605        /// </summary>
     606        internal static string DifferentialCryptanalysisSlide9Content2Run7 {
     607            get {
     608                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content2Run7", resourceCulture);
     609            }
     610        }
     611       
     612        /// <summary>
     613        ///   Sucht eine lokalisierte Zeichenfolge, die 2 ähnelt.
     614        /// </summary>
     615        internal static string DifferentialCryptanalysisSlide9Content2Run8 {
     616            get {
     617                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content2Run8", resourceCulture);
     618            }
     619        }
     620       
     621        /// <summary>
     622        ///   Sucht eine lokalisierte Zeichenfolge, die , c ähnelt.
     623        /// </summary>
     624        internal static string DifferentialCryptanalysisSlide9Content2Run9 {
     625            get {
     626                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content2Run9", resourceCulture);
     627            }
     628        }
     629       
     630        /// <summary>
     631        ///   Sucht eine lokalisierte Zeichenfolge, die by difference calculation of m ähnelt.
     632        /// </summary>
     633        internal static string DifferentialCryptanalysisSlide9Content3Run1 {
     634            get {
     635                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content3Run1", resourceCulture);
     636            }
     637        }
     638       
     639        /// <summary>
     640        ///   Sucht eine lokalisierte Zeichenfolge, die 2 ähnelt.
     641        /// </summary>
     642        internal static string DifferentialCryptanalysisSlide9Content3Run10 {
     643            get {
     644                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content3Run10", resourceCulture);
     645            }
     646        }
     647       
     648        /// <summary>
     649        ///   Sucht eine lokalisierte Zeichenfolge, die because the functionality of the SBox is public and therefore invertible. This allows the cryptoanalyst to calculate ähnelt.
     650        /// </summary>
     651        internal static string DifferentialCryptanalysisSlide9Content3Run11 {
     652            get {
     653                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content3Run11", resourceCulture);
     654            }
     655        }
     656       
     657        /// <summary>
     658        ///   Sucht eine lokalisierte Zeichenfolge, die 1 ähnelt.
     659        /// </summary>
     660        internal static string DifferentialCryptanalysisSlide9Content3Run2 {
     661            get {
     662                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content3Run2", resourceCulture);
     663            }
     664        }
     665       
     666        /// <summary>
     667        ///   Sucht eine lokalisierte Zeichenfolge, die and m ähnelt.
     668        /// </summary>
     669        internal static string DifferentialCryptanalysisSlide9Content3Run3 {
     670            get {
     671                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content3Run3", resourceCulture);
     672            }
     673        }
     674       
     675        /// <summary>
     676        ///   Sucht eine lokalisierte Zeichenfolge, die 2 ähnelt.
     677        /// </summary>
     678        internal static string DifferentialCryptanalysisSlide9Content3Run4 {
     679            get {
     680                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content3Run4", resourceCulture);
     681            }
     682        }
     683       
     684        /// <summary>
     685        ///   Sucht eine lokalisierte Zeichenfolge, die . Next step is k ähnelt.
     686        /// </summary>
     687        internal static string DifferentialCryptanalysisSlide9Content3Run5 {
     688            get {
     689                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content3Run5", resourceCulture);
     690            }
     691        }
     692       
     693        /// <summary>
     694        ///   Sucht eine lokalisierte Zeichenfolge, die 1 ähnelt.
     695        /// </summary>
     696        internal static string DifferentialCryptanalysisSlide9Content3Run6 {
     697            get {
     698                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content3Run6", resourceCulture);
     699            }
     700        }
     701       
     702        /// <summary>
     703        ///   Sucht eine lokalisierte Zeichenfolge, die and the values of v ähnelt.
     704        /// </summary>
     705        internal static string DifferentialCryptanalysisSlide9Content3Run7 {
     706            get {
     707                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content3Run7", resourceCulture);
     708            }
     709        }
     710       
     711        /// <summary>
     712        ///   Sucht eine lokalisierte Zeichenfolge, die 1 ähnelt.
     713        /// </summary>
     714        internal static string DifferentialCryptanalysisSlide9Content3Run8 {
     715            get {
     716                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content3Run8", resourceCulture);
     717            }
     718        }
     719       
     720        /// <summary>
     721        ///   Sucht eine lokalisierte Zeichenfolge, die and v ähnelt.
     722        /// </summary>
     723        internal static string DifferentialCryptanalysisSlide9Content3Run9 {
     724            get {
     725                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content3Run9", resourceCulture);
     726            }
     727        }
     728       
     729        /// <summary>
     730        ///   Sucht eine lokalisierte Zeichenfolge, die However, these values cannot be directly compared with the internal values u ähnelt.
     731        /// </summary>
     732        internal static string DifferentialCryptanalysisSlide9Content4Run1 {
     733            get {
     734                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content4Run1", resourceCulture);
     735            }
     736        }
     737       
     738        /// <summary>
     739        ///   Sucht eine lokalisierte Zeichenfolge, die 1 ähnelt.
     740        /// </summary>
     741        internal static string DifferentialCryptanalysisSlide9Content4Run2 {
     742            get {
     743                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content4Run2", resourceCulture);
     744            }
     745        }
     746       
     747        /// <summary>
     748        ///   Sucht eine lokalisierte Zeichenfolge, die and u ähnelt.
     749        /// </summary>
     750        internal static string DifferentialCryptanalysisSlide9Content4Run3 {
     751            get {
     752                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content4Run3", resourceCulture);
     753            }
     754        }
     755       
     756        /// <summary>
     757        ///   Sucht eine lokalisierte Zeichenfolge, die 2 ähnelt.
     758        /// </summary>
     759        internal static string DifferentialCryptanalysisSlide9Content4Run4 {
     760            get {
     761                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content4Run4", resourceCulture);
     762            }
     763        }
     764       
     765        /// <summary>
     766        ///   Sucht eine lokalisierte Zeichenfolge, die as these are unknown. ähnelt.
     767        /// </summary>
     768        internal static string DifferentialCryptanalysisSlide9Content4Run5 {
     769            get {
     770                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content4Run5", resourceCulture);
     771            }
     772        }
     773       
     774        /// <summary>
     775        ///   Sucht eine lokalisierte Zeichenfolge, die However, the cryptoanalyst knows that if the round key k ähnelt.
     776        /// </summary>
     777        internal static string DifferentialCryptanalysisSlide9Content5Run1 {
     778            get {
     779                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content5Run1", resourceCulture);
     780            }
     781        }
     782       
     783        /// <summary>
     784        ///   Sucht eine lokalisierte Zeichenfolge, die 1 ähnelt.
     785        /// </summary>
     786        internal static string DifferentialCryptanalysisSlide9Content5Run2 {
     787            get {
     788                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content5Run2", resourceCulture);
     789            }
     790        }
     791       
     792        /// <summary>
     793        ///   Sucht eine lokalisierte Zeichenfolge, die is valid, the following applies: ähnelt.
     794        /// </summary>
     795        internal static string DifferentialCryptanalysisSlide9Content5Run3 {
     796            get {
     797                return ResourceManager.GetString("DifferentialCryptanalysisSlide9Content5Run3", resourceCulture);
    339798            }
    340799        }
  • trunk/CrypPluginsExperimental/DCAPathFinder/Properties/Resources.de.resx

    r8146 r8148  
    166166    <value>2. Differenzielle Kryptoanalyse von Chiffre 1</value>
    167167  </data>
     168  <data name="DifferentialCryptanalysisSlide10Content1" xml:space="preserve">
     169    <value>Der Wert von</value>
     170  </data>
     171  <data name="DifferentialCryptanalysisSlide10Content2Run1" xml:space="preserve">
     172    <value>ist bereits bekannt. Der Kryptoanalyst probiert nun alle Werte t von k</value>
     173  </data>
     174  <data name="DifferentialCryptanalysisSlide10Content2Run2" xml:space="preserve">
     175    <value>1</value>
     176  </data>
     177  <data name="DifferentialCryptanalysisSlide10Content2Run3" xml:space="preserve">
     178    <value>durch und jedes mal wenn</value>
     179  </data>
     180  <data name="DifferentialCryptanalysisSlide10Content3Run1" xml:space="preserve">
     181    <value>gilt, wird t als Kandidat für k</value>
     182  </data>
     183  <data name="DifferentialCryptanalysisSlide10Content3Run2" xml:space="preserve">
     184    <value>1</value>
     185  </data>
     186  <data name="DifferentialCryptanalysisSlide10Content3Run3" xml:space="preserve">
     187    <value> notiert. Falls mehr als ein Kandidat am Ende übrig bleibt, wird der Angriff wiederholt mit neuen Paaren von Klartext und Schlüsseltext.</value>
     188  </data>
     189  <data name="DifferentialCryptanalysisSlide10Content4" xml:space="preserve">
     190    <value>Durch ein weiteres Klicken auf den "weiter-Button" kann die differenzielle Kryptoanalyse an Chiffre 1 in der Komponente "Schlüssel-Wiederherstellung" ausgeführt werden.</value>
     191  </data>
     192  <data name="DifferentialCryptanalysisSlide10Header" xml:space="preserve">
     193    <value>Differenzielle Kryptoanalyse von Chiffre 1</value>
     194  </data>
    168195  <data name="DifferentialCryptanalysisSlide1Content1" xml:space="preserve">
    169196    <value>An dieser Stelle wenden wir die Idee der differenziellen Kryptoanalyse auf Chiffre 1 an. Der Aufbau einer Chiffre ist in aller Regel öffentlich, sodass alle Bestandteile und deren Funktionsweise bekannt sind. Die Sicherheit einer Chiffre sollte niemals auf Geheimhaltung der Konstruktion basieren, sondern auf der Geheimhaltung des Schlüssels. Diese Forderung wird auch Kerckhoffs’ Prinzip genannt.</value>
    170197  </data>
    171   <data name="DifferentialCryptanalysisSlide1Content2" xml:space="preserve">
    172     <value>Chiffre 1 besteht aus Schlüsseladdition und Substitution. Der Aufbau kann in der ToyChiffre-Komponente betrachtet werden. Wir versuchen nun die zwei unbekannten Rundenschlüssel k0 und k1 wiederherzustellen. Dazu betrachten wir zunächst die einzelnen Schritte der Verschlüsselung. Zunächst wird eine Schlüsseladdition zum Eingabeblock durchgeführt mit k0. Wir erhalten:</value>
     198  <data name="DifferentialCryptanalysisSlide1Content2Run1" xml:space="preserve">
     199    <value>Chiffre 1 besteht aus Schlüsseladdition und Substitution. Der Aufbau kann in der ToyChiffre-Komponente betrachtet werden. Wir versuchen nun die zwei unbekannten Rundenschlüssel k</value>
     200  </data>
     201  <data name="DifferentialCryptanalysisSlide1Content2Run2" xml:space="preserve">
     202    <value>0</value>
     203  </data>
     204  <data name="DifferentialCryptanalysisSlide1Content2Run3" xml:space="preserve">
     205    <value>und k</value>
     206  </data>
     207  <data name="DifferentialCryptanalysisSlide1Content2Run4" xml:space="preserve">
     208    <value>1</value>
     209  </data>
     210  <data name="DifferentialCryptanalysisSlide1Content2Run5" xml:space="preserve">
     211    <value> wiederherzustellen. Dazu betrachten wir zunächst die einzelnen Schritte der Verschlüsselung. Zunächst wird eine Schlüsseladdition zum Eingabeblock durchgeführt mit k</value>
     212  </data>
     213  <data name="DifferentialCryptanalysisSlide1Content2Run6" xml:space="preserve">
     214    <value>0</value>
     215  </data>
     216  <data name="DifferentialCryptanalysisSlide1Content2Run7" xml:space="preserve">
     217    <value>. Wir erhalten:</value>
    173218  </data>
    174219  <data name="DifferentialCryptanalysisSlide1Content3" xml:space="preserve">
     
    178223    <value>Differenzielle Kryptoanalyse von Chiffre 1</value>
    179224  </data>
    180   <data name="DifferentialCryptanalysisSlide2Content1" xml:space="preserve">
    181     <value>Als Letztes erfolgt wieder eine Schlüsseladdition mit k1:</value>
     225  <data name="DifferentialCryptanalysisSlide2Content1Run1" xml:space="preserve">
     226    <value>Als Letztes erfolgt wieder eine Schlüsseladdition mit k</value>
     227  </data>
     228  <data name="DifferentialCryptanalysisSlide2Content1Run2" xml:space="preserve">
     229    <value>1</value>
     230  </data>
     231  <data name="DifferentialCryptanalysisSlide2Content1Run3" xml:space="preserve">
     232    <value>:</value>
    182233  </data>
    183234  <data name="DifferentialCryptanalysisSlide2Header" xml:space="preserve">
     
    196247    <value>Differenzielle Kryptoanalyse von Chiffre 1</value>
    197248  </data>
    198   <data name="DifferentialCryptanalysisSlide9Content1" xml:space="preserve">
    199     <value>Der Kryptoanalyst kennt die Parameter m und c, allerdings sind die internen Zwischenwerte u und v unbekannt, da k0 und k1 unbekannt sind. Allerdings kennt der Kryptoanalyst die Differenz der internen Werte. Wir betrachten im Folgenden zwei Nachrichten m1 und m2 und führen den Verschlüsselungsprozess partiell durch:</value>
    200   </data>
    201   <data name="DifferentialCryptanalysisSlide9Content2" xml:space="preserve">
    202     <value>Wir können</value>
    203   </data>
    204   <data name="DifferentialCryptanalysisSlide9Content3" xml:space="preserve">
    205     <value>berechnen durch Differenzbildung von m1 und m2. Als Nächstes kann k1 geraten und die Werte von v1 und v2 berechnet werden, denn die Funktionsweise der SBox ist öffentlich und damit auch invertierbar. Dadurch kann der Kryptoanalyst</value>
    206   </data>
    207   <data name="DifferentialCryptanalysisSlide9Content4" xml:space="preserve">
    208     <value>berechnen. Allerdings können diese Werte nicht direkt mit den internen Werten u1 und u2 verglichen werden, da diese unbekannt sind.</value>
    209   </data>
    210   <data name="DifferentialCryptanalysisSlide9Content5" xml:space="preserve">
    211     <value>Allerdings weiß der Kryptoanalyst, dass bei korrektem Rundenschlüssel k1 folgendes gilt:</value>
     249  <data name="DifferentialCryptanalysisSlide9Content1Run1" xml:space="preserve">
     250    <value>Der Kryptoanalyst kennt die Parameter m und c, allerdings sind die internen Zwischenwerte u und v unbekannt, da k</value>
     251  </data>
     252  <data name="DifferentialCryptanalysisSlide9Content1Run2" xml:space="preserve">
     253    <value>0</value>
     254  </data>
     255  <data name="DifferentialCryptanalysisSlide9Content1Run3" xml:space="preserve">
     256    <value>und k</value>
     257  </data>
     258  <data name="DifferentialCryptanalysisSlide9Content1Run4" xml:space="preserve">
     259    <value>1</value>
     260  </data>
     261  <data name="DifferentialCryptanalysisSlide9Content1Run5" xml:space="preserve">
     262    <value>unbekannt sind. Allerdings kennt der Kryptoanalyst die Differenz der internen Werte. Wir betrachten im Folgenden zwei Nachrichten m</value>
     263  </data>
     264  <data name="DifferentialCryptanalysisSlide9Content1Run6" xml:space="preserve">
     265    <value>1</value>
     266  </data>
     267  <data name="DifferentialCryptanalysisSlide9Content1Run7" xml:space="preserve">
     268    <value>und m</value>
     269  </data>
     270  <data name="DifferentialCryptanalysisSlide9Content1Run8" xml:space="preserve">
     271    <value>2</value>
     272  </data>
     273  <data name="DifferentialCryptanalysisSlide9Content1Run9" xml:space="preserve">
     274    <value>und führen den Verschlüsselungsprozess partiell durch:</value>
     275  </data>
     276  <data name="DifferentialCryptanalysisSlide9Content2Run1" xml:space="preserve">
     277    <value>Dieses Wissen kann verwendet werden, um k</value>
     278  </data>
     279  <data name="DifferentialCryptanalysisSlide9Content2Run10" xml:space="preserve">
     280    <value>2</value>
     281  </data>
     282  <data name="DifferentialCryptanalysisSlide9Content2Run11" xml:space="preserve">
     283    <value>). Wir können</value>
     284  </data>
     285  <data name="DifferentialCryptanalysisSlide9Content2Run2" xml:space="preserve">
     286    <value>1</value>
     287  </data>
     288  <data name="DifferentialCryptanalysisSlide9Content2Run3" xml:space="preserve">
     289    <value>zu erhalten. Wir betrachten zwei Klartext-Schlüsseltext-Paare (m</value>
     290  </data>
     291  <data name="DifferentialCryptanalysisSlide9Content2Run4" xml:space="preserve">
     292    <value>1</value>
     293  </data>
     294  <data name="DifferentialCryptanalysisSlide9Content2Run5" xml:space="preserve">
     295    <value>, c</value>
     296  </data>
     297  <data name="DifferentialCryptanalysisSlide9Content2Run6" xml:space="preserve">
     298    <value>1</value>
     299  </data>
     300  <data name="DifferentialCryptanalysisSlide9Content2Run7" xml:space="preserve">
     301    <value>) und (m</value>
     302  </data>
     303  <data name="DifferentialCryptanalysisSlide9Content2Run8" xml:space="preserve">
     304    <value>2</value>
     305  </data>
     306  <data name="DifferentialCryptanalysisSlide9Content2Run9" xml:space="preserve">
     307    <value>, c</value>
     308  </data>
     309  <data name="DifferentialCryptanalysisSlide9Content3Run1" xml:space="preserve">
     310    <value>berechnen durch Differenzbildung von m</value>
     311  </data>
     312  <data name="DifferentialCryptanalysisSlide9Content3Run10" xml:space="preserve">
     313    <value>2</value>
     314  </data>
     315  <data name="DifferentialCryptanalysisSlide9Content3Run11" xml:space="preserve">
     316    <value>berechnet werden, denn die Funktionsweise der SBox ist öffentlich und damit auch invertierbar. Dadurch kann der Kryptoanalyst</value>
     317  </data>
     318  <data name="DifferentialCryptanalysisSlide9Content3Run2" xml:space="preserve">
     319    <value>1</value>
     320  </data>
     321  <data name="DifferentialCryptanalysisSlide9Content3Run3" xml:space="preserve">
     322    <value>und m</value>
     323  </data>
     324  <data name="DifferentialCryptanalysisSlide9Content3Run4" xml:space="preserve">
     325    <value>2</value>
     326  </data>
     327  <data name="DifferentialCryptanalysisSlide9Content3Run5" xml:space="preserve">
     328    <value>. Als Nächstes kann k</value>
     329  </data>
     330  <data name="DifferentialCryptanalysisSlide9Content3Run6" xml:space="preserve">
     331    <value>1</value>
     332  </data>
     333  <data name="DifferentialCryptanalysisSlide9Content3Run7" xml:space="preserve">
     334    <value>geraten und die Werte von v</value>
     335  </data>
     336  <data name="DifferentialCryptanalysisSlide9Content3Run8" xml:space="preserve">
     337    <value>1</value>
     338  </data>
     339  <data name="DifferentialCryptanalysisSlide9Content3Run9" xml:space="preserve">
     340    <value>und v</value>
     341  </data>
     342  <data name="DifferentialCryptanalysisSlide9Content4Run1" xml:space="preserve">
     343    <value>berechnen. Allerdings können diese Werte nicht direkt mit den internen Werten u</value>
     344  </data>
     345  <data name="DifferentialCryptanalysisSlide9Content4Run2" xml:space="preserve">
     346    <value>1</value>
     347  </data>
     348  <data name="DifferentialCryptanalysisSlide9Content4Run3" xml:space="preserve">
     349    <value>und u</value>
     350  </data>
     351  <data name="DifferentialCryptanalysisSlide9Content4Run4" xml:space="preserve">
     352    <value>2</value>
     353  </data>
     354  <data name="DifferentialCryptanalysisSlide9Content4Run5" xml:space="preserve">
     355    <value>verglichen werden, da diese unbekannt sind.</value>
     356  </data>
     357  <data name="DifferentialCryptanalysisSlide9Content5Run1" xml:space="preserve">
     358    <value>Allerdings weiß der Kryptoanalyst, dass bei korrektem Rundenschlüssel k</value>
     359  </data>
     360  <data name="DifferentialCryptanalysisSlide9Content5Run2" xml:space="preserve">
     361    <value>1</value>
     362  </data>
     363  <data name="DifferentialCryptanalysisSlide9Content5Run3" xml:space="preserve">
     364    <value>folgendes gilt:</value>
    212365  </data>
    213366  <data name="DifferentialCryptanalysisSlide9Header" xml:space="preserve">
  • trunk/CrypPluginsExperimental/DCAPathFinder/Properties/Resources.resx

    r8146 r8148  
    166166    <value>2. Differential cryptanalysis of cipher 1</value>
    167167  </data>
     168  <data name="DifferentialCryptanalysisSlide10Content1" xml:space="preserve">
     169    <value>The value of</value>
     170  </data>
     171  <data name="DifferentialCryptanalysisSlide10Content2Run1" xml:space="preserve">
     172    <value>is already known. The cryptoanalyst now tries all values t of k</value>
     173  </data>
     174  <data name="DifferentialCryptanalysisSlide10Content2Run2" xml:space="preserve">
     175    <value>1</value>
     176  </data>
     177  <data name="DifferentialCryptanalysisSlide10Content2Run3" xml:space="preserve">
     178    <value>and every time</value>
     179  </data>
     180  <data name="DifferentialCryptanalysisSlide10Content3Run1" xml:space="preserve">
     181    <value>is valid, t is noted as a candidate for k</value>
     182  </data>
     183  <data name="DifferentialCryptanalysisSlide10Content3Run2" xml:space="preserve">
     184    <value>1</value>
     185  </data>
     186  <data name="DifferentialCryptanalysisSlide10Content3Run3" xml:space="preserve">
     187    <value>. If more than one candidate remains at the end, the attack will be reshuffled with new pairs of plaintext and keytext.</value>
     188  </data>
     189  <data name="DifferentialCryptanalysisSlide10Content4" xml:space="preserve">
     190    <value>By clicking the "next-button" again, differential cryptanalysis can be performed on cipher 1 in the "Key Recovery" component.</value>
     191  </data>
     192  <data name="DifferentialCryptanalysisSlide10Header" xml:space="preserve">
     193    <value>Differential cryptanalysis of cipher 1</value>
     194  </data>
    168195  <data name="DifferentialCryptanalysisSlide1Content1" xml:space="preserve">
    169196    <value>At this point we apply the idea of differential cryptanalysis to cipher 1. The structure of a cipher is usually public, so that all components and their functionality are known. The security of a cipher should never be based on the secrecy of the construction, but on the secrecy of the key. This requirement is also called Kerckhoffs' principle.</value>
    170197  </data>
    171   <data name="DifferentialCryptanalysisSlide1Content2" xml:space="preserve">
    172     <value>Cipher 1 consists of key addition and substitution. The structure can be viewed in the ToyCipher component. We now try to restore the two unknown round keys k0 and k1. To do this, we first look at the individual steps of the encryption. First a key addition to the input block is performed with k0. We get:</value>
     198  <data name="DifferentialCryptanalysisSlide1Content2Run1" xml:space="preserve">
     199    <value>Cipher 1 consists of key addition and substitution. The structure can be viewed in the ToyCipher component. We now try to restore the two unknown round keys k</value>
     200  </data>
     201  <data name="DifferentialCryptanalysisSlide1Content2Run2" xml:space="preserve">
     202    <value>0</value>
     203  </data>
     204  <data name="DifferentialCryptanalysisSlide1Content2Run3" xml:space="preserve">
     205    <value>and k</value>
     206  </data>
     207  <data name="DifferentialCryptanalysisSlide1Content2Run4" xml:space="preserve">
     208    <value>1</value>
     209  </data>
     210  <data name="DifferentialCryptanalysisSlide1Content2Run5" xml:space="preserve">
     211    <value>. To do this, we first look at the individual steps of the encryption. First a key addition to the input block is performed with k</value>
     212  </data>
     213  <data name="DifferentialCryptanalysisSlide1Content2Run6" xml:space="preserve">
     214    <value>0</value>
     215  </data>
     216  <data name="DifferentialCryptanalysisSlide1Content2Run7" xml:space="preserve">
     217    <value>. We get:</value>
    173218  </data>
    174219  <data name="DifferentialCryptanalysisSlide1Content3" xml:space="preserve">
     
    178223    <value>Differential cryptanalysis of cipher 1</value>
    179224  </data>
    180   <data name="DifferentialCryptanalysisSlide2Content1" xml:space="preserve">
    181     <value>Finally, a key addition with k1 takes place again:</value>
     225  <data name="DifferentialCryptanalysisSlide2Content1Run1" xml:space="preserve">
     226    <value>Finally, a key addition with k</value>
     227  </data>
     228  <data name="DifferentialCryptanalysisSlide2Content1Run2" xml:space="preserve">
     229    <value>1</value>
     230  </data>
     231  <data name="DifferentialCryptanalysisSlide2Content1Run3" xml:space="preserve">
     232    <value> takes place again:</value>
    182233  </data>
    183234  <data name="DifferentialCryptanalysisSlide2Header" xml:space="preserve">
     
    196247    <value>Differential cryptanalysis of cipher 1</value>
    197248  </data>
    198   <data name="DifferentialCryptanalysisSlide9Content1" xml:space="preserve">
    199     <value>The cryptanalyst knows the parameters m and c, but the internal intermediate values u and v are unknown, since k0 and k1 are unknown. However, these values cannot be compared directly with the internal values u1 and u2, as these are unknown. In the following, we will look at two messages m1 and m2 and perform the encryption process partially:</value>
    200   </data>
    201   <data name="DifferentialCryptanalysisSlide9Content2" xml:space="preserve">
    202     <value>We can</value>
    203   </data>
    204   <data name="DifferentialCryptanalysisSlide9Content3" xml:space="preserve">
    205     <value>calculated by difference formation of m1 and m2. Next you can guess k1 and calculate the values of v1 and v2, because the functionality of the SBox is public and therefore invertible. This allows the cryptoanalyst to</value>
    206   </data>
    207   <data name="DifferentialCryptanalysisSlide9Content4" xml:space="preserve">
    208     <value>calculate. However, these values cannot be directly compared with the internal values u1 and u2, since these are unknown.</value>
    209   </data>
    210   <data name="DifferentialCryptanalysisSlide9Content5" xml:space="preserve">
    211     <value>However, the cryptoanalyst knows that the following applies if the round key k1 is correct:</value>
     249  <data name="DifferentialCryptanalysisSlide9Content1Run1" xml:space="preserve">
     250    <value>The cryptoanalyst knows the parameters m and c, but the internal intermediate values u and v are unknown, as k</value>
     251  </data>
     252  <data name="DifferentialCryptanalysisSlide9Content1Run2" xml:space="preserve">
     253    <value>0</value>
     254  </data>
     255  <data name="DifferentialCryptanalysisSlide9Content1Run3" xml:space="preserve">
     256    <value>and k</value>
     257  </data>
     258  <data name="DifferentialCryptanalysisSlide9Content1Run4" xml:space="preserve">
     259    <value>1</value>
     260  </data>
     261  <data name="DifferentialCryptanalysisSlide9Content1Run5" xml:space="preserve">
     262    <value>are unknown. However, the cryptanalyst knows the difference between the internal values. In the following we will look at two messages m</value>
     263  </data>
     264  <data name="DifferentialCryptanalysisSlide9Content1Run6" xml:space="preserve">
     265    <value>1</value>
     266  </data>
     267  <data name="DifferentialCryptanalysisSlide9Content1Run7" xml:space="preserve">
     268    <value>and m</value>
     269  </data>
     270  <data name="DifferentialCryptanalysisSlide9Content1Run8" xml:space="preserve">
     271    <value>2</value>
     272  </data>
     273  <data name="DifferentialCryptanalysisSlide9Content1Run9" xml:space="preserve">
     274    <value>and perform the encryption process partially:</value>
     275  </data>
     276  <data name="DifferentialCryptanalysisSlide9Content2Run1" xml:space="preserve">
     277    <value>This knowledge can be used to get k</value>
     278  </data>
     279  <data name="DifferentialCryptanalysisSlide9Content2Run10" xml:space="preserve">
     280    <value>2</value>
     281  </data>
     282  <data name="DifferentialCryptanalysisSlide9Content2Run11" xml:space="preserve">
     283    <value>). We can calculate</value>
     284  </data>
     285  <data name="DifferentialCryptanalysisSlide9Content2Run2" xml:space="preserve">
     286    <value>1</value>
     287  </data>
     288  <data name="DifferentialCryptanalysisSlide9Content2Run3" xml:space="preserve">
     289    <value>. We consider two plaintext keytext pairs (m</value>
     290  </data>
     291  <data name="DifferentialCryptanalysisSlide9Content2Run4" xml:space="preserve">
     292    <value>1</value>
     293  </data>
     294  <data name="DifferentialCryptanalysisSlide9Content2Run5" xml:space="preserve">
     295    <value>, c</value>
     296  </data>
     297  <data name="DifferentialCryptanalysisSlide9Content2Run6" xml:space="preserve">
     298    <value>1</value>
     299  </data>
     300  <data name="DifferentialCryptanalysisSlide9Content2Run7" xml:space="preserve">
     301    <value>) and (m</value>
     302  </data>
     303  <data name="DifferentialCryptanalysisSlide9Content2Run8" xml:space="preserve">
     304    <value>2</value>
     305  </data>
     306  <data name="DifferentialCryptanalysisSlide9Content2Run9" xml:space="preserve">
     307    <value>, c</value>
     308  </data>
     309  <data name="DifferentialCryptanalysisSlide9Content3Run1" xml:space="preserve">
     310    <value>by difference calculation of m</value>
     311  </data>
     312  <data name="DifferentialCryptanalysisSlide9Content3Run10" xml:space="preserve">
     313    <value>2</value>
     314  </data>
     315  <data name="DifferentialCryptanalysisSlide9Content3Run11" xml:space="preserve">
     316    <value>because the functionality of the SBox is public and therefore invertible. This allows the cryptoanalyst to calculate</value>
     317  </data>
     318  <data name="DifferentialCryptanalysisSlide9Content3Run2" xml:space="preserve">
     319    <value>1</value>
     320  </data>
     321  <data name="DifferentialCryptanalysisSlide9Content3Run3" xml:space="preserve">
     322    <value>and m</value>
     323  </data>
     324  <data name="DifferentialCryptanalysisSlide9Content3Run4" xml:space="preserve">
     325    <value>2</value>
     326  </data>
     327  <data name="DifferentialCryptanalysisSlide9Content3Run5" xml:space="preserve">
     328    <value>. Next step is k</value>
     329  </data>
     330  <data name="DifferentialCryptanalysisSlide9Content3Run6" xml:space="preserve">
     331    <value>1</value>
     332  </data>
     333  <data name="DifferentialCryptanalysisSlide9Content3Run7" xml:space="preserve">
     334    <value>and the values of v</value>
     335  </data>
     336  <data name="DifferentialCryptanalysisSlide9Content3Run8" xml:space="preserve">
     337    <value>1</value>
     338  </data>
     339  <data name="DifferentialCryptanalysisSlide9Content3Run9" xml:space="preserve">
     340    <value>and v</value>
     341  </data>
     342  <data name="DifferentialCryptanalysisSlide9Content4Run1" xml:space="preserve">
     343    <value>However, these values cannot be directly compared with the internal values u</value>
     344  </data>
     345  <data name="DifferentialCryptanalysisSlide9Content4Run2" xml:space="preserve">
     346    <value>1</value>
     347  </data>
     348  <data name="DifferentialCryptanalysisSlide9Content4Run3" xml:space="preserve">
     349    <value>and u</value>
     350  </data>
     351  <data name="DifferentialCryptanalysisSlide9Content4Run4" xml:space="preserve">
     352    <value>2</value>
     353  </data>
     354  <data name="DifferentialCryptanalysisSlide9Content4Run5" xml:space="preserve">
     355    <value>as these are unknown.</value>
     356  </data>
     357  <data name="DifferentialCryptanalysisSlide9Content5Run1" xml:space="preserve">
     358    <value>However, the cryptoanalyst knows that if the round key k</value>
     359  </data>
     360  <data name="DifferentialCryptanalysisSlide9Content5Run2" xml:space="preserve">
     361    <value>1</value>
     362  </data>
     363  <data name="DifferentialCryptanalysisSlide9Content5Run3" xml:space="preserve">
     364    <value>is valid, the following applies:</value>
    212365  </data>
    213366  <data name="DifferentialCryptanalysisSlide9Header" xml:space="preserve">
  • trunk/CrypPluginsExperimental/DCAPathFinder/UI/DCAPathFinderPres.xaml.cs

    r8145 r8148  
    250250                            }
    251251                                break;
     252                            case 15:
     253                            {
     254                                //setup possible button actions
     255                                IsPreviousPossible = true;
     256                                IsNextPossible = true;
     257
     258                                //setup pres content
     259                                ContentViewBox.Child = new Tutorial1.DifferentialCryptanalysisSlide10();
     260                            }
     261                                break;
    252262                        }
    253263                    }
  • trunk/CrypPluginsExperimental/DCAPathFinder/UI/Tutorial1/DifferentialCryptanalysisSlide1.xaml

    r8142 r8148  
    2222        <Label Grid.Row="0" FontFamily="Courier New" FontSize="20" FontWeight="Bold" HorizontalAlignment="Center" Content="{Loc DifferentialCryptanalysisSlide1Header}"></Label>
    2323        <TextBlock Grid.Row="1" FontFamily="Courier New" FontSize="12" Text="{Loc DifferentialCryptanalysisSlide1Content1}" Margin="10,0,10,0" TextWrapping="Wrap"></TextBlock>
    24         <TextBlock Grid.Row="2" FontFamily="Courier New" FontSize="12" Text="{Loc DifferentialCryptanalysisSlide1Content2}" Margin="10,0,10,0" TextWrapping="Wrap"></TextBlock>
     24        <TextBlock Grid.Row="2" FontFamily="Courier New" FontSize="12" Margin="10,0,10,0" TextWrapping="Wrap">
     25            <Run Text="{Loc DifferentialCryptanalysisSlide1Content2Run1}"></Run><Run BaselineAlignment="Subscript" Text="{Loc DifferentialCryptanalysisSlide1Content2Run2}" FontSize="10"></Run>
     26            <Run Text="{Loc DifferentialCryptanalysisSlide1Content2Run3}"></Run><Run BaselineAlignment="Subscript" Text="{Loc DifferentialCryptanalysisSlide1Content2Run4}" FontSize="10"></Run><Run Text="{Loc DifferentialCryptanalysisSlide1Content2Run5}"></Run><Run BaselineAlignment="Subscript" Text="{Loc DifferentialCryptanalysisSlide1Content2Run6}" FontSize="10"></Run><Run Text="{Loc DifferentialCryptanalysisSlide1Content2Run7}"></Run>
     27        </TextBlock>
    2528        <Image Grid.Row="3" Source="/DCAPathFinder;component/images/mXORk0.png"></Image>
    2629        <TextBlock Grid.Row="4" FontFamily="Courier New" FontSize="12" Text="{Loc DifferentialCryptanalysisSlide1Content3}" Margin="10,5,10,0" TextWrapping="Wrap"></TextBlock>
  • trunk/CrypPluginsExperimental/DCAPathFinder/UI/Tutorial1/DifferentialCryptanalysisSlide2.xaml

    r8142 r8148  
    1818        </Grid.RowDefinitions>
    1919        <Label Grid.Row="0" FontFamily="Courier New" FontSize="20" FontWeight="Bold" HorizontalAlignment="Center" Content="{Loc DifferentialCryptanalysisSlide2Header}"></Label>
    20         <TextBlock Grid.Row="1" FontFamily="Courier New" FontSize="12" Text="{Loc DifferentialCryptanalysisSlide2Content1}" Margin="10,0,10,0" TextWrapping="Wrap"></TextBlock>
     20        <TextBlock Grid.Row="1" FontFamily="Courier New" FontSize="12" Margin="10,0,10,0" TextWrapping="Wrap">
     21            <Run Text="{Loc DifferentialCryptanalysisSlide2Content1Run1}"></Run><Run BaselineAlignment="Subscript" Text="{Loc DifferentialCryptanalysisSlide2Content1Run2}" FontSize="10"></Run><Run Text="{Loc DifferentialCryptanalysisSlide2Content1Run3}"></Run>
     22        </TextBlock>
    2123        <Image Grid.Row="2" Source="/DCAPathFinder;component/images/vXORk1.png"></Image>
    2224    </Grid>
Note: See TracChangeset for help on using the changeset viewer.