Changeset 8154


Ignore:
Timestamp:
Jun 6, 2019, 3:10:59 PM (3 years ago)
Author:
Christian Bender
Message:

DCAOracle: First commit
DCAPathFinder: correction of formulations

Location:
trunk
Files:
11 added
5 edited

Legend:

Unmodified
Added
Removed
  • trunk/CrypPluginsExperimental/DCAPathFinder/DCAPathFinder.cs

    r8152 r8154  
    3939        private int _expectedDifferential;
    4040        private int _messageCount;
    41         private int[] _path;
     41        private string _path;
    4242
    4343        #endregion
     
    5454        /// </summary>
    5555        [PropertyInfo(Direction.OutputData, "Path", "PathToolTip")]
    56         public int[] Path
     56        public string Path
    5757        {
    5858            get { return _path; }
  • trunk/CrypPluginsExperimental/DCAPathFinder/Properties/Resources.Designer.cs

    r8152 r8154  
    8989       
    9090        /// <summary>
    91         ///   Sucht eine lokalisierte Zeichenfolge, die Cipher 1: 16 bit blocksize, 2 subkeys, the key consists of 32 bit ähnelt.
     91        ///   Sucht eine lokalisierte Zeichenfolge, die Tutorial 1: Cipher 1, 16 bit blocksize, 2 subkeys, the key consists of 32 bit ähnelt.
    9292        /// </summary>
    9393        internal static string Cipher1 {
     
    9898       
    9999        /// <summary>
    100         ///   Sucht eine lokalisierte Zeichenfolge, die Cipher 2: 16 bit blocksize, 4 subkeys, the key consists of 64 bit ähnelt.
     100        ///   Sucht eine lokalisierte Zeichenfolge, die Tutorial 2: Cipher 2, 16 bit blocksize, 4 subkeys, the key consists of 64 bit ähnelt.
    101101        /// </summary>
    102102        internal static string Cipher2 {
     
    107107       
    108108        /// <summary>
    109         ///   Sucht eine lokalisierte Zeichenfolge, die Cipher 3: 16 bit blocksize, 6 subkeys, the key consists of 96 bit ähnelt.
     109        ///   Sucht eine lokalisierte Zeichenfolge, die Tutorial 3: Cipher 3, 16 bit blocksize, 6 subkeys, the key consists of 96 bit ähnelt.
    110110        /// </summary>
    111111        internal static string Cipher3 {
     
    116116       
    117117        /// <summary>
    118         ///   Sucht eine lokalisierte Zeichenfolge, die Cipher 4: 4 bit blocksize, 4 subkeys, the key consists of 16 bit ähnelt.
     118        ///   Sucht eine lokalisierte Zeichenfolge, die Tutorial 4: Cipher 4, 4 bit blocksize, 4 subkeys, the key consists of 16 bit ähnelt.
    119119        /// </summary>
    120120        internal static string Cipher4 {
     
    260260       
    261261        /// <summary>
    262         ///   Sucht eine lokalisierte Zeichenfolge, die . If more than one candidate remains at the end, the attack will be reshuffled with new pairs of plaintext and keytext. ähnelt.
     262        ///   Sucht eine lokalisierte Zeichenfolge, die . If more than one candidate remains at the end, the attack will be reshuffled with new pairs of plaintext and ciphertext. ähnelt.
    263263        /// </summary>
    264264        internal static string DifferentialCryptanalysisSlide10Content3Run3 {
     
    269269       
    270270        /// <summary>
    271         ///   Sucht eine lokalisierte Zeichenfolge, die By clicking the &quot;next-button&quot; again, differential cryptanalysis can be performed on cipher 1 in the &quot;Key Recovery&quot; component. ähnelt.
     271        ///   Sucht eine lokalisierte Zeichenfolge, die By clicking the &quot;next&quot; button again, differential cryptanalysis can be performed on cipher 1 in the &quot;Key Recovery&quot; component. ähnelt.
    272272        /// </summary>
    273273        internal static string DifferentialCryptanalysisSlide10Content4 {
     
    332332       
    333333        /// <summary>
    334         ///   Sucht eine lokalisierte Zeichenfolge, die . To do this, we first look at the individual steps of the encryption. First a key addition to the input block is performed with k ähnelt.
     334        ///   Sucht eine lokalisierte Zeichenfolge, die . To do this, we first look at the individual steps of the encryption. First, a key addition to the input block is performed with k ähnelt.
    335335        /// </summary>
    336336        internal static string DifferentialCryptanalysisSlide1Content2Run5 {
     
    485485       
    486486        /// <summary>
    487         ///   Sucht eine lokalisierte Zeichenfolge, die are unknown. However, the cryptanalyst knows the difference between the internal values. In the following we will look at two messages m ähnelt.
     487        ///   Sucht eine lokalisierte Zeichenfolge, die are unknown. However, the cryptanalyst knows the difference between the internal values. In the following, we look at two messages m ähnelt.
    488488        /// </summary>
    489489        internal static string DifferentialCryptanalysisSlide9Content1Run5 {
     
    566566       
    567567        /// <summary>
    568         ///   Sucht eine lokalisierte Zeichenfolge, die . We consider two plaintext keytext pairs (m ähnelt.
     568        ///   Sucht eine lokalisierte Zeichenfolge, die . We consider two plaintext-ciphertext pairs (m ähnelt.
    569569        /// </summary>
    570570        internal static string DifferentialCryptanalysisSlide9Content2Run3 {
  • trunk/CrypPluginsExperimental/DCAPathFinder/Properties/Resources.de.resx

    r8152 r8154  
    128128  </data>
    129129  <data name="Cipher1" xml:space="preserve">
    130     <value>Chiffre 1: 16 Bit Blockgröße, 2 Rundenschlüssel, der Schlüssel ist 32 Bit groß</value>
     130    <value>Tutorial 1: Chiffre 1, 16 Bit Blockgröße, 2 Rundenschlüssel, der Schlüssel ist 32 Bit groß</value>
    131131  </data>
    132132  <data name="Cipher2" xml:space="preserve">
    133     <value>Chiffre 2: 16 Bit Blockgröße, 4 Rundenschlüssel, der Schlüssel ist 64 Bit groß</value>
     133    <value>Tutorial 2: Chiffre 2, 16 Bit Blockgröße, 4 Rundenschlüssel, der Schlüssel ist 64 Bit groß</value>
    134134  </data>
    135135  <data name="Cipher3" xml:space="preserve">
    136     <value>Chiffre 3: 16 Bit Blockgröße, 6 Rundenschlüssel, der Schlüssel ist 96 Bit groß</value>
     136    <value>Tutorial 3: Chiffre 3, 16 Bit Blockgröße, 6 Rundenschlüssel, der Schlüssel ist 96 Bit groß</value>
    137137  </data>
    138138  <data name="Cipher4" xml:space="preserve">
    139     <value>Chiffre 4: 4 Bit Blockgröße , 4 Rundenschlüssel, der Schlüssel ist 16 Bit groß</value>
     139    <value>Tutorial 4: Chiffre4, 4 Bit Blockgröße , 4 Rundenschlüssel, der Schlüssel ist 16 Bit groß</value>
    140140  </data>
    141141  <data name="DescriptionContent1" xml:space="preserve">
     
    188188  </data>
    189189  <data name="DifferentialCryptanalysisSlide10Content4" xml:space="preserve">
    190     <value>Durch ein weiteres Klicken auf den "weiter-Button" kann die differenzielle Kryptoanalyse an Chiffre 1 in der Komponente "Schlüssel-Wiederherstellung" ausgeführt werden.</value>
     190    <value>Durch ein weiteres Klicken auf den "Weiter"-Button kann die differenzielle Kryptoanalyse an Chiffre 1 in der Komponente "Schlüssel-Wiederherstellung" ausgeführt werden.</value>
    191191  </data>
    192192  <data name="DifferentialCryptanalysisSlide10Header" xml:space="preserve">
     
    465465  </data>
    466466  <data name="PresentationModeToolTip" xml:space="preserve">
    467     <value>Bei aktiviertem Tutorialmodus erfolgt je Tutorual eine Präsentation mit Informationen zur differenziellen Kryptoanalyse </value>
     467    <value>Bei aktiviertem Tutorialmodus erfolgt je Tutorial eine Präsentation mit Informationen zur differenziellen Kryptoanalyse </value>
    468468  </data>
    469469  <data name="StartMaskContent1" xml:space="preserve">
  • trunk/CrypPluginsExperimental/DCAPathFinder/Properties/Resources.resx

    r8152 r8154  
    128128  </data>
    129129  <data name="Cipher1" xml:space="preserve">
    130     <value>Cipher 1: 16 bit blocksize, 2 subkeys, the key consists of 32 bit</value>
     130    <value>Tutorial 1: Cipher 1, 16 bit blocksize, 2 subkeys, the key consists of 32 bit</value>
    131131  </data>
    132132  <data name="Cipher2" xml:space="preserve">
    133     <value>Cipher 2: 16 bit blocksize, 4 subkeys, the key consists of 64 bit</value>
     133    <value>Tutorial 2: Cipher 2, 16 bit blocksize, 4 subkeys, the key consists of 64 bit</value>
    134134  </data>
    135135  <data name="Cipher3" xml:space="preserve">
    136     <value>Cipher 3: 16 bit blocksize, 6 subkeys, the key consists of 96 bit</value>
     136    <value>Tutorial 3: Cipher 3, 16 bit blocksize, 6 subkeys, the key consists of 96 bit</value>
    137137  </data>
    138138  <data name="Cipher4" xml:space="preserve">
    139     <value>Cipher 4: 4 bit blocksize, 4 subkeys, the key consists of 16 bit</value>
     139    <value>Tutorial 4: Cipher 4, 4 bit blocksize, 4 subkeys, the key consists of 16 bit</value>
    140140  </data>
    141141  <data name="DescriptionContent1" xml:space="preserve">
     
    185185  </data>
    186186  <data name="DifferentialCryptanalysisSlide10Content3Run3" xml:space="preserve">
    187     <value>. If more than one candidate remains at the end, the attack will be reshuffled with new pairs of plaintext and keytext.</value>
     187    <value>. If more than one candidate remains at the end, the attack will be reshuffled with new pairs of plaintext and ciphertext.</value>
    188188  </data>
    189189  <data name="DifferentialCryptanalysisSlide10Content4" xml:space="preserve">
    190     <value>By clicking the "next-button" again, differential cryptanalysis can be performed on cipher 1 in the "Key Recovery" component.</value>
     190    <value>By clicking the "next" button again, differential cryptanalysis can be performed on cipher 1 in the "Key Recovery" component.</value>
    191191  </data>
    192192  <data name="DifferentialCryptanalysisSlide10Header" xml:space="preserve">
     
    209209  </data>
    210210  <data name="DifferentialCryptanalysisSlide1Content2Run5" xml:space="preserve">
    211     <value>. To do this, we first look at the individual steps of the encryption. First a key addition to the input block is performed with k</value>
     211    <value>. To do this, we first look at the individual steps of the encryption. First, a key addition to the input block is performed with k</value>
    212212  </data>
    213213  <data name="DifferentialCryptanalysisSlide1Content2Run6" xml:space="preserve">
     
    260260  </data>
    261261  <data name="DifferentialCryptanalysisSlide9Content1Run5" xml:space="preserve">
    262     <value>are unknown. However, the cryptanalyst knows the difference between the internal values. In the following we will look at two messages m</value>
     262    <value>are unknown. However, the cryptanalyst knows the difference between the internal values. In the following, we look at two messages m</value>
    263263  </data>
    264264  <data name="DifferentialCryptanalysisSlide9Content1Run6" xml:space="preserve">
     
    287287  </data>
    288288  <data name="DifferentialCryptanalysisSlide9Content2Run3" xml:space="preserve">
    289     <value>. We consider two plaintext keytext pairs (m</value>
     289    <value>. We consider two plaintext-ciphertext pairs (m</value>
    290290  </data>
    291291  <data name="DifferentialCryptanalysisSlide9Content2Run4" xml:space="preserve">
  • trunk/Templates/Experimental/Differential_Cryptanalysis.xml

    r8152 r8154  
    2525        <replacement key="$DCADesc$" value="This template contains a tutorial for differential cryptanalysis of symmetric block ciphers." />
    2626        <replacement key="$DCAPathFinderComponent$" value="DCA PfadFinder" />
     27                <replacement key="$DCAOracleComponent$" value="DCA Orakel" />
    2728  </replacements>
    2829  <replacements lang="en">
     
    3334        <replacement key="$DCADesc$" value="This template contains a tutorial for differential cryptanalysis of symmetric block ciphers." />
    3435        <replacement key="$DCAPathFinderComponent$" value="DCA PathFinder" />
     36        <replacement key="$DCAOracleComponent$" value="DCA Oracle" />
    3537  </replacements>
    3638</sample>
Note: See TracChangeset for help on using the changeset viewer.