Adds solution to task 1

breakmono2
Daniel Tschertkow 5 years ago
parent f9d8b0cafe
commit 795a0d4e8c

Binary file not shown.

@ -17,13 +17,13 @@
\usepackage{tikz}
\usetikzlibrary{positioning,fit,calc}
\tikzset{block/.style={draw, thick, text width=1cm, minimum height=1cm, align=center},
% the align command is used to align the block diagram at the center
% the height command adjust the height of the block diagram
% here block diagram refers to the whole diagram, not the single block
% the thick command here signifies the border of all the blocks used inside the block diagram. You can change it to thin command if you want the thin edge of the blocks
line/.style={-latex} % the lesser the width the greater will be the diagram window
}
\tikzset{block/.style={draw, thick, text width=1cm, minimum height=1cm, align=center},
% the align command is used to align the block diagram at the center
% the height command adjust the height of the block diagram
% here block diagram refers to the whole diagram, not the single block
% the thick command here signifies the border of all the blocks used inside the block diagram. You can change it to thin command if you want the thin edge of the blocks
line/.style={-latex} % the lesser the width the greater will be the diagram window
}
% Titelseiten-Elemente
\title{Introduction to IT-Security WS 20/21}
@ -50,14 +50,29 @@ line/.style={-latex} % the lesser the width the greater will be the diagram wi
\newpage
\section{Security goals}
\subsection*{a)}
Concerning her home, Alice might have the following security goals which Mallory violated by physically breaking in:
\begin{itemize}
\item \textbf{Confidentiality}: Mallory might have stolen \textit{private data}, like a love letter, which is now at risk of being disclosed.
\item \textbf{Integrity}: Mallory might have manipulated a number of things in Alice's home, like the router configuration or the fire alarm. Depending on Mallory's intentions all things (including \textit{private} and \textit{valuable} data) inside her home and Alice's life itself might be at risk.
\item \textbf{Availibility}: Some of Alice's things, like household appliances or jewelry, might be missing.
\end{itemize}
\subsection*{b)}
\begin{itemize}
\item Alice could have \textit{prevented} the breaking by having a stronger door, a better lock, or a guard outside her home. She also could have kept the location of her home private.
\item Alice could have had alarms inplace to \textit{detect} the break-in when it was happening and intervene.
\item Additionally, Alice might have have had security cameras which might have captured the break-in for later \textit{analysis} to prevent break-ins in the future.
\end{itemize}
\section{Simple combinatorics}
\section{XOR cipher}
\begin{figure}[h]
\centering
\begin{tikzpicture}
\node[block] (m1) {$M_1$};
\begin{tikzpicture}
\node[block] (m1) {$M_1$};
\node[block,below=of m1] (k1) {$K$};
\node[block,below=of k1] (c1) {$C_x$};
\node at ($(m1)!0.5!(k1)$){$\oplus$};
@ -66,7 +81,7 @@ line/.style={-latex} % the lesser the width the greater will be the diagram wi
\node[xshift=-2mm] at ($(m1)!0.5!(mgen)$){$=$};
\node[draw,inner xsep=5mm,inner ysep=5mm,fit=(mgen)(m1)(k1)(c1)](g){};
\node[block, right=of m1, xshift=8cm] (m2) {$M_2$};
\node[block, right=of m1, xshift=8cm] (m2) {$M_2$};
\node[block,below=of m2] (k2) {$K$};
\node[block,below=of k2] (c2) {$C_y$};
\node at ($(m2)!0.5!(k2)$){$\oplus$};
@ -80,14 +95,14 @@ line/.style={-latex} % the lesser the width the greater will be the diagram wi
\draw[->] (c1) -| ([xshift=-1cm]mgen);
\draw[->] (kgen) -| ([xshift=1cm]mgen);
\end{tikzpicture}
\end{tikzpicture}
\caption{This Diagram shows how an attacker can calculate the key $K$ and the message $M_1$. \newline
$C_x$, $C_y$ and $M_2$ are known to the attacker.}
\end{figure}
A few requirements must be satisfied in order to get hold of the $K$ and the $M_1$:
\begin{itemize}
\item $M_2$ must be longer than $M_1$ or $K$, so that the key can be calculated in at least the needed length.
\item A successfully decoded message must be distinguishable from an unsuccessfully decoded message, so that the
\item A successfully decoded message must be distinguishable from an unsuccessfully decoded message, so that the
cipher texts $C_x$ and $C_y$ can be exchanged if necessary.
\end{itemize}

Loading…
Cancel
Save