start of lab4

This commit is contained in:
Florian Hoss 2022-05-30 09:18:23 +02:00
parent 9965040d1a
commit 2de583632e
11 changed files with 15 additions and 8 deletions

View file

@ -1,2 +0,0 @@
\section{Part 1: Zzuf}

BIN
Lab04/content/bigrams.xlsx Normal file

Binary file not shown.

5
Lab04/content/hashes.txt Normal file
View file

@ -0,0 +1,5 @@
john:$1$kSwpjBFv$VMtu0Mk6p06EUtVw5OLEY/
jonas:$1$qPEx/5/4$4T0lDrIo5RnrDFH2rP7In/
pony:$1$q1NwfAWz$5ulIYzhCjsLBsQjQ2CRRN1
hannah:$1$ia1yKsCX$/Xdet.pCmIR3TdKoavIaP/
root:$1$E2ST/4kf$6UnJsquPTK3S2lpLxShE/.

View file

@ -0,0 +1,2 @@
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Only authorized parties can decipher a ciphertext back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is possible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users. Historically, various forms of encryption have been used to aid in cryptography. Early encryption techniques were often utilized in military messaging. Since then, new
techniques have emerged and become commonplace in all areas of modern computing. Modern encryption schemes utilize the concepts of public-key and symmetric-key. Modern encryption techniques ensure security because modern computers are inefficient at cracking the encryption.

View file

@ -87,8 +87,8 @@
}
\AfterTOCHead[lof]{\appto\autodot{:}}
\ihead{Lab 03 - ITSec}
\chead{Fuzzing}
\ihead{Lab 04 - ITSec}
\chead{Cryptography}
\ohead{Florian Hoss}
\ofoot{Seite~\thepage{}/\pageref{LastPage}}
\cfoot{}

View file

@ -0,0 +1,2 @@
\section{Part 1: Substitution Cipher}

View file

@ -9,9 +9,9 @@
\centering
\Large
\vlinespace{10}\\
Lab 3 - ITSec\\
Lab 4 - ITSec\\
\huge
\textbf{Fuzzing}\\
\textbf{Cryptography}\\
\Large
\vlinespace{8}
\huge
@ -20,6 +20,6 @@
\vfill
\raggedright{}
\HRule{13pt}{1pt} \\
\titleemph{Datum:} 02.05.2022 \\
\titleemph{Git:} \href{https://git.unjx.de/flo/SWB6-ITSec/src/branch/master/Lab03}{https://git.unjx.de/flo/SWB6-ITSec/src/branch/master/Lab03}
\titleemph{Datum:} 30.05.2022 \\
\titleemph{Git:} \href{https://git.unjx.de/flo/SWB6-ITSec/src/branch/master/Lab04}{https://git.unjx.de/flo/SWB6-ITSec/src/branch/master/Lab04}
\end{titlepage}