Title: Folie 1
1Geheime Botschaften
2Verstehen Sie die Botschaft?
VHFUHWFRPPXQLFDWLRQLVDQHHGQRWRQOBIRUPLOLWDUBFRPPDQ
GHUVDQGLQWHOOLJHQFHDJHQWVEXWDOVRRIODUJHFRPPHUFLDOD
QGLQGXVWULDOILUPUHODBLQJFRQILGHQWLDOLQIRUPDWLRQLQW
RGDBVZRUOG SUREDEOBDWOHDVWQLQHWBSHUFHQWRIVHQVLWLYH
RUVHFUHWLQIRUPDWLRQWUDQVPLWWHGHOHFWURQLFDOOBDULVHV
LQWKHODWWHUVHFWRURQHKDVRQOBWRWKLQNRIWWKHIORZRIFUHG
LWLQIRUPDWLRQDPRQJYDULRXVILQDQFLDOLQVWLWXWLRQVWKHW
UHPHQGRXVTXDQWLWLHVRIVXFKLQIRUPDWLRQPDNHLWLPSHUDWL
YHWKDWFRQILGHQWLDOLWBEHJXDUDQWLHGEBDVBVWHPRIHQFUBS
WLRQZKLFKLVERWKFRPSXWDWLRQDOOBIHDVLEOHDQGBHWYHUBKD
UGWRGHFUBSWZKHQLQIRUPDWLRQLVLQWHUFHSWHG
3Entschlüsselt
Secret communication is a need not only for
military commanders and intelligence agents but
also of large commercial and industrial firm
relaying confidential information in to days
world probably at least ninety percent of
sensitive or secret information transmitted
electronically arises in the latter sector one
has only to think oft the flow of credit
information among various financial institutions
the tremendous quantities of such information
make it imperative that confidentiality be
guarantied by a system of encryption which is
both computationally feasible and yet very hard
to decrypt when information is intercepted
4Maria Stuart 1542-1587
5Zimmermann-Depeche im 1. Weltkrieg
Uneingeschränkter U-Bootkrieg
6Enigma 2. Weltkrieg
Al Turing1912-1954
7Einige Begriffe
Klartext (M) Chiffretext/Geheimtext (C) Schlüssel
(K) Klartextalphabet Geheimtextalphabet.
Verschlüsselung EK(M)C Entschlüsselung
DK(C)M Symmetrischer Algorithmus Public-Key-/As
ymmetrischer Algorithmus
8Nicht sicher
diesemethodeistnichtsicher
fordryrzjpfridzmovjzdovjrt
9Für Profis auch nicht sicher
fuerprofisistauchdieseunsicher
2rtpo?9dzlt.j-9r?0!dov_
10Transposition
STAPILAOSLNMTIAESNNTDTEERINANKNFTSAPCOHSEIR
11ADFGVX-Teil1
angriffum10uhr
DV AX GV VV VG XV XV GD GX AV XG GD DX VV
12ADFGVX-Teil 2
VXDAVVGVGVVXVDXGXVGAGDXGXVDV