HomepageCyberwarCybersecurityCyberspaceC-SpionageC-SabotageGefährdungKriminalitätComputerKommunikationmod. SystemeDer MenschBeratungBildungFachberichteInformationKryptologieEmissionVerschlüsselungForschungBegriffeRechtTechnikVerschiedenes
Cipher  keys various Ciphers
The computer in the cryptology
BOA KENDO LAMBA LEX MAMBA MAX & MORITZ MIRA PANTHER Pollux SDC - 1 TERZETT
Author: Old Gocs Berlin 2012
  1. english

  2. francais

  3. русский

  4. 英语法语俄语中文

Programmverfahren  program procedures   procédures du programme  Программа процедур 计划的程序

The development of this program procedure goes back to the pursuit of cryptographers to use computers or computer for the purpose of encryption and decryption. This always determined the capacity of the computer to the success of the action. But in this case the Situatiion was different. In this case, there was the part of users of modern communication technology, the requirement "classified" information to be transmitted. This was according to current law, the use of qualified security systems are required. On the basis of the found computer architecture, at that time was only the use of a computerized Datenchiffrierverfahren used. The design of the cryptographic Algoritmus was found based on the exact conditions on the part of the user after some development time. Now began the period of adjustment of computational solution to the specific hardware - unit. This phase provided for the application and use of Datenchiffrierverfahren a wealth of knowledge. It may be mentioned here only those aspects which are still called by a relevance, are inevitable if ignored, uncontrolled information flows. A whole series of "losses" in recent years is this a realistic example. Question of the electromagnetic radiation (New German "Tempest" mentioned). Since this commercial computer systems not covered by the requirements for the handling of "classified information" threshold. Another question concerned the protection of the cryptographic components during their residence time in the computer. Where is the protection of the algorithms and the key / moved. The protection was also under conditions of distributed intelligent systems to ensure. Another question was of fundamental importance. Can meet the Datenchiffrierprogramm together with the hardware unit, program the required parameters? Does the algorithm under conditions of practical use of the required parameters (cryptographic strength, maximum lengths of the information to be encrypted), immunity (at influencing the transmission channel). Another issue concerned the functionality of the algorithm in hardware -. Unit of programming issues, bugs, loop errors, stop errors, etc., to the functional impairment of the whole system resulted. Context Operationsgeschindigkeit. With the German term describes only the physical problems. And then the crucial question, ranging from the computing power required for the speed of transmission? No, in this case were identified parameters are not met. At the same time, the positive and negative results starting point for further developments. This includes the complex of the inner encryption and thus to protect information and qualitative data, which make even the most intelligent current offensive weapons, such as "Stuxnet" a very high resistance.