{"id":"https://openalex.org/W6887955717","doi":"https://doi.org/10.18420/ibis-02-02-07","title":"Symmetrische Kryptologie und ihre Veranschaulichung","display_name":"Symmetrische Kryptologie und ihre Veranschaulichung","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W6887955717","doi":"https://doi.org/10.18420/ibis-02-02-07"},"language":"de","primary_location":{"id":"pmh:oai:doaj.org/article:c2c4479382b94229bd763ee53f297381","is_oa":true,"landing_page_url":"https://doaj.org/article/c2c4479382b94229bd763ee53f297381","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Informatische Bildung in Schulen, Vol 2, Iss 2 (2024)","raw_type":"article"},"type":"article","indexed_in":["datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doaj.org/article/c2c4479382b94229bd763ee53f297381","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Koch, Andreas","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Koch, Andreas","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.29985577,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.19470000267028809,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.19470000267028809,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11435","display_name":"Polynomial and algebraic computation","score":0.14800000190734863,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12797","display_name":"History of Computing Technologies","score":0.07530000060796738,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.13089999556541443},{"id":"https://openalex.org/keywords/datalog","display_name":"Datalog","score":0.12470000237226486},{"id":"https://openalex.org/keywords/copernicus","display_name":"Copernicus","score":0.120899997651577}],"concepts":[{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.617900013923645},{"id":"https://openalex.org/C15708023","wikidata":"https://www.wikidata.org/wiki/Q80083","display_name":"Humanities","level":1,"score":0.375900000333786},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.23579999804496765},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.19910000264644623},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.13089999556541443},{"id":"https://openalex.org/C148230440","wikidata":"https://www.wikidata.org/wiki/Q1172264","display_name":"Datalog","level":2,"score":0.12470000237226486},{"id":"https://openalex.org/C114386696","wikidata":"https://www.wikidata.org/wiki/Q1131154","display_name":"Copernicus","level":2,"score":0.120899997651577},{"id":"https://openalex.org/C2780102774","wikidata":"https://www.wikidata.org/wiki/Q4669873","display_name":"Absoluteness","level":2,"score":0.11490000039339066},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.11259999871253967},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11100000143051147}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:doaj.org/article:c2c4479382b94229bd763ee53f297381","is_oa":true,"landing_page_url":"https://doaj.org/article/c2c4479382b94229bd763ee53f297381","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Informatische Bildung in Schulen, Vol 2, Iss 2 (2024)","raw_type":"article"},{"id":"doi:10.18420/ibis-02-02-07","is_oa":true,"landing_page_url":"https://doi.org/10.18420/ibis-02-02-07","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:doaj.org/article:c2c4479382b94229bd763ee53f297381","is_oa":true,"landing_page_url":"https://doaj.org/article/c2c4479382b94229bd763ee53f297381","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Informatische Bildung in Schulen, Vol 2, Iss 2 (2024)","raw_type":"article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4750837981700897}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Die":[0,27,102],"Kryptologie,":[1],"die":[2,10,17,41,108,133,172],"Wissenschaft":[3,11],"des":[4,140],"Geheimen,":[5],"gliedert":[6],"sich":[7,18],"in":[8,15,50,57,65],"Kryptographie,":[9],"der":[12,20,22,29,37,66,111],"Geheimschriften":[13,25],"und":[14,47,55,62,113,176],"Kryptoanalyse,":[16],"mit":[19],"Untersuchung":[21],"Sicherheit":[23,134],"von":[24],"besch\u00e4ftigt.":[26],"Lehrpl\u00e4ne":[28,42],"Bundesl\u00e4nder":[30],"enthalten":[31],"eine":[32],"gro\u00dfe":[33],"Vielfalt":[34],"an":[35],"Themen":[36],"Kryptologie.":[38],"Beispielsweise":[39],"sehen":[40],"baden-w\u00fcrttembergischer":[43],"Gymnasien":[44],"monoalphabetische":[45],"Substitutionsverschl\u00fcsselungen":[46,54],"ihre":[48],"Kryptoanalyse":[49],"Klassenstufe":[51,58],"7,":[52],"polyalphabetische":[53],"Transpositionsverfahren":[56],"8":[59],"sowie":[60],"symmetrische":[61],"asymmetrische":[63],"Verfahren":[64,80,99,152,170],"Sekundarstufe":[67],"II":[68],"vor.":[69],"Mit":[70],"Verschl\u00fcsselungsverfahren,":[71],"h\u00e4ufig":[72],"kurz":[73],"als":[74,79,118,147],"Verschl\u00fcsselungen":[75],"oder":[76],"noch":[77],"knapper":[78],"bezeichnet,":[81],"sind":[82,171],"formal":[83],"injektive":[84],"Codierungen":[85],"gemeint,":[86],"deren":[87],"Umkehrbarkeit":[88],"auf":[89,138],"Kenntnis":[90],"eines":[91,135],"Geheimnisses":[92],"beruht.":[93],"Dieses":[94],"Geheimnis":[95],"kann":[96],"auch":[97],"das":[98],"selbst":[100,142],"sein.":[101],"Umkehrung":[103],"entspricht":[104],"dem":[105,123],"Entschl\u00fcsselungsverfahren.":[106],"Parameter,":[107],"zur":[109,164,174],"Durchf\u00fchrung":[110],"Ver-":[112],"Entschl\u00fcsselung":[114,175],"ben\u00f6tigt":[115],"werden,":[116],"werden":[117,158],"Schl\u00fcssel":[119,153,173],"bezeichnet.":[120],"Das":[121],"nach":[122],"Niederl\u00e4nder":[124],"Auguste":[125],"Kerckhoffs":[126],"(1835-1903)":[127],"benannte":[128],"Kerckhoffs\u2019sche":[129],"Prinzip":[130],"besagt,":[131],"dass":[132,150],"Verfahrens":[136,141],"nicht":[137],"Geheimhaltung":[139],"beruhen":[143],"darf.":[144],"Dies":[145],"impliziert":[146],"notwendige":[148],"Bedingung,":[149],"sichere":[151],"bed\u00fcrfen.":[154],"In":[155],"diesem":[156],"Artikel":[157],"M\u00f6glichkeiten":[159],"f\u00fcr":[160],"einen":[161],"anschaulichen":[162],"Unterricht":[163],"symmetrischen":[165,169],"Kryptologie":[166],"aufgezeigt.":[167],"Bei":[168],"Verschl\u00fcsselung":[177],"gleich.":[178]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
