{"guid":"import-04cbf6a2c645f0f640","title":"Ein Mittelsmannangriff auf ein digitales Signiergerät","subtitle":"Bachelorarbeit Informatik Uni Kiel SS 2011","slug":"28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4758.en.html","description":"In dieser Arbeit wird gezeigt, wie unter Ausnutzung einer ungesicherten Verbindung\nzwischen einer sicheren Signaturerstellungseinheit und einem Anwender-PC\neine qualifizierte elektronische Signatur gefälscht werden kann.\n","original_language":"eng","persons":["Alexander Koch"],"tags":["28c3"," Hacking"],"view_count":78,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-02-03T10:15:11.362+01:00","length":3347,"duration":3347,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-04cbf6a2c645f0f640-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-04cbf6a2c645f0f640-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet","url":"https://api.media.ccc.de/public/events/import-04cbf6a2c645f0f640","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1529,"event_guid":"import-2dc039fa73eabade8b","weight":2},{"event_id":1562,"event_guid":"import-9bd054fef6a2a0b358","weight":3},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":3},{"event_id":1572,"event_guid":"import-4eec3a43cb7ad04ee9","weight":2},{"event_id":1599,"event_guid":"import-0263d58196a112ebec","weight":3},{"event_id":1602,"event_guid":"import-77160932cc8cb0a44f","weight":2},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":2},{"event_id":1606,"event_guid":"import-dc19512cf9bb9158fd","weight":2},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":3},{"event_id":1621,"event_guid":"import-6b9d989911d88e19ca","weight":2},{"event_id":1622,"event_guid":"import-a5bb0702e23237f62d","weight":2},{"event_id":1627,"event_guid":"import-f578f04a483d452235","weight":2},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":2}],"recordings":[{"size":292,"length":3347,"mime_type":"video/webm","language":"eng","filename":"28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:49.512+01:00","recording_url":"https://cdn.media.ccc.de/congress/2011/webm/28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet.webm","url":"https://api.media.ccc.de/public/recordings/3120","event_url":"https://api.media.ccc.de/public/events/import-04cbf6a2c645f0f640","conference_url":"https://api.media.ccc.de/public/conferences/28c3"},{"size":292,"length":3347,"mime_type":"audio/ogg","language":"eng","filename":"28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet.ogg","state":"downloaded","folder":"ogg-audio-only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-31T23:45:44.489+02:00","recording_url":"https://cdn.media.ccc.de/congress/2011/ogg-audio-only/28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet.ogg","url":"https://api.media.ccc.de/public/recordings/3121","event_url":"https://api.media.ccc.de/public/events/import-04cbf6a2c645f0f640","conference_url":"https://api.media.ccc.de/public/conferences/28c3"}]}