{"id":26,"date":"2012-01-04T02:14:56","date_gmt":"2012-01-04T01:14:56","guid":{"rendered":"http:\/\/www.datenzone.de\/blog\/"},"modified":"2012-01-04T02:28:31","modified_gmt":"2012-01-04T01:28:31","slug":"projects","status":"publish","type":"page","link":"https:\/\/www.datenzone.de\/blog\/projects\/","title":{"rendered":"Projects"},"content":{"rendered":"<p>There are many projects I worked on:<\/p>\n<h3><a href=\"http:\/\/sourceforge.net\/projects\/tpm4java\/\">tpm4java<\/a><\/h3>\n<p>tpm4java is a java API for communicating with a trusted platform module on a PC. It was designed and implemented by Martin Hermanowski and me.<\/p>\n<h3><a href=\"http:\/\/www.bouncycastle.org\/\">TLS for BouncyCastle<\/a><\/h3>\n<p>BouncyCastle is a cryptographic library for Java. In my bachelor thesis, I designed and implemented a TLS client stack for BouncyCastle, that is now part of the project.<\/p>\n<h3><a href=\"http:\/\/www.aircrack-ng.org\/\">aircrack-ng<\/a><\/h3>\n<p>aircrack-ng is a toolsuite for analyzing and auditing WLANs. In my diploma thesis, I designed new attacks on WEP, an encryption protocol for such networks. Meanwhile, the attack is integrated in aircrack-ng.<\/p>\n<h3><a href=\"http:\/\/dedected.org\/\">dedected.org<\/a><\/h3>\n<p>dedected.org is a project to investigate DECT and DECT security more closely. Many people participated here. I was working mostly on the reverse engineering and analysis of the cryptographic algorithms used in DECT.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are many projects I worked on: tpm4java tpm4java is a java API for communicating with a trusted platform module on a PC. It was designed and implemented by Martin Hermanowski and me. TLS for BouncyCastle BouncyCastle is a cryptographic &hellip;<\/p>\n<p class=\"read-more\"><a href=\"https:\/\/www.datenzone.de\/blog\/projects\/\">Read more &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-26","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.datenzone.de\/blog\/wp-json\/wp\/v2\/pages\/26","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.datenzone.de\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.datenzone.de\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.datenzone.de\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.datenzone.de\/blog\/wp-json\/wp\/v2\/comments?post=26"}],"version-history":[{"count":3,"href":"https:\/\/www.datenzone.de\/blog\/wp-json\/wp\/v2\/pages\/26\/revisions"}],"predecessor-version":[{"id":28,"href":"https:\/\/www.datenzone.de\/blog\/wp-json\/wp\/v2\/pages\/26\/revisions\/28"}],"wp:attachment":[{"href":"https:\/\/www.datenzone.de\/blog\/wp-json\/wp\/v2\/media?parent=26"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}