TY - THES A1 - Stäudel, Jürgen T1 - Development, Implementation and Operation of Integrated Sanitation Systems Based on Material-Flows – Integrated Sanitation in the City of Darkhan, Mongolia - A Practicable Example N2 - The world society faces a huge challenge to implement the human right of “access to sanitation”. More and more it is accepted that the conventional approach towards providing sanitation services is not suitable to solve this problem. This dissertation examines the possibility to enhance “access to sanitation” for people who are living in areas with underdeveloped water and wastewater infrastructure systems. The idea hereby is to follow an integrated approach for sanitation, which allows for a mutual completion of existing infrastructure with resource-based sanitation systems. The notion “integrated sanitation system (iSaS)” is defined in this work and guiding principles for iSaS are formulated. Further on the implementation of iSaS is assessed at the example of a case study in the city of Darkhan in Mongolia. More than half of Mongolia’s population live in settlements where yurts (tents of Nomadic people) are predominant. In these settlements (or “ger areas”) sanitation systems are not existent and the hygienic situation is precarious. An iSaS has been developed for the ger areas in Darkhan and tested over more than two years. Further on a software-based model has been developed with the goal to describe and assess different variations of the iSaS. The results of the assessment of material-flows, monetary-flows and communication-flows within the iSaS are presented in this dissertation. The iSaS model is adaptable and transferable to the socio-economic conditions in other regions and climate zones. N2 - Die Weltgesellschaft steht der großen Herausforderung gegenüber das Menschrecht auf Zugang zu Sanitärversorgung umzusetzen. Es wird zunehmend akzeptiert, dass konventionelle Ansätze der Abwasserwirtschaft dieses Problem nicht lösen können. Die vorliegende Dissertation untersucht die Möglichkeit eines integrierten Ansatzes, welcher Stoffflüsse, Geldflüsse und Kommunikationsflüsse gemeinsam betrachtet und komplementär zu existierenden Infrastruktursystemen angewendet werden kann. Der Begriff „integriertes Sanitärsystem (iSaS)“ wird definiert und anhand eines Fallbeispiels in der Stadt Darkhan in der Mongolei untersucht. Hierbei wurde ein Sanitärsystem für Jurtensiedlungen erarbeitet, pilothaft umgesetzt und über 2 Jahre betrieben. Weiterhin wurde ein software- basiertes Modell anhand der Prinzipien von iSaS entwickelt und verschiedene Variationen des Systems untersucht und diskutiert. Das Modell kann an die klimatischen und sozioökonomischen Rahmenbedingungen in anderen Regionen der Welt angepasst werden und damit die potentielle Umsetzung von iSaS unterstützen. KW - Abwasser KW - Infrastruktur KW - Entwicklungsländer KW - Abfall KW - iPiT® KW - Mongolia KW - integrated sanitation system KW - new alternative sanitation systems NASS KW - UDDT Y1 - 2017 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:gbv:wim2-20170512-31794 ER - TY - THES A1 - Wenzel, Jakob T1 - Design and Analysis of Cryptographic Algorithms for Authentication N2 - During the previous decades, the upcoming demand for security in the digital world, e.g., the Internet, lead to numerous groundbreaking research topics in the field of cryptography. This thesis focuses on the design and analysis of cryptographic primitives and schemes to be used for authentication of data and communication endpoints, i.e., users. It is structured into three parts, where we present the first freely scalable multi-block-length block-cipher-based compression function (Counter-bDM) in the first part. The presented design is accompanied by a thorough security analysis regarding its preimage and collision security. The second and major part is devoted to password hashing. It is motivated by the large amount of leaked password during the last years and our discovery of side-channel attacks on scrypt – the first modern password scrambler that allowed to parameterize the amount of memory required to compute a password hash. After summarizing which properties we expect from a modern password scrambler, we (1) describe a cache-timing attack on scrypt based on its password-dependent memory-access pattern and (2) outline an additional attack vector – garbage-collector attacks – that exploits optimization which may disregard to overwrite the internally used memory. Based on our observations, we introduce Catena – the first memory-demanding password-scrambling framework that allows a password-independent memory-access pattern for resistance to the aforementioned attacks. Catena was submitted to the Password Hashing Competition (PHC) and, after two years of rigorous analysis, ended up as a finalist gaining special recognition for its agile framework approach and side-channel resistance. We provide six instances of Catena suitable for a variety of applications. We close the second part of this thesis with an overview of modern password scramblers regarding their functional, security, and general properties; supported by a brief analysis of their resistance to garbage-collector attacks. The third part of this thesis is dedicated to the integrity (authenticity of data) of nonce-based authenticated encryption schemes (NAE). We introduce the so-called j-IV-Collision Attack, allowing to obtain an upper bound for an adversary that is provided with a first successful forgery and tries to efficiently compute j additional forgeries for a particular NAE scheme (in short: reforgeability). Additionally, we introduce the corresponding security notion j-INT-CTXT and provide a comparative analysis (regarding j-INT-CTXT security) of the third-round submission to the CAESAR competition and the four classical and widely used NAE schemes CWC, CCM, EAX, and GCM. N2 - Die fortschreitende Digitalisierung in den letzten Jahrzehnten hat dazu geführt, dass sich das Forschungsfeld der Kryptographie bedeutsam weiterentwickelt hat. Diese, im Wesentlichen aus drei Teilen bestehende Dissertation, widmet sich dem Design und der Analyse von kryptographischen Primitiven und Modi zur Authentifizierung von Daten und Kommunikationspartnern. Der erste Teil beschäftigt sich dabei mit blockchiffrenbasierten Kompressionsfunktionen, die in ressourcenbeschränkten Anwendungsbereichen eine wichtige Rolle spielen. Im Rahmen dieser Arbeit präsentieren wir die erste frei skalierbare und sichere blockchiffrenbasierte Kompressionsfunktion Counter-bDM und erweitern somit flexibel die erreichbare Sicherheit solcher Konstruktionen. Der zweite Teil und wichtigste Teil dieser Dissertation widmet sich Passwort-Hashing-Verfahren. Zum einen ist dieser motiviert durch die große Anzahl von Angriffen auf Passwortdatenbanken großer Internet-Unternehmen. Zum anderen bot die Password Hashing Competition (PHC) die Möglichkeit, unter Aufmerksamkeit der Expertengemeinschaft die Sicherheit bestehender Verfahren zu hinterfragen, sowie neue sichere Verfahren zu entwerfen. Im Rahmen des zweiten Teils entwarfen wir Anforderungen an moderne Passwort-Hashing-Verfahren und beschreiben drei Arten von Seitenkanal-Angriffen (Cache-Timing-, Weak Garbage-Collector- und Garbage-Collector-Angriffe) auf scrypt – das erste moderne Password-Hashing-Verfahren welches erlaubte, den benötigten Speicheraufwand zur Berechnung eines Passworthashes frei zu wählen. Basierend auf unseren Beobachtungen und Angriffen, stellen wir das erste moderne PasswordHashing-Framework Catena vor, welches für gewählte Instanzen passwortunabhängige Speicherzugriffe und somit Sicherheit gegen oben genannte Angriffe garantiert. Catena erlangte im Rahmen des PHC-Wettbewerbs besondere Anerkennung für seine Agilität und Resistenz gegen SeitenkanalAngriffe. Wir präsentieren sechs Instanzen des Frameworks, welche für eine Vielzahl von Anwendungen geeignet sind. Abgerundet wird der zweite Teil dieser Arbeit mit einem vergleichenden Überblick von modernen Passwort-Hashing-Verfahren hinsichtlich ihrer funktionalen, sicherheitstechnischen und allgemeinen Eigenschaften. Dieser Vergleich wird unterstützt durch eine kurze Analyse bezüglich ihrer Resistenz gegen (Weak) Garbage-Collector-Angriffe. Der dritte teil dieser Arbeit widmet sich der Integrität von Daten, genauer, der Sicherheit sogenannter Nonce-basierten authentisierten Verschlüsselungsverfahren (NAE-Verfahren), welche ebenso wie Passwort-Hashing-Verfahren in der heutigen Sicherheitsinfrastruktur des Internets eine wichtige Rolle spielen. Während Standard-Definitionen keine Sicherheit nach dem Fund einer ersten erfolgreich gefälschten Nachricht betrachten, erweitern wir die Sicherheitsanforderungen dahingehend wie schwer es ist, weitere Fälschungen zu ermitteln. Wir abstrahieren die Funktionsweise von NAEVerfahren in Klassen, analysieren diese systematisch und klassifizieren die Dritt-Runden-Kandidaten des CAESAR-Wettbewerbs, sowie vier weit verbreitete NAE-Verfahren CWC, CCM, EAX und GCM. KW - Kryptologie Y1 - 2017 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:gbv:wim2-20171208-37140 ER - TY - THES A1 - Yuli, Nensi Golda T1 - The Spatial Concept at Moslem Settlements in Current Context of Modern Indonesia Using Phenomenology Method . Case Study: Pathok Negoro Area in Yogyakarta, Indonesia N2 - Settlement is human place to live and do various activities (Finch, 1980). Concept of settlement layout is closely associated with human and a set of thoughts and behaviors. In this case, idea of pattern of activities in a society that is core of a culture becomes main factor in process of formation of houses and environment in a settlement. Factors which affecting form (physical) of architecture in a settlement environment are socio-cultural, economic, and religious determinant factor that manifested architectural realization (Rapoport, 1969). Yogyakarta as the continuation of kingdom city in the Java Island finally exists as an Islamic kingdom that still remain to survive up to now. Impacts of this issue is appearance of various Moslem settlements to support typical character of an Islamic Kingdom. Mlangi is an area of oldest Moslem settlements in Yogyakarta has not been explored in details for progress especially in physical glasses recently. Everything basic group and individual who arrange houses and residences, starts from how it has spatial concept alone. Although concept is a very abstract thing to explain in details, but its existence can be detected by how they created their physical environment. This research conducted by these research questions: (1) What are spatial concepts owned by people in Mlangi and (2) How do spatial concepts owned by the people affect the settlements pattern? Process to search spatial concept owned by the people in Moslem residence, making Mlangi as study area, was approached by using phenomenological research method. The researcher have to self-involved directly in unstructured interviews, but remained in guideline framework of in interviews to make research process effective. Fistly, the researcher interviewed the key person, they are the head of Mlangi administration (pak Dukuh) in Mlangi and Sawahan. They were then give advices to who was capable person that could draw the spatial concept and had many story and knew the history of the settlements. Step by step of interview guided from one informant to next informant when the information had been told repeatedly. The next informant based on the last informant advice or who had close relationship with the last theme appeared. To complete the narration and draw the result of interview, researcher have to add additional information with photograph and descriptive picture that can be draw the settlement empirically. In process, 17 information units which found in field were consistent with sequence of interview events and flowing of theme to theme associated with Moslem residence of residence. Finally the interviews succeeded in abstracting 16 themes that may be classified into historic, socio-cultural, and spatial-concept dimensions in Mlangi. Process of analysis to find spatial concept owned by the people in Moslem settlements was carried out by dialogue of themes to find available substantive relationship. Four concepts successfully analyzed consist of concepts of personage, concept of religious implementation, concept of Jero-Jaba and concept of Interest. The four concepts are really associated with one and others in understanding how spatial concept owned by the people affects residence they occupy. Yet, concept of Jero-Jaba bases all concepts of people in Mlangi . This concept can be used to draw red yarn on how they utilize communal spaces in residence and layout rooms of their individual houses. This concept also eternalize residence patterns existing in Mlangi now where residence does not experience many changes from starting of this residence existence (from detection of generation currently still living), namely residence patterns concentrate on orientation to Masjid Pathok Negoro of Mlangi. This research was opening the potential research area, at least for the sociology, anthropology and demography research interest. So many unique character in Mlangi if looked at from how they maintain their spatial concept and manifested in their daily activities. How the people will concern only for the religious activities and the economic concern only for survival aspect in live. Keywords: spatial concept, moslem settlements, phenomenology method, Indonesia, KW - Siedlung KW - spatial concept KW - Muslim KW - moslem settlements KW - phenomenology method KW - Indonesia Y1 - 2017 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:gbv:wim2-20170419-31257 ER -