added gitignore

This commit is contained in:
paul-loedige 2021-03-21 11:49:07 +01:00
parent 1eaeb2c0f0
commit 2111f49744
11 changed files with 7 additions and 2433 deletions

7
.gitignore vendored Normal file
View File

@ -0,0 +1,7 @@
*
!.gitignore
!*.tex
!chapters
!chapters/*
!images
!images/*

View File

@ -1,6 +0,0 @@
{
"cSpell.words": [
"Brute",
"parity"
]
}

View File

@ -1,224 +0,0 @@
\relax
\providecommand\hyper@newdestlabel[2]{}
\providecommand\zref@newlabel[2]{}
\@nameuse{bbl@beforestart}
\catcode `"\active
\providecommand\HyperFirstAtBeginDocument{\AtBeginDocument}
\HyperFirstAtBeginDocument{\ifx\hyper@anchor\@undefined
\global\let\oldcontentsline\contentsline
\gdef\contentsline#1#2#3#4{\oldcontentsline{#1}{#2}{#3}}
\global\let\oldnewlabel\newlabel
\gdef\newlabel#1#2{\newlabelxx{#1}#2}
\gdef\newlabelxx#1#2#3#4#5#6{\oldnewlabel{#1}{{#2}{#3}}}
\AtEndDocument{\ifx\hyper@anchor\@undefined
\let\contentsline\oldcontentsline
\let\newlabel\oldnewlabel
\fi}
\fi}
\global\let\hyper@last\relax
\gdef\HyperFirstAtBeginDocument#1{#1}
\providecommand\HyField@AuxAddToFields[1]{}
\providecommand\HyField@AuxAddToCoFields[2]{}
\babel@aux{ngerman}{}
\@writefile{toc}{\contentsline {chapter}{\numberline {1}Substitionsverfahren}{4}{chapter.1}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {1.1}Skytale}{4}{section.1.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{4}{section.1.2}\protected@file@percent }
\newlabel{monoalphabet}{{1.2}{4}{Monoalphabetische Substitionsverfahren}{section.1.2}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{5}{subsection.1.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{5}{subsection.1.2.2}\protected@file@percent }
\newlabel{häufigkeit}{{1.2.2}{5}{Häufigkeitsanalyse}{subsection.1.2.2}{}}
\@writefile{toc}{\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{5}{section.1.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{5}{subsection.1.3.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{5}{subsubsection.1.3.1.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{6}{subsection.1.3.2}\protected@file@percent }
\newlabel{otp}{{1.3.2}{6}{One-Time-Pad}{subsection.1.3.2}{}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{6}{subsubsection.1.3.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{6}{subsubsection.1.3.2.2}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{6}{section.1.4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{6}{subsection.1.4.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{6}{subsubsection.1.4.1.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{6}{subsubsection.1.4.1.2}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{7}{chapter.2}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{7}{section.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{7}{section.2.2}\protected@file@percent }
\newlabel{Der Ring Z}{{2.2}{7}{Der Ring $\mathbb {Z}_n$}{section.2.2}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{7}{subsection.2.2.1}\protected@file@percent }
\newlabel{modulare_addition}{{2.2.1}{7}{Addition und Multiplikation}{subsection.2.2.1}{}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{7}{subsubsection.2.2.1.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{7}{subsubsection.2.2.1.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{8}{subsection.2.2.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{8}{subsection.2.2.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{8}{subsubsection.2.2.3.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{8}{subsection.2.2.4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.5}Matrizen}{8}{subsection.2.2.5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{8}{subsubsection.2.2.5.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{8}{subsubsection.2.2.5.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.6}Kartesisches Produkt von Ringen}{8}{subsection.2.2.6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.7}Isomorphie von Ringen}{9}{subsection.2.2.7}\protected@file@percent }
\newlabel{Isomorphie}{{2.2.7}{9}{Isomorphie von Ringen}{subsection.2.2.7}{}}
\@writefile{toc}{\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{9}{section.2.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{9}{subsection.2.3.1}\protected@file@percent }
\newlabel{euklid}{{2.3.1}{9}{Euklid'scher Algorithmus}{subsection.2.3.1}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{9}{subsection.2.3.2}\protected@file@percent }
\newlabel{erweiterter Euklid}{{2.3.2}{9}{erweiterter Euklid'scher Algorithmus}{subsection.2.3.2}{}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{9}{subsubsection.2.3.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{10}{section.2.4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{10}{subsection.2.4.1}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{11}{chapter.3}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {3.1}Vertraulichkeit}{11}{section.3.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{11}{subsection.3.1.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.2}Integrität}{11}{section.3.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{12}{subsection.3.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.3}Authenzität der Daten}{12}{section.3.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{12}{subsection.3.3.1}\protected@file@percent }
\newlabel{signature}{{3.3.1}{12}{Schutzmaßnahme: Signaturen}{subsection.3.3.1}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{12}{subsection.3.3.2}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{12}{section.3.4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{12}{subsection.3.4.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{12}{section.3.5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{13}{subsection.3.5.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{13}{section.3.6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{13}{subsection.3.6.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.7}Verfügbarkeit}{13}{section.3.7}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{13}{subsection.3.7.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.8}Anonymität}{13}{section.3.8}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{14}{chapter.4}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{14}{section.4.1}\protected@file@percent }
\newlabel{kerckhoff}{{4.1}{14}{Das Kerckhoffs'sche Prinzip}{section.4.1}{}}
\@writefile{toc}{\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{14}{section.4.2}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{14}{section.4.3}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.4}Angriffsszenarien}{15}{section.4.4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{15}{subsection.4.4.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{15}{subsection.4.4.2}\protected@file@percent }
\newlabel{known-plaintext}{{4.4.2}{15}{Known-plaintext Angriffe}{subsection.4.4.2}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{15}{subsection.4.4.3}\protected@file@percent }
\newlabel{chosen-plaintext}{{4.4.3}{15}{Chosen-plaintext Angriffe}{subsection.4.4.3}{}}
\@writefile{toc}{\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{15}{section.4.5}\protected@file@percent }
\newlabel{brute-force}{{4.5}{15}{Brute-Force Angriffe}{section.4.5}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{15}{subsection.4.5.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{15}{subsection.4.5.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{15}{subsection.4.5.3}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{16}{section.4.6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{16}{subsection.4.6.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{16}{subsubsection.4.6.1.1}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{17}{chapter.5}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{17}{section.5.1}\protected@file@percent }
\newlabel{synchrone Stromverschlüsselung}{{5.1}{17}{Synchrone Stromverschlüsselungsverfahren}{section.5.1}{}}
\@writefile{toc}{\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{18}{section.5.2}\protected@file@percent }
\newlabel{zustandsabhängige Stromverschlüsselung}{{5.2}{18}{Zustandsabhängige Stromverschlüsselungsverfahren}{section.5.2}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{19}{subsection.5.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{19}{subsubsection.5.2.1.1}\protected@file@percent }
\newlabel{synchron additive Stromverschlüsselung}{{5.2.1.1}{19}{Synchrone additive Stromverschlüsselungsverfahren}{subsubsection.5.2.1.1}{}}
\@writefile{toc}{\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{20}{section.5.3}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{20}{section.5.4}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.5}ChaCha20}{21}{section.5.5}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{22}{section.5.6}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{23}{chapter.6}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\newlabel{Blockverschlüsselungsverfahren}{{6}{23}{Blockverschlüsselungsverfahren}{chapter.6}{}}
\@writefile{toc}{\contentsline {section}{\numberline {6.1}Padding-Verfahren}{23}{section.6.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.2}Betriebsmodi}{23}{section.6.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{23}{subsection.6.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{24}{subsection.6.2.2}\protected@file@percent }
\newlabel{CBC}{{6.2.2}{24}{CBC (Cipher Block Chaining)}{subsection.6.2.2}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{25}{subsection.6.2.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{25}{subsubsection.6.2.3.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{26}{subsubsection.6.2.3.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{26}{subsubsection.6.2.3.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{26}{subsection.6.2.4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{26}{subsection.6.2.5}\protected@file@percent }
\newlabel{OFB}{{6.2.5}{26}{OFB (Output Feedback)}{subsection.6.2.5}{}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{27}{subsubsection.6.2.5.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{27}{subsection.6.2.6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{27}{subsubsection.6.2.6.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{28}{section.6.3}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.4}DES}{28}{section.6.4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{28}{subsection.6.4.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{29}{section.6.5}\protected@file@percent }
\newlabel{meet-in-the-middle}{{6.5}{29}{Meet-in-the-Middle-Angriff}{section.6.5}{}}
\@writefile{toc}{\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{30}{section.6.6}\protected@file@percent }
\newlabel{aes}{{6.6}{30}{AES (Advanced Encryption Standard)}{section.6.6}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.6.1}AES-128}{30}{subsection.6.6.1}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {7}Hashfunktionen}{32}{chapter.7}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\newlabel{Hashfunktionen}{{7}{32}{Hashfunktionen}{chapter.7}{}}
\@writefile{toc}{\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{32}{section.7.1}\protected@file@percent }
\newlabel{schwache Kollisionsfreiheit}{{7.1}{32}{schwache Kollisionsfreiheit}{section.7.1}{}}
\@writefile{toc}{\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{32}{section.7.2}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{33}{section.7.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{33}{subsection.7.3.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{33}{subsubsection.7.3.1.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{33}{subsection.7.3.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{33}{subsection.7.3.3}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{33}{section.7.4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{33}{subsection.7.4.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{34}{subsection.7.4.2}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{34}{section.7.5}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {8}MAC-Verfahren}{36}{chapter.8}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {8.1}HMAC}{36}{section.8.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {8.2}CMAC, CBC-MAC}{36}{section.8.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {8.2.1}CMAC}{36}{subsection.8.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {8.2.2}CBC-MAC}{37}{subsection.8.2.2}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {9}Modulare Arithmetik - Teil 2}{38}{chapter.9}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {9.1}Potenzen}{38}{section.9.1}\protected@file@percent }
\pgfsyspdfmark {pgfid1}{3729359}{26373413}
\@writefile{toc}{\contentsline {subsection}{\numberline {9.1.1}Erzeugnis und Ordnung eines invertierbaren Elements}{38}{subsection.9.1.1}\protected@file@percent }
\pgfsyspdfmark {pgfid2}{3729359}{4826162}
\pgfsyspdfmark {pgfid3}{3729359}{49277275}
\@writefile{toc}{\contentsline {subsection}{\numberline {9.1.2}Faktorenzerlegung}{39}{subsection.9.1.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {9.1.3}Kleiner Satz von Fermat}{39}{subsection.9.1.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {9.1.4}Berechnung modularer Potenzen}{39}{subsection.9.1.4}\protected@file@percent }
\pgfsyspdfmark {pgfid4}{3729359}{14923319}
\pgfsyspdfmark {pgfid5}{3729359}{3729359}
\pgfsyspdfmark {pgfid6}{3729359}{45990840}
\@writefile{toc}{\contentsline {section}{\numberline {9.2}Exkurs: Einheitengruppe $\mathbb {Z}_{p^e}^*$}{40}{section.9.2}\protected@file@percent }
\pgfsyspdfmark {pgfid7}{3729359}{31723834}
\pgfsyspdfmark {pgfid8}{3729359}{24736830}
\@writefile{toc}{\contentsline {subsection}{\numberline {9.2.1}$\mathbb {Z}_{2^e}^*$}{40}{subsection.9.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {9.3}Der chinesische Restsatz}{40}{section.9.3}\protected@file@percent }
\pgfsyspdfmark {pgfid9}{3729359}{48555449}
\@writefile{toc}{\contentsline {subsection}{\numberline {9.3.1}Beispiel}{41}{subsection.9.3.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {9.4}Elemente gerader und ungerader Ordnung in $\mathbb {Z}_n$**}{41}{section.9.4}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {10}Das Diffie-Hellman-Schlüsselaustauschverfahren}{42}{chapter.10}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {10.1}Das DH-Verfahren in Einzelschritten}{42}{section.10.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {10.2}Das Diskrete-Logarithmus-Problem (DL-Problem)}{43}{section.10.2}\protected@file@percent }
\pgfsyspdfmark {pgfid10}{3729359}{29452516}
\@writefile{toc}{\contentsline {subsection}{\numberline {10.2.1}Das Diffie-Hellman-Problem (DH-Problem)}{43}{subsection.10.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {10.3}Beispielanwendung des DH-Verfahrens}{44}{section.10.3}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {10.4}Angriffe auf das DH-Verfahren}{44}{section.10.4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {10.4.1}Pohlig-Hellman-Reduktion}{44}{subsection.10.4.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {10.4.2}Shanks' \glqq Baby Steps Giant Steps\grqq -Verfahren (BSGS-Verfahren)}{44}{subsection.10.4.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {10.4.3}Pollard's Rho-Methode}{45}{subsection.10.4.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {10.4.4}Zahlkörpersieb}{45}{subsection.10.4.4}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {11}Das RSA-Verfahren}{46}{chapter.11}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\pgfsyspdfmark {pgfid11}{3729359}{30434763}
\pgfsyspdfmark {pgfid12}{3729359}{24577382}
\@writefile{toc}{\contentsline {section}{\numberline {11.1}RSA-Schlüsselpaare}{46}{section.11.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {11.1.1}Beispiel für die Schlüsselpaarerstellung}{47}{subsection.11.1.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {11.2}RSA-Verschlüsselungsverfahren}{47}{section.11.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {11.2.1}Beispiel für die Verschlüsselung}{48}{subsection.11.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {11.3}Padding}{48}{section.11.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {11.3.1}Padding nach PKCS\#1}{49}{subsection.11.3.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {11.3.2}Optimal Asymmetric Encryption Padding(OAEP)}{49}{subsection.11.3.2}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {11.4}Das RSA-Signaturverfahren}{49}{section.11.4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {11.4.1}Beispiel für ein RSA-Signaturverfahren}{50}{subsection.11.4.1}\protected@file@percent }

Binary file not shown.

View File

@ -1,276 +0,0 @@
# Fdb version 3
["pdflatex"] 1600547249 "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" "Zusammenfassung_DC" 1600547250
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/3DES.png" 1600198739 21419 7bf85db371a659f085d9c727a1835013 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/AES S-Box.png" 1600269267 23090 2ccce6631c19f6339868594d4b8f11fd ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Abhörung.png" 1599946545 2649 d6dd82c7c38c06d31f966207a71dc01b ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_0.png" 1599947572 2910 b2497355ec1d31d5fce9d57d122a91f3 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_1.png" 1599947589 3427 a39ecab3779301930ce6bed4cf3141a1 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_2.png" 1599947603 3783 f12b3b1eb521e69049eb7e178c05f8b3 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_dec.png" 1600024808 8681 d1beef3bdda855c03f924aa8842c6f10 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_enc.png" 1600024618 9872 3da7196411819ef22737f9578e1e4842 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CFB.png" 1600195504 13020 e68b8a08cf36f46bbd1ab2ae5b4ecd78 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CTR.png" 1600097631 13658 0582e8e8db1e916ebd0932a4aeac6d3f ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/DH-Verfahren.png" 1600533158 129079 548c1404e69fff7c80a5bdef53c62098 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB.png" 1600023997 7379 9b90ee7b021f6a66a389f5bb954ac3ff ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB_Nonce.png" 1600024218 11089 e5625d7199c0bbb3f1d47f8a50c3c7ce ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/OFB.png" 1600194569 13567 2dddea6c9b60e036f71048c5871e260f ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/RSA-Schlüsselpaar.png" 1600543679 89458 27d15a6fd09b7c1f362cb5665bb148b7 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/RSA-Signatur0.png" 1600547126 213295 1d0e136aa8f669572d10e81d7971f80d ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/RSA-Signatur1.png" 1600547140 177551 8f81802ec36c6b880e1c65fe1abffc53 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/RSA-Verschlüsselung.png" 1600544632 94427 024dae69fa8b14b61f5713d15a86c3a5 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Schlüsselstromgenerator mit Nonce.png" 1600006036 6830 255eed9add3dd8e899b4714f95b6f466 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Skytale.png" 1599914207 1414106 7498f70ad27e17e63eb468c2321baa5c ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Stromverschlüsselung.png" 1600000454 11895 926c20089116051531a0564de5026305 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Vignère-Verfahren.png" 1599929213 15507 459514839914b680af2e81b7bdc33933 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/additive zustandsabhängige Stromverschlüsselung.png" 1600002904 12518 bc967e65e429d14761554fef75a94f66 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/meet-in-the-middle.png" 1600265774 13863 06a8efaf92148d386731332c70260dbc ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone Stromverschlüsselung.png" 1600000842 7680 b28ef2007baa9e4c98f402ca8f31b2ba ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone additive Stromverschlüsselung.png" 1600003271 10891 bfed2f0ea0241a4a2a4bf215a3d59c32 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/zustandsabhängige Stromverschlüsselung.png" 1600002333 10276 422a1760594d1c860f8d7aa6dc5ed032 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Übertragungsmanipulation.png" 1599947212 3178 33bbd19fca19c787748d9158d802ceb1 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Inhalt.tex" 1600536186 570 42abfb213e52f41b794bbb286e3e04be ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Packages.tex" 1600531242 648 1a3052f8aafe0eab5f3e960913cc1ebe ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux" 1600547250 23759 765dd16536f0570f1ad5a4449f249bd8 "pdflatex"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out" 1600547250 9817 fd567020e61d6ca173229c178b7c6ab0 "pdflatex"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" 1600516760 357 a0335ff799ae7a1c8ac010ada4e25a6b ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc" 1600547250 13717 67d54cc9baec95b0dc0f23c5d2665508 "pdflatex"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex" 1600535508 17259 593735590bdd63a7ec76ab83cf2848fa ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Diffie-Hellman-Schlüsselaustausch.tex" 1600536085 5728 9bea7f6d9c49081e6e50dbe0dfb67307 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex" 1600448588 10246 7885d54a32da2f0500e74d589ed65022 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex" 1599950390 6191 fdec0aff09dab6668264963cb44ee2f3 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex" 1600449988 2852 e14fb50fd5672a6215d5d27dd7fa0b13 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik - Teil 2.tex" 1600534508 9429 004bda4c3badb937aabedab6844ae663 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex" 1600529293 7698 1c8e8de96ac5d83aa003e539928fae4b ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/RSA-Verfahren.tex" 1600547247 6359 09d44ffdca2a2eec811557e85822fce2 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Stromverschlüsselungsverfahren.tex" 1600194483 9836 ddaca4f3d88a46ce7c40ec5d75657c71 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex" 1600001305 6264 cba30a66f463934bc822d2ee54ac4b90 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Verschlüsselungsverfahren.tex" 1600003902 7321 b77786564ba0de93d6d5b8a73400fcd1 ""
"/usr/local/share/texmf/tex/latex/dirtytalk/dirtytalk.sty" 1599986679 1915 75d8498f106e3f673b6267693e944869 ""
"/usr/local/share/texmf/tex/latex/mdframed/md-frame-1.mdf" 1600516250 24632 760c4c81e779e6958bac43417deb524f ""
"/usr/local/share/texmf/tex/latex/mdframed/mdframed.sty" 1600516250 53487 3e997243f47cb3ba8b4c7b8df9c82989 ""
"/usr/local/share/texmf/tex/latex/needspace/needspace.sty" 1600516701 852 0e34dbb72efc69fa07602405ad95585e ""
"/usr/local/share/texmf/tex/latex/zref/zref-abspage.sty" 1600516525 2275 f674c50b1da0a158a02ffafeda53322d ""
"/usr/local/share/texmf/tex/latex/zref/zref-base.sty" 1600516525 20632 508d53001f8de763d8dd867401d0c8b1 ""
"/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc" 1591545468 2971 def0b6c1f0b107b3b936def894055589 ""
"/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc" 1591545468 2900 1537cc8184ad1792082cd229ecc269f4 ""
"/usr/share/texmf-dist/fonts/map/fontname/texfonts.map" 1591545468 3524 cb3e574dea2d1052e39280babc910dc8 ""
"/usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecbx0600.tfm" 1591545468 3584 ad9fcbc26a2a7bccd6d08b0a5792fbe0 ""
"/usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecbx0800.tfm" 1591545468 3584 269b66e921ba58750c12f7f1c8ea3ebd ""
"/usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecbx1095.tfm" 1591545468 3584 21b378cca2e40816b0e6d74a4dc98f04 ""
"/usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecbx1200.tfm" 1591545468 3584 402da0b29eafbad07963b1224b222f18 ""
"/usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecbx1440.tfm" 1591545468 3584 13049b61b922a28b158a38aeff75ee9b ""
"/usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecbx2074.tfm" 1591545468 3584 7666d038713b9e38abb5c2e0f6972188 ""
"/usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecbx2488.tfm" 1591545468 3584 0181dbc4d429c3ba4e30feba37b5df96 ""
"/usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm0600.tfm" 1591545468 3584 291a5713401683441e0a8c8f4417b17b ""
"/usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm0800.tfm" 1591545468 3584 49064b465390a8e316a3c8417a050403 ""
"/usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm1095.tfm" 1591545468 3584 929cdff2b7a8c11bd4d49fd68cb0ae70 ""
"/usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm1200.tfm" 1591545468 3584 f80ddd985bd00e29e9a6047ebd9d4781 ""
"/usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm1440.tfm" 1591545468 3584 3169d30142b88a27d4ab0e3468e963a2 ""
"/usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm1728.tfm" 1591545468 3584 3c76ccb63eda935a68ba65ba9da29f1a ""
"/usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm2074.tfm" 1591545468 3584 8e2870ec7aa9776f59654942b0923f51 ""
"/usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm2488.tfm" 1591545468 3584 406ad7b70d9a41f7833f92b6313150c8 ""
"/usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecti1095.tfm" 1591545468 3072 b73d2778cc3af44970de4de5e032d7f6 ""
"/usr/share/texmf-dist/fonts/tfm/jknappen/ec/ectt0800.tfm" 1591545468 1536 0b0b8ca286de6a006b681926403f35cd ""
"/usr/share/texmf-dist/fonts/tfm/jknappen/ec/ectt1095.tfm" 1591545468 1536 a988bfe554c1f79514bd46d13c3c64ce ""
"/usr/share/texmf-dist/fonts/tfm/jknappen/ec/ectt1440.tfm" 1591545468 1536 c11bc34b66290f7f0e17b810bad04543 ""
"/usr/share/texmf-dist/fonts/tfm/jknappen/ec/tcrm1095.tfm" 1591545468 1536 02c06700a42be0f5a28664c7273f82e7 ""
"/usr/share/texmf-dist/fonts/tfm/public/amsfonts/cmextra/cmex7.tfm" 1591545468 1004 54797486969f23fa377b128694d548df ""
"/usr/share/texmf-dist/fonts/tfm/public/amsfonts/cmextra/cmex8.tfm" 1591545468 988 bdf658c3bfc2d96d3c8b02cfc1c94c20 ""
"/usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msam10.tfm" 1591545468 916 f87d7c45f9c908e672703b83b72241a3 ""
"/usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msam7.tfm" 1591545468 928 2dc8d444221b7a635bb58038579b861a ""
"/usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msbm10.tfm" 1591545468 908 2921f8a10601f252058503cc6570e581 ""
"/usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msbm7.tfm" 1591545468 940 228d6584342e91276bf566bcf9716b83 ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmbx10.tfm" 1591545468 1328 c834bbb027764024c09d3d2bf908b5f0 ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmbx12.tfm" 1591545468 1324 c910af8c371558dc20f2d7822f66fe64 ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmbx6.tfm" 1591545468 1344 8a0be4fe4d376203000810ad4dc81558 ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmbx7.tfm" 1591545468 1336 3125ccb448c1a09074e3aa4a9832f130 ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmbx8.tfm" 1591545468 1332 1fde11373e221473104d6cc5993f046e ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmex10.tfm" 1591545468 992 662f679a0b3d2d53c1b94050fdaa3f50 ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmmi10.tfm" 1591545468 1528 abec98dbc43e172678c11b3b9031252a ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmmi12.tfm" 1591545468 1524 4414a8315f39513458b80dfc63bff03a ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmmi6.tfm" 1591545468 1512 f21f83efb36853c0b70002322c1ab3ad ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmmi8.tfm" 1591545468 1520 eccf95517727cb11801f4f1aee3a21b4 ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmr10.tfm" 1591545468 1296 45809c5a464d5f32c8f98ba97c1bb47f ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmr12.tfm" 1591545468 1288 655e228510b4c2a1abe905c368440826 ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmr6.tfm" 1591545468 1300 b62933e007d01cfd073f79b963c01526 ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmr8.tfm" 1591545468 1292 21c1c5bfeaebccffdb478fd231a0997d ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmsy10.tfm" 1591545468 1124 6c73e740cf17375f03eec0ee63599741 ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmsy6.tfm" 1591545468 1116 933a60c408fc0a863a92debe84b2d294 ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmsy8.tfm" 1591545468 1120 8b7d695260f3cff42e636090a8002094 ""
"/usr/share/texmf-dist/fonts/tfm/public/rsfs/rsfs10.tfm" 1591545468 688 37338d6ab346c2f1466b29e195316aa4 ""
"/usr/share/texmf-dist/fonts/tfm/public/rsfs/rsfs5.tfm" 1591545468 684 3a51bd4fd9600428d5264cf25f04bb9a ""
"/usr/share/texmf-dist/fonts/tfm/public/rsfs/rsfs7.tfm" 1591545468 692 1b6510779f0f05e9cbf03e0f6c8361e6 ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx10.pfb" 1591545468 34811 78b52f49e893bcba91bd7581cdc144c0 ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx8.pfb" 1591545468 32166 b0c356b15f19587482a9217ce1d8fa67 ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmex10.pfb" 1591545468 30251 6afa5cb1d0204815a708a080681d4674 ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi10.pfb" 1591545468 36299 5f9df58c2139e7edcf37c8fca4bd384d ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb" 1591545468 36741 fa121aac0049305630cf160b86157ee4 ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi6.pfb" 1591545468 37166 8ab3487cbe3ab49ebce74c29ea2418db ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi7.pfb" 1591545468 36281 c355509802a035cadc5f15869451dcee ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi8.pfb" 1591545468 35469 70d41d2b9ea31d5d813066df7c99281c ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb" 1591545468 35752 024fb6c41858982481f6968b5fc26508 ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr6.pfb" 1591545468 32734 69e00a6b65cedb993666e42eedb3d48f ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr8.pfb" 1591545468 32726 0a1aea6fcd6468ee2cf64d891f5c43c8 ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy10.pfb" 1591545468 32569 5e5ddc8df908dea60932f3c484a54c0d ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy6.pfb" 1591545468 32587 1788b0c1c5b39540c96f5e42ccd6dae8 ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy8.pfb" 1591545468 32626 4f5c1b83753b1dd3a97d1b399a005b4b ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cmextra/cmex8.pfb" 1591545468 30273 87a352d78b6810ae5cfdc68d2fb827b2 ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msam10.pfb" 1591545468 31764 459c573c03a4949a528c2cc7f557e217 ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msbm10.pfb" 1591545468 34694 ad62b13721ee8eda1dcc8993c8bd7041 ""
"/usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1095.pfb" 1591545468 154600 ea54091d31de803b613ba9e80ca51709 ""
"/usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1200.pfb" 1591545468 140176 d4962f948b4cc0adf4d3dde77a128c95 ""
"/usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1440.pfb" 1591545468 135942 859a90cad7494a1e79c94baf546d7de5 ""
"/usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2074.pfb" 1591545468 140194 627cc7f36c05b80e25d178974ccb3442 ""
"/usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2488.pfb" 1591545468 135938 299ac3a69892db3b7674a8b2543b0a77 ""
"/usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm0600.pfb" 1591545468 162624 9dcc92cd3b1dfe2ecc80e6da7f2eb6bd ""
"/usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm0800.pfb" 1591545468 164227 3df942b4ff2124425d8fb1b6d3e01c7a ""
"/usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1095.pfb" 1591545468 145929 f25e56369a345c4ff583b067cd87ce8e ""
"/usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1200.pfb" 1591545468 136101 f533469f523533d38317ab5729d00c8a ""
"/usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1728.pfb" 1591545468 131438 3aa300b3e40e5c8ba7b4e5c6cebc5dd6 ""
"/usr/share/texmf-dist/fonts/type1/public/cm-super/sfti1095.pfb" 1591545468 196446 8fbbe4b97b83e5182def6d29a44e57fb ""
"/usr/share/texmf-dist/fonts/type1/public/cm-super/sftt1095.pfb" 1591545468 169670 48d12e69c9a3b23c81f6d703ccbd4554 ""
"/usr/share/texmf-dist/fonts/type1/public/cm-super/sftt1440.pfb" 1591545468 166192 d74933432e33dffe92198fe51b7b0dcb ""
"/usr/share/texmf-dist/fonts/type1/public/rsfs/rsfs10.pfb" 1591545468 16077 4737ac34f0fb5608550f3780a0202c22 ""
"/usr/share/texmf-dist/tex/context/base/mkii/supp-pdf.mkii" 1591545468 71627 94eb9990bed73c364d7f53f960cc8c5b ""
"/usr/share/texmf-dist/tex/generic/atbegshi/atbegshi.sty" 1591545468 24708 5584a51a7101caf7e6bbf1fc27d8f7b1 ""
"/usr/share/texmf-dist/tex/generic/babel-german/ngerman.ldf" 1591545468 2164 da22692bce498dcc4f70209c7185a346 ""
"/usr/share/texmf-dist/tex/generic/babel-german/ngermanb.ldf" 1591545468 7584 40e9a51a28a966f337267407ea4ab873 ""
"/usr/share/texmf-dist/tex/generic/babel/babel.def" 1591545468 107158 a58f7a1696ebeb13376aa0f8720600d4 ""
"/usr/share/texmf-dist/tex/generic/babel/babel.sty" 1591545468 35343 180ff3fc8cf1d846a7f48b26f8aa7c17 ""
"/usr/share/texmf-dist/tex/generic/babel/txtbabel.def" 1591545468 5211 2c3605e674ad86cdc9fdcfcd3de3a1da ""
"/usr/share/texmf-dist/tex/generic/bigintcalc/bigintcalc.sty" 1591545468 40635 c40361e206be584d448876bba8a64a3b ""
"/usr/share/texmf-dist/tex/generic/bitset/bitset.sty" 1591545468 33961 6b5c75130e435b2bfdb9f480a09a39f9 ""
"/usr/share/texmf-dist/tex/generic/etexcmds/etexcmds.sty" 1591545468 7734 b98cbb34c81f667027c1e3ebdbfce34b ""
"/usr/share/texmf-dist/tex/generic/gettitlestring/gettitlestring.sty" 1591545468 8371 9d55b8bd010bc717624922fb3477d92e ""
"/usr/share/texmf-dist/tex/generic/iftex/iftex.sty" 1591545468 6501 4011d89d9621e0b0901138815ba5ff29 ""
"/usr/share/texmf-dist/tex/generic/iftex/ifvtex.sty" 1591545468 1057 525c2192b5febbd8c1f662c9468335bb ""
"/usr/share/texmf-dist/tex/generic/infwarerr/infwarerr.sty" 1591545468 8356 7bbb2c2373aa810be568c29e333da8ed ""
"/usr/share/texmf-dist/tex/generic/intcalc/intcalc.sty" 1591545468 31769 002a487f55041f8e805cfbf6385ffd97 ""
"/usr/share/texmf-dist/tex/generic/kvdefinekeys/kvdefinekeys.sty" 1591545468 5412 d5a2436094cd7be85769db90f29250a6 ""
"/usr/share/texmf-dist/tex/generic/kvsetkeys/kvsetkeys.sty" 1591545468 13807 952b0226d4efca026f0e19dd266dcc22 ""
"/usr/share/texmf-dist/tex/generic/ltxcmds/ltxcmds.sty" 1591545468 18552 1e1cc7b75da0dfaacce7cdcb27d306bf ""
"/usr/share/texmf-dist/tex/generic/pdfescape/pdfescape.sty" 1591545468 19007 15924f7228aca6c6d184b115f4baa231 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcore.code.tex" 1591545468 992 fb3cda354707a54fda62787a411c7c22 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorearrows.code.tex" 1591545468 43820 bc6cf5aa959817914ace33f5c6232161 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreexternal.code.tex" 1591545468 19324 c9a64402f22bd8d81821141a357af653 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoregraphicstate.code.tex" 1591545468 6038 d639d02574be9a72f3c602c2a3510e02 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreimage.code.tex" 1591545468 6948 284bbe3c9a7ca0a826c1c03895e69b9f ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorelayers.code.tex" 1591545468 4883 a6f3eb1f71d8c4affaf43a169828b043 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreobjects.code.tex" 1591545468 2544 3b1b198fd49f01e328adc9162a07b213 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathconstruct.code.tex" 1591545468 44189 1fd6229dad4c898883516c032f2ca5d2 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathprocessing.code.tex" 1591545468 17311 3092579be20ef0f229c42ad3f09da85c ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathusage.code.tex" 1591545468 21302 d6c4b340248adbe650ebf6ca76bdccca ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepatterns.code.tex" 1591545468 9690 7585efa5a591822837f837bc5bc35621 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepoints.code.tex" 1591545468 33335 942ccafe284041918d36e54696b98aa7 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorequick.code.tex" 1591545468 2965 502761b60f43ab2de5ecb2f4625163ae ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorerdf.code.tex" 1591545468 5196 f8c5c775d4d6e2cb050392127cabda72 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorescopes.code.tex" 1591545468 20726 ed6ec1d6f0f35e7a93de4e79af83dbce ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreshade.code.tex" 1591545468 35249 144a6b9c4df4644618bb3a0a40472608 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoretransformations.code.tex" 1591545468 21989 266e83c51fe41eb8b8d5e6896dc71cc1 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoretransparency.code.tex" 1591545468 8842 5cc856e132fac404805c6da091779283 ""
"/usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/libraries/tikzlibrarytopaths.code.tex" 1591545468 11544 2a5d66a3270abf4ef673e8a0b7734a90 ""
"/usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/tikz.code.tex" 1591545468 187592 7922ceab1864698dec4c84978d5b182f ""
"/usr/share/texmf-dist/tex/generic/pgf/libraries/pgflibraryplothandlers.code.tex" 1591545468 32995 a4d54c043ae5274ceaaddeb36ad43a6f ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfint.code.tex" 1591545468 3063 8c415c68a0f3394e45cfeca0b65f6ee6 ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex" 1591545468 521 c70cf6ad609de83a27ee7929eb356332 ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathcalc.code.tex" 1591545468 13391 933cab19c6d27039dbfc487330d1005a ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfloat.code.tex" 1591545468 104938 15f2d8bdabd6bf9ca70f62cd8e3d4940 ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.base.code.tex" 1591545468 10157 218d58ab074e5bd0d027de45ec64cc00 ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.basic.code.tex" 1591545468 28176 568b081ec39645f2db1a29fbd0c635e2 ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.code.tex" 1591545468 9054 388d21239a1b6df2cc8beaae31c976b0 ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.comparison.code.tex" 1591545468 3865 cddf7ddc80f018587c55afdcc79fc333 ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.integerarithmetics.code.tex" 1591545468 3177 27d85c44fbfe09ff3b2cf2879e3ea434 ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.misc.code.tex" 1591545468 10925 df50b8a6e5660a585e3a2bf55726dcc8 ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.random.code.tex" 1591545468 7787 1750fc3f164703caf31fc8ea9218c67e ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.round.code.tex" 1591545468 3379 cbd0948a550bd7a495a160ca6beee9ed ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.trigonometric.code.tex" 1591545468 92405 bba89470858d7b0788a9c09331c39653 ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathparser.code.tex" 1591545468 36526 453db1f8626a56b5ebb0fad496d6a39f ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathutil.code.tex" 1591545468 8471 b18959397c76e1e582402ab9f592ed9f ""
"/usr/share/texmf-dist/tex/generic/pgf/modules/pgfmodulematrix.code.tex" 1591545468 21201 46a4dded6619f990ac7347f99fbaac9f ""
"/usr/share/texmf-dist/tex/generic/pgf/modules/pgfmoduleplot.code.tex" 1591545468 16121 9e240115374a8d489f2f786115df83a9 ""
"/usr/share/texmf-dist/tex/generic/pgf/modules/pgfmoduleshapes.code.tex" 1591545468 43259 3e05ba63539916af2eaca603c2eda780 ""
"/usr/share/texmf-dist/tex/generic/pgf/pgf.revision.tex" 1591545468 465 1f401ab1e7fc6cb7ede39e96c66531fd ""
"/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgf.cfg" 1591545468 926 70ff613fabeb70f5d1673dc0c93987bd ""
"/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys-common-pdf.def" 1591545468 5546 3586827e6032c95512b2a6682d2979a3 ""
"/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys-pdftex.def" 1591545468 12603 c02869ea216d842c29d52fae8738264e ""
"/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys.code.tex" 1591545468 60269 e86bc0081af83a4ad47e4500ee09a2e4 ""
"/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsysprotocol.code.tex" 1591545468 1896 82c274ff520f9e450ccea4e3ef4edc12 ""
"/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsyssoftpath.code.tex" 1591545468 7778 a25a32a10ca820357491d4c7b3ac02ea ""
"/usr/share/texmf-dist/tex/generic/pgf/utilities/pgffor.code.tex" 1591545468 23777 cb6c8f02f87d86d621f5cb92c44f4998 ""
"/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeys.code.tex" 1591545468 36815 f7f1772c398f07af2cb741992963045c ""
"/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeysfiltered.code.tex" 1591545468 37439 bd44d50aef702b03193f731207931834 ""
"/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfrcs.code.tex" 1591545468 4494 7e5ace0ccf59408f2cf63219a5d36927 ""
"/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-common-lists.tex" 1591545468 7250 03b2b9fb5fa38e7ca5cc3c45860fb210 ""
"/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-common.tex" 1591545468 28309 488ccc6c701bbdd1bf671f708757aa5c ""
"/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-latex.def" 1591545468 6286 1bd76fc45da9929ab2a64f51cba3ab6f ""
"/usr/share/texmf-dist/tex/generic/uniquecounter/uniquecounter.sty" 1591545468 7008 f92eaa0a3872ed622bbf538217cd2ab7 ""
"/usr/share/texmf-dist/tex/latex/amsfonts/amsfonts.sty" 1591545468 5949 3f3fd50a8cc94c3d4cbf4fc66cd3df1c ""
"/usr/share/texmf-dist/tex/latex/amsfonts/amssymb.sty" 1591545468 13829 94730e64147574077f8ecfea9bb69af4 ""
"/usr/share/texmf-dist/tex/latex/amsfonts/umsa.fd" 1591545468 961 6518c6525a34feb5e8250ffa91731cff ""
"/usr/share/texmf-dist/tex/latex/amsfonts/umsb.fd" 1591545468 961 d02606146ba5601b5645f987c92e6193 ""
"/usr/share/texmf-dist/tex/latex/amsmath/amsbsy.sty" 1591545468 2211 ca7ce284ab93c8eecdc6029dc5ccbd73 ""
"/usr/share/texmf-dist/tex/latex/amsmath/amsgen.sty" 1591545468 4161 7f6eb9092061a11f87d08ed13515b48d ""
"/usr/share/texmf-dist/tex/latex/amsmath/amsmath.sty" 1591545468 85660 baee036978c7a91f4e2bba43f05e5945 ""
"/usr/share/texmf-dist/tex/latex/amsmath/amsopn.sty" 1591545468 4116 32e6abd27229755a83a8b7f18e583890 ""
"/usr/share/texmf-dist/tex/latex/amsmath/amstext.sty" 1591545468 2432 8ff93b1137020e8f21930562a874ae66 ""
"/usr/share/texmf-dist/tex/latex/atveryend/atveryend.sty" 1591545468 19336 ce7ae9438967282886b3b036cfad1e4d ""
"/usr/share/texmf-dist/tex/latex/auxhook/auxhook.sty" 1591545468 3935 57aa3c3e203a5c2effb4d2bd2efbc323 ""
"/usr/share/texmf-dist/tex/latex/base/fontenc.sty" 1591545468 4947 0c2888dd88121ae675fc6e82213623ba ""
"/usr/share/texmf-dist/tex/latex/base/ifthen.sty" 1591545468 5159 892429808d9e0e2b3548aaefd9a06ed0 ""
"/usr/share/texmf-dist/tex/latex/base/inputenc.sty" 1591545468 5050 8933a39ad74377accd18991c5eb90c58 ""
"/usr/share/texmf-dist/tex/latex/base/report.cls" 1591545468 23082 a0e9a5941c744eda6abe56770037a201 ""
"/usr/share/texmf-dist/tex/latex/base/size11.clo" 1591545468 8462 61fdf79debfc3dc4dab35ec6cf83fbf7 ""
"/usr/share/texmf-dist/tex/latex/base/t1cmtt.fd" 1591545468 2444 92c1f2a3fb5fbd5ac60f99eac55c9b29 ""
"/usr/share/texmf-dist/tex/latex/epstopdf-pkg/epstopdf-base.sty" 1591545468 13886 d1306dcf79a944f6988e688c1785f9ce ""
"/usr/share/texmf-dist/tex/latex/etoolbox/etoolbox.sty" 1591545468 45259 743c52a37a6e5ed83cfe0e128b2da10d ""
"/usr/share/texmf-dist/tex/latex/geometry/geometry.sty" 1591545468 41601 9cf6c5257b1bc7af01a58859749dd37a ""
"/usr/share/texmf-dist/tex/latex/graphics-cfg/color.cfg" 1591545468 1213 620bba36b25224fa9b7e1ccb4ecb76fd ""
"/usr/share/texmf-dist/tex/latex/graphics-cfg/graphics.cfg" 1591545468 1224 978390e9c2234eab29404bc21b268d1e ""
"/usr/share/texmf-dist/tex/latex/graphics-def/pdftex.def" 1591545468 17448 c8e20d5f7e69b0cbecf82ab29daeebd9 ""
"/usr/share/texmf-dist/tex/latex/graphics/graphics.sty" 1591545468 16932 04729abe63b66ec59ea56edcd722b058 ""
"/usr/share/texmf-dist/tex/latex/graphics/graphicx.sty" 1591545468 9067 1b996612394a52e1efe89c8bfe8a5892 ""
"/usr/share/texmf-dist/tex/latex/graphics/keyval.sty" 1591545468 2590 e3b24ff953e5b58d924f163d25380312 ""
"/usr/share/texmf-dist/tex/latex/graphics/trig.sty" 1591545468 3976 d7fa7d81d2870d509d25b17d0245e735 ""
"/usr/share/texmf-dist/tex/latex/hycolor/hycolor.sty" 1591545468 17914 4c28a13fc3d975e6e81c9bea1d697276 ""
"/usr/share/texmf-dist/tex/latex/hyperref/hpdftex.def" 1591545468 50570 2e81797743231d9037b0cbe3436d74ba ""
"/usr/share/texmf-dist/tex/latex/hyperref/hyperref.sty" 1591545468 236775 8ab18a05f69e6caef423fa59cb0af03b ""
"/usr/share/texmf-dist/tex/latex/hyperref/nameref.sty" 1591545468 13244 0070bcab7b5a88187847128d22faf4d8 ""
"/usr/share/texmf-dist/tex/latex/hyperref/pd1enc.def" 1591545468 14134 c11767c54bd7ecab56984ee4e4e3158c ""
"/usr/share/texmf-dist/tex/latex/jknapltx/mathrsfs.sty" 1591545468 300 12fa6f636b617656f2810ee82cb05015 ""
"/usr/share/texmf-dist/tex/latex/jknapltx/ursfs.fd" 1591545468 548 cc4e3557704bfed27c7002773fad6c90 ""
"/usr/share/texmf-dist/tex/latex/kvoptions/kvoptions.sty" 1591545468 22520 c4c2dab203104295e1e618be7e5c0f5b ""
"/usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdfmode.def" 1591545468 25742 5de23a2d2bc67a3139433e702e64a437 ""
"/usr/share/texmf-dist/tex/latex/l3kernel/expl3.sty" 1591545468 4713 eb01a5180e90c7ac1715bb64e2c31227 ""
"/usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse-generic.tex" 1591545468 80141 edbf9289c99ff37db17116af7a3a423f ""
"/usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse.sty" 1591545468 5914 5eaa255b13fb7a5e47ededc8ec098dba ""
"/usr/share/texmf-dist/tex/latex/latexconfig/epstopdf-sys.cfg" 1591545468 678 4792914a8f45be57bb98413425e4c7af ""
"/usr/share/texmf-dist/tex/latex/letltxmacro/letltxmacro.sty" 1591545468 5766 13a9e8766c47f30327caf893ece86ac8 ""
"/usr/share/texmf-dist/tex/latex/listings/listings.cfg" 1591545468 1830 e31effa752c61538383451ae21332364 ""
"/usr/share/texmf-dist/tex/latex/listings/listings.sty" 1591545468 80964 64e57373f36316e4a09b517cbf1aba2e ""
"/usr/share/texmf-dist/tex/latex/listings/lstmisc.sty" 1591545468 77022 ee25ce086f4a79d8cf73bac6f94c02a5 ""
"/usr/share/texmf-dist/tex/latex/ms/everyshi.sty" 1591545468 3878 6aa7c08ff2621006e0603349e40a30a8 ""
"/usr/share/texmf-dist/tex/latex/pdftexcmds/pdftexcmds.sty" 1591545468 19989 e08c4750d96640367c4b141017eda013 ""
"/usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgf.sty" 1591545468 1090 d20f587ea9464d1841bd0d13d3ff9856 ""
"/usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgfcore.sty" 1591545468 410 5bf12ea7330e5f12c445332a4fe9a263 ""
"/usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-0-65.sty" 1591545468 21013 e98e1aaaf40d31632787c2bd25d24b57 ""
"/usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-1-18.sty" 1591545468 989 2cf3da8e8ec55131c49389428d565e37 ""
"/usr/share/texmf-dist/tex/latex/pgf/frontendlayer/tikz.sty" 1591545468 339 592cf35cba3d400082b8a9a5d0199d70 ""
"/usr/share/texmf-dist/tex/latex/pgf/math/pgfmath.sty" 1591545468 306 0796eafca5e159e6ec2167a6d22d81b1 ""
"/usr/share/texmf-dist/tex/latex/pgf/systemlayer/pgfsys.sty" 1591545468 443 0b2e781830192df35c0fd357cf13e26e ""
"/usr/share/texmf-dist/tex/latex/pgf/utilities/pgffor.sty" 1591545468 348 8927fde343487e003b01a4c2ca34073b ""
"/usr/share/texmf-dist/tex/latex/pgf/utilities/pgfkeys.sty" 1591545468 274 4cad6e665cc93ac2ac979039a94fa1e1 ""
"/usr/share/texmf-dist/tex/latex/pgf/utilities/pgfrcs.sty" 1591545468 325 2bcd023400636339210573e2b3ee298b ""
"/usr/share/texmf-dist/tex/latex/refcount/refcount.sty" 1591545468 9878 9e94e8fa600d95f9c7731bb21dfb67a4 ""
"/usr/share/texmf-dist/tex/latex/rerunfilecheck/rerunfilecheck.sty" 1591545468 9715 b051d5b493d9fe5f4bc251462d039e5f ""
"/usr/share/texmf-dist/tex/latex/tools/enumerate.sty" 1591545468 3469 19b6cb25f21abe53fb90b9fe27615441 ""
"/usr/share/texmf-dist/tex/latex/url/url.sty" 1591545468 12796 8edb7d69a20b857904dd0ea757c14ec9 ""
"/usr/share/texmf-dist/tex/latex/xcolor/xcolor.sty" 1591545468 55589 34128738f682d033422ca125f82e5d62 ""
"/usr/share/texmf-dist/web2c/texmf.cnf" 1591545468 33301 a3134070eacafb10b1f371612ce2650d ""
"/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map" 1599837712 334180 163417853e75f7c89e92e140d6d6e976 ""
"/var/lib/texmf/web2c/pdftex/pdflatex.fmt" 1599837703 2514050 ecf9fe402c479fca46412778ddf38de8 ""
(generated)
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.log"

View File

@ -1,478 +0,0 @@
PWD /home/paul/Storage/Nextcloud/Documents/TH/Datensicherheit (DC)/Zusammenfassung
INPUT /usr/share/texmf-dist/web2c/texmf.cnf
INPUT /var/lib/texmf/web2c/pdftex/pdflatex.fmt
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex
OUTPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.log
INPUT /usr/share/texmf-dist/tex/latex/base/report.cls
INPUT /usr/share/texmf-dist/tex/latex/base/report.cls
INPUT /usr/share/texmf-dist/tex/latex/base/size11.clo
INPUT /usr/share/texmf-dist/tex/latex/base/size11.clo
INPUT /usr/share/texmf-dist/fonts/map/fontname/texfonts.map
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmr10.tfm
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Packages.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Packages.tex
INPUT /usr/share/texmf-dist/tex/latex/geometry/geometry.sty
INPUT /usr/share/texmf-dist/tex/latex/geometry/geometry.sty
INPUT /usr/share/texmf-dist/tex/latex/graphics/keyval.sty
INPUT /usr/share/texmf-dist/tex/latex/graphics/keyval.sty
INPUT /usr/share/texmf-dist/tex/generic/iftex/ifvtex.sty
INPUT /usr/share/texmf-dist/tex/generic/iftex/ifvtex.sty
INPUT /usr/share/texmf-dist/tex/generic/iftex/iftex.sty
INPUT /usr/share/texmf-dist/tex/generic/iftex/iftex.sty
INPUT /usr/share/texmf-dist/tex/latex/base/inputenc.sty
INPUT /usr/share/texmf-dist/tex/latex/base/inputenc.sty
INPUT /usr/share/texmf-dist/tex/latex/base/fontenc.sty
INPUT /usr/share/texmf-dist/tex/latex/base/fontenc.sty
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm1095.tfm
INPUT /usr/share/texmf-dist/tex/generic/babel/babel.sty
INPUT /usr/share/texmf-dist/tex/generic/babel/babel.sty
INPUT /usr/share/texmf-dist/tex/generic/babel/babel.def
INPUT /usr/share/texmf-dist/tex/generic/babel/txtbabel.def
INPUT /usr/share/texmf-dist/tex/generic/babel-german/ngerman.ldf
INPUT /usr/share/texmf-dist/tex/generic/babel-german/ngerman.ldf
INPUT /usr/share/texmf-dist/tex/generic/babel-german/ngermanb.ldf
INPUT /usr/share/texmf-dist/tex/latex/graphics/graphicx.sty
INPUT /usr/share/texmf-dist/tex/latex/graphics/graphicx.sty
INPUT /usr/share/texmf-dist/tex/latex/graphics/graphics.sty
INPUT /usr/share/texmf-dist/tex/latex/graphics/graphics.sty
INPUT /usr/share/texmf-dist/tex/latex/graphics/trig.sty
INPUT /usr/share/texmf-dist/tex/latex/graphics/trig.sty
INPUT /usr/share/texmf-dist/tex/latex/graphics-cfg/graphics.cfg
INPUT /usr/share/texmf-dist/tex/latex/graphics-cfg/graphics.cfg
INPUT /usr/share/texmf-dist/tex/latex/graphics-def/pdftex.def
INPUT /usr/share/texmf-dist/tex/latex/graphics-def/pdftex.def
INPUT /usr/share/texmf-dist/tex/latex/amsmath/amsmath.sty
INPUT /usr/share/texmf-dist/tex/latex/amsmath/amsmath.sty
INPUT /usr/share/texmf-dist/tex/latex/amsmath/amstext.sty
INPUT /usr/share/texmf-dist/tex/latex/amsmath/amstext.sty
INPUT /usr/share/texmf-dist/tex/latex/amsmath/amsgen.sty
INPUT /usr/share/texmf-dist/tex/latex/amsmath/amsgen.sty
INPUT /usr/share/texmf-dist/tex/latex/amsmath/amsbsy.sty
INPUT /usr/share/texmf-dist/tex/latex/amsmath/amsbsy.sty
INPUT /usr/share/texmf-dist/tex/latex/amsmath/amsopn.sty
INPUT /usr/share/texmf-dist/tex/latex/amsmath/amsopn.sty
INPUT /usr/share/texmf-dist/tex/latex/amsfonts/amssymb.sty
INPUT /usr/share/texmf-dist/tex/latex/amsfonts/amssymb.sty
INPUT /usr/share/texmf-dist/tex/latex/amsfonts/amsfonts.sty
INPUT /usr/share/texmf-dist/tex/latex/amsfonts/amsfonts.sty
INPUT /usr/share/texmf-dist/tex/latex/jknapltx/mathrsfs.sty
INPUT /usr/share/texmf-dist/tex/latex/jknapltx/mathrsfs.sty
INPUT /usr/share/texmf-dist/tex/latex/xcolor/xcolor.sty
INPUT /usr/share/texmf-dist/tex/latex/xcolor/xcolor.sty
INPUT /usr/share/texmf-dist/tex/latex/graphics-cfg/color.cfg
INPUT /usr/share/texmf-dist/tex/latex/graphics-cfg/color.cfg
INPUT /usr/share/texmf-dist/tex/latex/listings/listings.sty
INPUT /usr/share/texmf-dist/tex/latex/listings/listings.sty
INPUT /usr/share/texmf-dist/tex/latex/listings/lstmisc.sty
INPUT /usr/share/texmf-dist/tex/latex/listings/lstmisc.sty
INPUT /usr/share/texmf-dist/tex/latex/listings/listings.cfg
INPUT /usr/share/texmf-dist/tex/latex/listings/listings.cfg
INPUT /usr/local/share/texmf/tex/latex/dirtytalk/dirtytalk.sty
INPUT /usr/local/share/texmf/tex/latex/dirtytalk/dirtytalk.sty
INPUT /usr/share/texmf-dist/tex/latex/kvoptions/kvoptions.sty
INPUT /usr/share/texmf-dist/tex/latex/kvoptions/kvoptions.sty
INPUT /usr/share/texmf-dist/tex/generic/ltxcmds/ltxcmds.sty
INPUT /usr/share/texmf-dist/tex/generic/ltxcmds/ltxcmds.sty
INPUT /usr/share/texmf-dist/tex/generic/kvsetkeys/kvsetkeys.sty
INPUT /usr/share/texmf-dist/tex/generic/kvsetkeys/kvsetkeys.sty
INPUT /usr/share/texmf-dist/tex/latex/base/ifthen.sty
INPUT /usr/share/texmf-dist/tex/latex/base/ifthen.sty
INPUT /usr/share/texmf-dist/tex/latex/hyperref/hyperref.sty
INPUT /usr/share/texmf-dist/tex/latex/hyperref/hyperref.sty
INPUT /usr/share/texmf-dist/tex/latex/pdftexcmds/pdftexcmds.sty
INPUT /usr/share/texmf-dist/tex/latex/pdftexcmds/pdftexcmds.sty
INPUT /usr/share/texmf-dist/tex/generic/infwarerr/infwarerr.sty
INPUT /usr/share/texmf-dist/tex/generic/infwarerr/infwarerr.sty
INPUT /usr/share/texmf-dist/tex/generic/kvdefinekeys/kvdefinekeys.sty
INPUT /usr/share/texmf-dist/tex/generic/kvdefinekeys/kvdefinekeys.sty
INPUT /usr/share/texmf-dist/tex/generic/pdfescape/pdfescape.sty
INPUT /usr/share/texmf-dist/tex/generic/pdfescape/pdfescape.sty
INPUT /usr/share/texmf-dist/tex/latex/hycolor/hycolor.sty
INPUT /usr/share/texmf-dist/tex/latex/hycolor/hycolor.sty
INPUT /usr/share/texmf-dist/tex/latex/letltxmacro/letltxmacro.sty
INPUT /usr/share/texmf-dist/tex/latex/letltxmacro/letltxmacro.sty
INPUT /usr/share/texmf-dist/tex/latex/auxhook/auxhook.sty
INPUT /usr/share/texmf-dist/tex/latex/auxhook/auxhook.sty
INPUT /usr/share/texmf-dist/tex/latex/hyperref/pd1enc.def
INPUT /usr/share/texmf-dist/tex/latex/hyperref/pd1enc.def
INPUT /usr/share/texmf-dist/tex/generic/intcalc/intcalc.sty
INPUT /usr/share/texmf-dist/tex/generic/intcalc/intcalc.sty
INPUT /usr/share/texmf-dist/tex/generic/etexcmds/etexcmds.sty
INPUT /usr/share/texmf-dist/tex/generic/etexcmds/etexcmds.sty
INPUT /usr/share/texmf-dist/tex/latex/url/url.sty
INPUT /usr/share/texmf-dist/tex/latex/url/url.sty
INPUT /usr/share/texmf-dist/tex/generic/bitset/bitset.sty
INPUT /usr/share/texmf-dist/tex/generic/bitset/bitset.sty
INPUT /usr/share/texmf-dist/tex/generic/bigintcalc/bigintcalc.sty
INPUT /usr/share/texmf-dist/tex/generic/bigintcalc/bigintcalc.sty
INPUT /usr/share/texmf-dist/tex/generic/atbegshi/atbegshi.sty
INPUT /usr/share/texmf-dist/tex/generic/atbegshi/atbegshi.sty
INPUT /usr/share/texmf-dist/tex/latex/hyperref/hpdftex.def
INPUT /usr/share/texmf-dist/tex/latex/hyperref/hpdftex.def
INPUT /usr/share/texmf-dist/tex/latex/atveryend/atveryend.sty
INPUT /usr/share/texmf-dist/tex/latex/atveryend/atveryend.sty
INPUT /usr/share/texmf-dist/tex/latex/rerunfilecheck/rerunfilecheck.sty
INPUT /usr/share/texmf-dist/tex/latex/rerunfilecheck/rerunfilecheck.sty
INPUT /usr/share/texmf-dist/tex/generic/uniquecounter/uniquecounter.sty
INPUT /usr/share/texmf-dist/tex/generic/uniquecounter/uniquecounter.sty
INPUT /usr/local/share/texmf/tex/latex/mdframed/mdframed.sty
INPUT /usr/local/share/texmf/tex/latex/mdframed/mdframed.sty
INPUT /usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse.sty
INPUT /usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse.sty
INPUT /usr/share/texmf-dist/tex/latex/l3kernel/expl3.sty
INPUT /usr/share/texmf-dist/tex/latex/l3kernel/expl3.sty
INPUT /usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdfmode.def
INPUT /usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdfmode.def
INPUT /usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse-generic.tex
INPUT /usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse-generic.tex
INPUT /usr/share/texmf-dist/tex/latex/etoolbox/etoolbox.sty
INPUT /usr/share/texmf-dist/tex/latex/etoolbox/etoolbox.sty
INPUT /usr/local/share/texmf/tex/latex/zref/zref-abspage.sty
INPUT /usr/local/share/texmf/tex/latex/zref/zref-abspage.sty
INPUT /usr/local/share/texmf/tex/latex/zref/zref-base.sty
INPUT /usr/local/share/texmf/tex/latex/zref/zref-base.sty
INPUT /usr/local/share/texmf/tex/latex/needspace/needspace.sty
INPUT /usr/local/share/texmf/tex/latex/needspace/needspace.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/frontendlayer/tikz.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/frontendlayer/tikz.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/frontendlayer/tikz.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgf.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgf.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/utilities/pgfrcs.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/utilities/pgfrcs.sty
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-common.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-common-lists.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-latex.def
INPUT /usr/share/texmf-dist/tex/latex/ms/everyshi.sty
INPUT /usr/share/texmf-dist/tex/latex/ms/everyshi.sty
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfrcs.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfrcs.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/pgf.revision.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/pgf.revision.tex
INPUT /usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgfcore.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgfcore.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/systemlayer/pgfsys.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/systemlayer/pgfsys.sty
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeys.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeysfiltered.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgf.cfg
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys-pdftex.def
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys-pdftex.def
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys-common-pdf.def
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsyssoftpath.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsyssoftpath.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsysprotocol.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsysprotocol.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcore.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcore.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathcalc.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathutil.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathparser.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.basic.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.trigonometric.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.random.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.comparison.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.base.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.round.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.misc.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.integerarithmetics.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfloat.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfint.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepoints.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathconstruct.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathusage.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorescopes.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoregraphicstate.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoretransformations.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorequick.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreobjects.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathprocessing.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorearrows.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreshade.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreimage.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreexternal.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorelayers.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoretransparency.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepatterns.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorerdf.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/modules/pgfmoduleshapes.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/modules/pgfmoduleplot.code.tex
INPUT /usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-0-65.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-0-65.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-1-18.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-1-18.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/utilities/pgffor.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/utilities/pgffor.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/utilities/pgfkeys.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/utilities/pgfkeys.sty
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeys.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeys.code.tex
INPUT /usr/share/texmf-dist/tex/latex/pgf/math/pgfmath.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/math/pgfmath.sty
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgffor.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgffor.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/tikz.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/tikz.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/libraries/pgflibraryplothandlers.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/libraries/pgflibraryplothandlers.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/modules/pgfmodulematrix.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/libraries/tikzlibrarytopaths.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/libraries/tikzlibrarytopaths.code.tex
INPUT /usr/local/share/texmf/tex/latex/mdframed/md-frame-1.mdf
INPUT /usr/local/share/texmf/tex/latex/mdframed/md-frame-1.mdf
INPUT /usr/share/texmf-dist/tex/latex/tools/enumerate.sty
INPUT /usr/share/texmf-dist/tex/latex/tools/enumerate.sty
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux
OUTPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux
INPUT /usr/share/texmf-dist/tex/context/base/mkii/supp-pdf.mkii
INPUT /usr/share/texmf-dist/tex/context/base/mkii/supp-pdf.mkii
INPUT /usr/share/texmf-dist/tex/latex/epstopdf-pkg/epstopdf-base.sty
INPUT /usr/share/texmf-dist/tex/latex/epstopdf-pkg/epstopdf-base.sty
INPUT /usr/share/texmf-dist/tex/latex/latexconfig/epstopdf-sys.cfg
INPUT /usr/share/texmf-dist/tex/latex/latexconfig/epstopdf-sys.cfg
INPUT /usr/share/texmf-dist/tex/latex/hyperref/nameref.sty
INPUT /usr/share/texmf-dist/tex/latex/hyperref/nameref.sty
INPUT /usr/share/texmf-dist/tex/latex/refcount/refcount.sty
INPUT /usr/share/texmf-dist/tex/latex/refcount/refcount.sty
INPUT /usr/share/texmf-dist/tex/generic/gettitlestring/gettitlestring.sty
INPUT /usr/share/texmf-dist/tex/generic/gettitlestring/gettitlestring.sty
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
OUTPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
OUTPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm1728.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm1200.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmr12.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmr8.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmr6.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmmi12.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmmi8.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmmi6.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmsy10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmsy8.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmsy6.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmex10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/amsfonts/cmextra/cmex8.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/amsfonts/cmextra/cmex7.tfm
INPUT /usr/share/texmf-dist/tex/latex/amsfonts/umsa.fd
INPUT /usr/share/texmf-dist/tex/latex/amsfonts/umsa.fd
INPUT /usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msam10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msam10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msam7.tfm
INPUT /usr/share/texmf-dist/tex/latex/amsfonts/umsb.fd
INPUT /usr/share/texmf-dist/tex/latex/amsfonts/umsb.fd
INPUT /usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msbm10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msbm10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msbm7.tfm
INPUT /usr/share/texmf-dist/tex/latex/jknapltx/ursfs.fd
INPUT /usr/share/texmf-dist/tex/latex/jknapltx/ursfs.fd
INPUT /usr/share/texmf-dist/fonts/tfm/public/rsfs/rsfs10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/rsfs/rsfs10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/rsfs/rsfs5.tfm
INPUT /var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm2488.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecbx2488.tfm
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecbx1095.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmmi10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmsy10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmex10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msam10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msbm10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/rsfs/rsfs10.tfm
INPUT /usr/share/texmf-dist/tex/latex/base/t1cmtt.fd
INPUT /usr/share/texmf-dist/tex/latex/base/t1cmtt.fd
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ectt1095.tfm
OUTPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Inhalt.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Inhalt.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm2074.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecbx2074.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm1440.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecbx1440.tfm
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Skytale.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Skytale.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Skytale.png
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm0800.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm0600.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecbx1200.tfm
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Vignère-Verfahren.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Vignère-Verfahren.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Vignère-Verfahren.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmr12.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmmi12.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmsy10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmex10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/amsfonts/cmextra/cmex7.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msam10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msam10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msam7.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msbm10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msbm10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msbm7.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/rsfs/rsfs10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/rsfs/rsfs10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/rsfs/rsfs7.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecti1095.tfm
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Abhörung.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Abhörung.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Abhörung.png
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/tcrm1095.tfm
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Übertragungsmanipulation.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Übertragungsmanipulation.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Übertragungsmanipulation.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_0.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_0.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_0.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_1.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_1.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_1.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_2.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_2.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Authenzitätsstörung_2.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Verschlüsselungsverfahren.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Verschlüsselungsverfahren.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Stromverschlüsselungsverfahren.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Stromverschlüsselungsverfahren.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Stromverschlüsselung.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Stromverschlüsselung.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Stromverschlüsselung.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone Stromverschlüsselung.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone Stromverschlüsselung.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone Stromverschlüsselung.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/zustandsabhängige Stromverschlüsselung.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/zustandsabhängige Stromverschlüsselung.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/zustandsabhängige Stromverschlüsselung.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/additive zustandsabhängige Stromverschlüsselung.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/additive zustandsabhängige Stromverschlüsselung.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/additive zustandsabhängige Stromverschlüsselung.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone additive Stromverschlüsselung.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone additive Stromverschlüsselung.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone additive Stromverschlüsselung.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Schlüsselstromgenerator mit Nonce.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Schlüsselstromgenerator mit Nonce.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Schlüsselstromgenerator mit Nonce.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB_Nonce.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB_Nonce.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB_Nonce.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_enc.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_enc.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_enc.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_dec.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_dec.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CBC_dec.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CTR.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CTR.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CTR.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/OFB.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/OFB.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/OFB.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CFB.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CFB.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CFB.png
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmbx10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmbx8.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmbx6.tfm
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/3DES.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/3DES.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/3DES.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/meet-in-the-middle.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/meet-in-the-middle.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/meet-in-the-middle.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/AES S-Box.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/AES S-Box.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/AES S-Box.png
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecbx0800.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecbx0600.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ectt0800.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ectt0800.tfm
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ectt1440.tfm
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik - Teil 2.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik - Teil 2.tex
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmbx12.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmbx10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmbx7.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmbx12.tfm
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Diffie-Hellman-Schlüsselaustausch.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Diffie-Hellman-Schlüsselaustausch.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/DH-Verfahren.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/DH-Verfahren.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/DH-Verfahren.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/RSA-Verfahren.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/RSA-Verfahren.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/RSA-Schlüsselpaar.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/RSA-Schlüsselpaar.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/RSA-Schlüsselpaar.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/RSA-Verschlüsselung.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/RSA-Verschlüsselung.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/RSA-Verschlüsselung.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/RSA-Signatur0.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/RSA-Signatur0.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/RSA-Signatur0.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/RSA-Signatur1.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/RSA-Signatur1.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/RSA-Signatur1.png
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
INPUT /usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc
INPUT /usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx10.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx8.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmex10.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cmextra/cmex8.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi10.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi6.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi7.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi8.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr6.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr8.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy10.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy6.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy8.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msam10.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msbm10.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/rsfs/rsfs10.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1095.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1200.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1440.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2074.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2488.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm0600.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm0800.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1095.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1200.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1728.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/cm-super/sfti1095.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/cm-super/sftt1095.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/cm-super/sftt1440.pfb

File diff suppressed because it is too large Load Diff

View File

@ -1,126 +0,0 @@
\BOOKMARK [0][-]{chapter.1}{Substitionsverfahren}{}% 1
\BOOKMARK [1][-]{section.1.1}{Skytale}{chapter.1}% 2
\BOOKMARK [1][-]{section.1.2}{Monoalphabetische Substitionsverfahren}{chapter.1}% 3
\BOOKMARK [2][-]{subsection.1.2.1}{Caesar-Verschl\374sselung}{section.1.2}% 4
\BOOKMARK [2][-]{subsection.1.2.2}{H\344ufigkeitsanalyse}{section.1.2}% 5
\BOOKMARK [1][-]{section.1.3}{Polyalphabetische Substitutionsverfahren}{chapter.1}% 6
\BOOKMARK [2][-]{subsection.1.3.1}{Vign\350re-Verfahren}{section.1.3}% 7
\BOOKMARK [2][-]{subsection.1.3.2}{One-Time-Pad}{section.1.3}% 8
\BOOKMARK [1][-]{section.1.4}{algebraische Substitionsverfahren}{chapter.1}% 9
\BOOKMARK [2][-]{subsection.1.4.1}{Hill-Verfahren}{section.1.4}% 10
\BOOKMARK [0][-]{chapter.2}{Modulare Arithmetik}{}% 11
\BOOKMARK [1][-]{section.2.1}{Exkurs: Division mit Rest}{chapter.2}% 12
\BOOKMARK [1][-]{section.2.2}{Der Ring Zn}{chapter.2}% 13
\BOOKMARK [2][-]{subsection.2.2.1}{Addition und Multiplikation}{section.2.2}% 14
\BOOKMARK [2][-]{subsection.2.2.2}{Subtraktion}{section.2.2}% 15
\BOOKMARK [2][-]{subsection.2.2.3}{Teiler, Vielfache}{section.2.2}% 16
\BOOKMARK [2][-]{subsection.2.2.4}{Kongruenz}{section.2.2}% 17
\BOOKMARK [2][-]{subsection.2.2.5}{Matrizen}{section.2.2}% 18
\BOOKMARK [2][-]{subsection.2.2.6}{Kartesisches Produkt von Ringen}{section.2.2}% 19
\BOOKMARK [2][-]{subsection.2.2.7}{Isomorphie von Ringen}{section.2.2}% 20
\BOOKMARK [1][-]{section.2.3}{Der erweiterte Euklid'sche Algorithmus}{chapter.2}% 21
\BOOKMARK [2][-]{subsection.2.3.1}{Euklid'scher Algorithmus}{section.2.3}% 22
\BOOKMARK [2][-]{subsection.2.3.2}{erweiterter Euklid'scher Algorithmus}{section.2.3}% 23
\BOOKMARK [1][-]{section.2.4}{Euler'sche -Funktion}{chapter.2}% 24
\BOOKMARK [2][-]{subsection.2.4.1}{-Funktion und Primzahlen}{section.2.4}% 25
\BOOKMARK [0][-]{chapter.3}{IT-Sicherheit: Gef\344hrdungen und Ma\337nahmen}{}% 26
\BOOKMARK [1][-]{section.3.1}{Vertraulichkeit}{chapter.3}% 27
\BOOKMARK [2][-]{subsection.3.1.1}{Schutzma\337nahmen: Verschl\374sselungsverfahren}{section.3.1}% 28
\BOOKMARK [1][-]{section.3.2}{Integrit\344t}{chapter.3}% 29
\BOOKMARK [2][-]{subsection.3.2.1}{Schutzma\337nahme: Hashfunktionen, Whitelists}{section.3.2}% 30
\BOOKMARK [1][-]{section.3.3}{Authenzit\344t der Daten}{chapter.3}% 31
\BOOKMARK [2][-]{subsection.3.3.1}{Schutzma\337nahme: Signaturen}{section.3.3}% 32
\BOOKMARK [2][-]{subsection.3.3.2}{Schutz vor Replay-Angriffen}{section.3.3}% 33
\BOOKMARK [1][-]{section.3.4}{Authenzit\344t von Nutzern}{chapter.3}% 34
\BOOKMARK [2][-]{subsection.3.4.1}{Schutzma\337nahmen}{section.3.4}% 35
\BOOKMARK [1][-]{section.3.5}{Zugriffskontrolle}{chapter.3}% 36
\BOOKMARK [2][-]{subsection.3.5.1}{Schutzma\337name: Zugriffskontrollsystem}{section.3.5}% 37
\BOOKMARK [1][-]{section.3.6}{Nichtabstreitbarkeit, Verbindlichkeit}{chapter.3}% 38
\BOOKMARK [2][-]{subsection.3.6.1}{Schutzma\337name: Signaturen und PKI}{section.3.6}% 39
\BOOKMARK [1][-]{section.3.7}{Verf\374gbarkeit}{chapter.3}% 40
\BOOKMARK [2][-]{subsection.3.7.1}{Schutzma\337nahmen}{section.3.7}% 41
\BOOKMARK [1][-]{section.3.8}{Anonymit\344t}{chapter.3}% 42
\BOOKMARK [0][-]{chapter.4}{Verschl\374sselungsverfahren}{}% 43
\BOOKMARK [1][-]{section.4.1}{Das Kerckhoffs'sche Prinzip}{chapter.4}% 44
\BOOKMARK [1][-]{section.4.2}{Mathematische Modelierung von Verschl\374sselungsverfahren}{chapter.4}% 45
\BOOKMARK [1][-]{section.4.3}{Schl\374sselaustausch}{chapter.4}% 46
\BOOKMARK [1][-]{section.4.4}{Angriffsszenarien}{chapter.4}% 47
\BOOKMARK [2][-]{subsection.4.4.1}{Ciphertext-only Angriffe}{section.4.4}% 48
\BOOKMARK [2][-]{subsection.4.4.2}{Known-plaintext Angriffe}{section.4.4}% 49
\BOOKMARK [2][-]{subsection.4.4.3}{Chosen-plaintext Angriffe}{section.4.4}% 50
\BOOKMARK [1][-]{section.4.5}{Brute-Force Angriffe}{chapter.4}% 51
\BOOKMARK [2][-]{subsection.4.5.1}{Beispiel: Brute-Force Angriff auf k}{section.4.5}% 52
\BOOKMARK [2][-]{subsection.4.5.2}{Beispiel: Brute-Force Angriff auf m}{section.4.5}% 53
\BOOKMARK [2][-]{subsection.4.5.3}{Anforderungen zum Schutz vor Brute-Force}{section.4.5}% 54
\BOOKMARK [1][-]{section.4.6}{W\366rterbuchangriffe}{chapter.4}% 55
\BOOKMARK [2][-]{subsection.4.6.1}{Schutz vor W\366rterbuchangriffen}{section.4.6}% 56
\BOOKMARK [0][-]{chapter.5}{Stromverschl\374sselungsverfahren}{}% 57
\BOOKMARK [1][-]{section.5.1}{Synchrone Stromverschl\374sselungsverfahren}{chapter.5}% 58
\BOOKMARK [1][-]{section.5.2}{Zustandsabh\344ngige Stromverschl\374sselungsverfahren}{chapter.5}% 59
\BOOKMARK [2][-]{subsection.5.2.1}{Additive zustandsabh\344ngige Stromverschl\374sselungsverfahren}{section.5.2}% 60
\BOOKMARK [1][-]{section.5.3}{Schl\374sselstrom vs. One-Time-Pad}{chapter.5}% 61
\BOOKMARK [1][-]{section.5.4}{Nonces zur Initialisierung eines Schl\374sselstromgenerators}{chapter.5}% 62
\BOOKMARK [1][-]{section.5.5}{ChaCha20}{chapter.5}% 63
\BOOKMARK [1][-]{section.5.6}{Cipher-Instanzen: Verschl\374sselungsalgorithmen in Java-Laufzeitumgebungen}{chapter.5}% 64
\BOOKMARK [0][-]{chapter.6}{Blockverschl\374sselungsverfahren}{}% 65
\BOOKMARK [1][-]{section.6.1}{Padding-Verfahren}{chapter.6}% 66
\BOOKMARK [1][-]{section.6.2}{Betriebsmodi}{chapter.6}% 67
\BOOKMARK [2][-]{subsection.6.2.1}{ECB \(Electronic Code Book\)}{section.6.2}% 68
\BOOKMARK [2][-]{subsection.6.2.2}{CBC \(Cipher Block Chaining\)}{section.6.2}% 69
\BOOKMARK [2][-]{subsection.6.2.3}{CBC-CS \(Chiphertext Stealing for CBC Mode\)}{section.6.2}% 70
\BOOKMARK [2][-]{subsection.6.2.4}{CTR \(Counter\)}{section.6.2}% 71
\BOOKMARK [2][-]{subsection.6.2.5}{OFB \(Output Feedback\)}{section.6.2}% 72
\BOOKMARK [2][-]{subsection.6.2.6}{CFB \(Cipher-Feedback\)}{section.6.2}% 73
\BOOKMARK [1][-]{section.6.3}{Konstruktionsprinzipien von Blockverschl\374sselungsverfahren}{chapter.6}% 74
\BOOKMARK [1][-]{section.6.4}{DES}{chapter.6}% 75
\BOOKMARK [2][-]{subsection.6.4.1}{Triple-DES \(3DES\)}{section.6.4}% 76
\BOOKMARK [1][-]{section.6.5}{Meet-in-the-Middle-Angriff}{chapter.6}% 77
\BOOKMARK [1][-]{section.6.6}{AES \(Advanced Encryption Standard\)}{chapter.6}% 78
\BOOKMARK [2][-]{subsection.6.6.1}{AES-128}{section.6.6}% 79
\BOOKMARK [0][-]{chapter.7}{Hashfunktionen}{}% 80
\BOOKMARK [1][-]{section.7.1}{schwache Kollisionsfreiheit}{chapter.7}% 81
\BOOKMARK [1][-]{section.7.2}{MessageDigest-Instanzen: Hashfunktionen in Java}{chapter.7}% 82
\BOOKMARK [1][-]{section.7.3}{Anwendungsbeispiele}{chapter.7}% 83
\BOOKMARK [2][-]{subsection.7.3.1}{Anwendungsbeispiel: Passwortdatei}{section.7.3}% 84
\BOOKMARK [2][-]{subsection.7.3.2}{Anwendungsbeispiel: Integrit\344tsschutz von Dateien}{section.7.3}% 85
\BOOKMARK [2][-]{subsection.7.3.3}{Anwendungsbeispiel: Integrit\344tsschutz bei einem Dateidownload}{section.7.3}% 86
\BOOKMARK [1][-]{section.7.4}{Brute-Force-Angriffe auf Hashfunktionen}{chapter.7}% 87
\BOOKMARK [2][-]{subsection.7.4.1}{Brute-Force-Urbildsuche}{section.7.4}% 88
\BOOKMARK [2][-]{subsection.7.4.2}{Brute-Force-Kollisionssuche}{section.7.4}% 89
\BOOKMARK [1][-]{section.7.5}{Konstruktionsverfahren von Hashfunktionen}{chapter.7}% 90
\BOOKMARK [0][-]{chapter.8}{MAC-Verfahren}{}% 91
\BOOKMARK [1][-]{section.8.1}{HMAC}{chapter.8}% 92
\BOOKMARK [1][-]{section.8.2}{CMAC, CBC-MAC}{chapter.8}% 93
\BOOKMARK [2][-]{subsection.8.2.1}{CMAC}{section.8.2}% 94
\BOOKMARK [2][-]{subsection.8.2.2}{CBC-MAC}{section.8.2}% 95
\BOOKMARK [0][-]{chapter.9}{Modulare Arithmetik - Teil 2}{}% 96
\BOOKMARK [1][-]{section.9.1}{Potenzen}{chapter.9}% 97
\BOOKMARK [2][-]{subsection.9.1.1}{Erzeugnis und Ordnung eines invertierbaren Elements}{section.9.1}% 98
\BOOKMARK [2][-]{subsection.9.1.2}{Faktorenzerlegung}{section.9.1}% 99
\BOOKMARK [2][-]{subsection.9.1.3}{Kleiner Satz von Fermat}{section.9.1}% 100
\BOOKMARK [2][-]{subsection.9.1.4}{Berechnung modularer Potenzen}{section.9.1}% 101
\BOOKMARK [1][-]{section.9.2}{Exkurs: Einheitengruppe Zpe*}{chapter.9}% 102
\BOOKMARK [2][-]{subsection.9.2.1}{Z2e*}{section.9.2}% 103
\BOOKMARK [1][-]{section.9.3}{Der chinesische Restsatz}{chapter.9}% 104
\BOOKMARK [2][-]{subsection.9.3.1}{Beispiel}{section.9.3}% 105
\BOOKMARK [1][-]{section.9.4}{Elemente gerader und ungerader Ordnung in Zn**}{chapter.9}% 106
\BOOKMARK [0][-]{chapter.10}{Das Diffie-Hellman-Schl\374sselaustauschverfahren}{}% 107
\BOOKMARK [1][-]{section.10.1}{Das DH-Verfahren in Einzelschritten}{chapter.10}% 108
\BOOKMARK [1][-]{section.10.2}{Das Diskrete-Logarithmus-Problem \(DL-Problem\)}{chapter.10}% 109
\BOOKMARK [2][-]{subsection.10.2.1}{Das Diffie-Hellman-Problem \(DH-Problem\)}{section.10.2}% 110
\BOOKMARK [1][-]{section.10.3}{Beispielanwendung des DH-Verfahrens}{chapter.10}% 111
\BOOKMARK [1][-]{section.10.4}{Angriffe auf das DH-Verfahren}{chapter.10}% 112
\BOOKMARK [2][-]{subsection.10.4.1}{Pohlig-Hellman-Reduktion}{section.10.4}% 113
\BOOKMARK [2][-]{subsection.10.4.2}{Shanks' \214Baby Steps Giant Steps\215-Verfahren \(BSGS-Verfahren\)}{section.10.4}% 114
\BOOKMARK [2][-]{subsection.10.4.3}{Pollard's Rho-Methode}{section.10.4}% 115
\BOOKMARK [2][-]{subsection.10.4.4}{Zahlk\366rpersieb}{section.10.4}% 116
\BOOKMARK [0][-]{chapter.11}{Das RSA-Verfahren}{}% 117
\BOOKMARK [1][-]{section.11.1}{RSA-Schl\374sselpaare}{chapter.11}% 118
\BOOKMARK [2][-]{subsection.11.1.1}{Beispiel f\374r die Schl\374sselpaarerstellung}{section.11.1}% 119
\BOOKMARK [1][-]{section.11.2}{RSA-Verschl\374sselungsverfahren}{chapter.11}% 120
\BOOKMARK [2][-]{subsection.11.2.1}{Beispiel f\374r die Verschl\374sselung}{section.11.2}% 121
\BOOKMARK [1][-]{section.11.3}{Padding}{chapter.11}% 122
\BOOKMARK [2][-]{subsection.11.3.1}{Padding nach PKCS\0431}{section.11.3}% 123
\BOOKMARK [2][-]{subsection.11.3.2}{Optimal Asymmetric Encryption Padding\(OAEP\)}{section.11.3}% 124
\BOOKMARK [1][-]{section.11.4}{Das RSA-Signaturverfahren}{chapter.11}% 125
\BOOKMARK [2][-]{subsection.11.4.1}{Beispiel f\374r ein RSA-Signaturverfahren}{section.11.4}% 126

Binary file not shown.

Binary file not shown.

View File

@ -1,146 +0,0 @@
\babel@toc {ngerman}{}
\contentsline {chapter}{\numberline {1}Substitionsverfahren}{4}{chapter.1}%
\contentsline {section}{\numberline {1.1}Skytale}{4}{section.1.1}%
\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{4}{section.1.2}%
\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{5}{subsection.1.2.1}%
\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{5}{subsection.1.2.2}%
\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{5}{section.1.3}%
\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{5}{subsection.1.3.1}%
\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{5}{subsubsection.1.3.1.1}%
\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{6}{subsection.1.3.2}%
\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{6}{subsubsection.1.3.2.1}%
\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{6}{subsubsection.1.3.2.2}%
\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{6}{section.1.4}%
\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{6}{subsection.1.4.1}%
\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{6}{subsubsection.1.4.1.1}%
\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{6}{subsubsection.1.4.1.2}%
\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{7}{chapter.2}%
\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{7}{section.2.1}%
\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{7}{section.2.2}%
\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{7}{subsection.2.2.1}%
\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{7}{subsubsection.2.2.1.1}%
\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{7}{subsubsection.2.2.1.2}%
\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{8}{subsection.2.2.2}%
\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{8}{subsection.2.2.3}%
\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{8}{subsubsection.2.2.3.1}%
\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{8}{subsection.2.2.4}%
\contentsline {subsection}{\numberline {2.2.5}Matrizen}{8}{subsection.2.2.5}%
\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{8}{subsubsection.2.2.5.1}%
\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{8}{subsubsection.2.2.5.2}%
\contentsline {subsection}{\numberline {2.2.6}Kartesisches Produkt von Ringen}{8}{subsection.2.2.6}%
\contentsline {subsection}{\numberline {2.2.7}Isomorphie von Ringen}{9}{subsection.2.2.7}%
\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{9}{section.2.3}%
\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{9}{subsection.2.3.1}%
\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{9}{subsection.2.3.2}%
\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{9}{subsubsection.2.3.2.1}%
\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{10}{section.2.4}%
\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{10}{subsection.2.4.1}%
\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{11}{chapter.3}%
\contentsline {section}{\numberline {3.1}Vertraulichkeit}{11}{section.3.1}%
\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{11}{subsection.3.1.1}%
\contentsline {section}{\numberline {3.2}Integrität}{11}{section.3.2}%
\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{12}{subsection.3.2.1}%
\contentsline {section}{\numberline {3.3}Authenzität der Daten}{12}{section.3.3}%
\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{12}{subsection.3.3.1}%
\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{12}{subsection.3.3.2}%
\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{12}{section.3.4}%
\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{12}{subsection.3.4.1}%
\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{12}{section.3.5}%
\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{13}{subsection.3.5.1}%
\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{13}{section.3.6}%
\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{13}{subsection.3.6.1}%
\contentsline {section}{\numberline {3.7}Verfügbarkeit}{13}{section.3.7}%
\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{13}{subsection.3.7.1}%
\contentsline {section}{\numberline {3.8}Anonymität}{13}{section.3.8}%
\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{14}{chapter.4}%
\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{14}{section.4.1}%
\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{14}{section.4.2}%
\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{14}{section.4.3}%
\contentsline {section}{\numberline {4.4}Angriffsszenarien}{15}{section.4.4}%
\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{15}{subsection.4.4.1}%
\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{15}{subsection.4.4.2}%
\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{15}{subsection.4.4.3}%
\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{15}{section.4.5}%
\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{15}{subsection.4.5.1}%
\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{15}{subsection.4.5.2}%
\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{15}{subsection.4.5.3}%
\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{16}{section.4.6}%
\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{16}{subsection.4.6.1}%
\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{16}{subsubsection.4.6.1.1}%
\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{17}{chapter.5}%
\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{17}{section.5.1}%
\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{18}{section.5.2}%
\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{19}{subsection.5.2.1}%
\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{19}{subsubsection.5.2.1.1}%
\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{20}{section.5.3}%
\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{20}{section.5.4}%
\contentsline {section}{\numberline {5.5}ChaCha20}{21}{section.5.5}%
\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{22}{section.5.6}%
\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{23}{chapter.6}%
\contentsline {section}{\numberline {6.1}Padding-Verfahren}{23}{section.6.1}%
\contentsline {section}{\numberline {6.2}Betriebsmodi}{23}{section.6.2}%
\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{23}{subsection.6.2.1}%
\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{24}{subsection.6.2.2}%
\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{25}{subsection.6.2.3}%
\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{25}{subsubsection.6.2.3.1}%
\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{26}{subsubsection.6.2.3.2}%
\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{26}{subsubsection.6.2.3.3}%
\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{26}{subsection.6.2.4}%
\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{26}{subsection.6.2.5}%
\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{27}{subsubsection.6.2.5.1}%
\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{27}{subsection.6.2.6}%
\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{27}{subsubsection.6.2.6.1}%
\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{28}{section.6.3}%
\contentsline {section}{\numberline {6.4}DES}{28}{section.6.4}%
\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{28}{subsection.6.4.1}%
\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{29}{section.6.5}%
\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{30}{section.6.6}%
\contentsline {subsection}{\numberline {6.6.1}AES-128}{30}{subsection.6.6.1}%
\contentsline {chapter}{\numberline {7}Hashfunktionen}{32}{chapter.7}%
\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{32}{section.7.1}%
\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{32}{section.7.2}%
\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{33}{section.7.3}%
\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{33}{subsection.7.3.1}%
\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{33}{subsubsection.7.3.1.1}%
\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{33}{subsection.7.3.2}%
\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{33}{subsection.7.3.3}%
\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{33}{section.7.4}%
\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{33}{subsection.7.4.1}%
\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{34}{subsection.7.4.2}%
\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{34}{section.7.5}%
\contentsline {chapter}{\numberline {8}MAC-Verfahren}{36}{chapter.8}%
\contentsline {section}{\numberline {8.1}HMAC}{36}{section.8.1}%
\contentsline {section}{\numberline {8.2}CMAC, CBC-MAC}{36}{section.8.2}%
\contentsline {subsection}{\numberline {8.2.1}CMAC}{36}{subsection.8.2.1}%
\contentsline {subsection}{\numberline {8.2.2}CBC-MAC}{37}{subsection.8.2.2}%
\contentsline {chapter}{\numberline {9}Modulare Arithmetik - Teil 2}{38}{chapter.9}%
\contentsline {section}{\numberline {9.1}Potenzen}{38}{section.9.1}%
\contentsline {subsection}{\numberline {9.1.1}Erzeugnis und Ordnung eines invertierbaren Elements}{38}{subsection.9.1.1}%
\contentsline {subsection}{\numberline {9.1.2}Faktorenzerlegung}{39}{subsection.9.1.2}%
\contentsline {subsection}{\numberline {9.1.3}Kleiner Satz von Fermat}{39}{subsection.9.1.3}%
\contentsline {subsection}{\numberline {9.1.4}Berechnung modularer Potenzen}{39}{subsection.9.1.4}%
\contentsline {section}{\numberline {9.2}Exkurs: Einheitengruppe $\mathbb {Z}_{p^e}^*$}{40}{section.9.2}%
\contentsline {subsection}{\numberline {9.2.1}$\mathbb {Z}_{2^e}^*$}{40}{subsection.9.2.1}%
\contentsline {section}{\numberline {9.3}Der chinesische Restsatz}{40}{section.9.3}%
\contentsline {subsection}{\numberline {9.3.1}Beispiel}{41}{subsection.9.3.1}%
\contentsline {section}{\numberline {9.4}Elemente gerader und ungerader Ordnung in $\mathbb {Z}_n$**}{41}{section.9.4}%
\contentsline {chapter}{\numberline {10}Das Diffie-Hellman-Schlüsselaustauschverfahren}{42}{chapter.10}%
\contentsline {section}{\numberline {10.1}Das DH-Verfahren in Einzelschritten}{42}{section.10.1}%
\contentsline {section}{\numberline {10.2}Das Diskrete-Logarithmus-Problem (DL-Problem)}{43}{section.10.2}%
\contentsline {subsection}{\numberline {10.2.1}Das Diffie-Hellman-Problem (DH-Problem)}{43}{subsection.10.2.1}%
\contentsline {section}{\numberline {10.3}Beispielanwendung des DH-Verfahrens}{44}{section.10.3}%
\contentsline {section}{\numberline {10.4}Angriffe auf das DH-Verfahren}{44}{section.10.4}%
\contentsline {subsection}{\numberline {10.4.1}Pohlig-Hellman-Reduktion}{44}{subsection.10.4.1}%
\contentsline {subsection}{\numberline {10.4.2}Shanks' \glqq Baby Steps Giant Steps\grqq -Verfahren (BSGS-Verfahren)}{44}{subsection.10.4.2}%
\contentsline {subsection}{\numberline {10.4.3}Pollard's Rho-Methode}{45}{subsection.10.4.3}%
\contentsline {subsection}{\numberline {10.4.4}Zahlkörpersieb}{45}{subsection.10.4.4}%
\contentsline {chapter}{\numberline {11}Das RSA-Verfahren}{46}{chapter.11}%
\contentsline {section}{\numberline {11.1}RSA-Schlüsselpaare}{46}{section.11.1}%
\contentsline {subsection}{\numberline {11.1.1}Beispiel für die Schlüsselpaarerstellung}{47}{subsection.11.1.1}%
\contentsline {section}{\numberline {11.2}RSA-Verschlüsselungsverfahren}{47}{section.11.2}%
\contentsline {subsection}{\numberline {11.2.1}Beispiel für die Verschlüsselung}{48}{subsection.11.2.1}%
\contentsline {section}{\numberline {11.3}Padding}{48}{section.11.3}%
\contentsline {subsection}{\numberline {11.3.1}Padding nach PKCS\#1}{49}{subsection.11.3.1}%
\contentsline {subsection}{\numberline {11.3.2}Optimal Asymmetric Encryption Padding(OAEP)}{49}{subsection.11.3.2}%
\contentsline {section}{\numberline {11.4}Das RSA-Signaturverfahren}{49}{section.11.4}%
\contentsline {subsection}{\numberline {11.4.1}Beispiel für ein RSA-Signaturverfahren}{50}{subsection.11.4.1}%