provisional version of Modulare Arithmetik - Teil 2 finished

This commit is contained in:
Paul 2020-09-19 17:44:22 +02:00
parent cacbf109c0
commit a690196fe5
16 changed files with 1506 additions and 378 deletions

19
Inhalt.tex Normal file
View File

@ -0,0 +1,19 @@
\newmdenv[roundcorner=2mm, linecolor=blue, backgroundcolor=blue!5]{mybox}
\input{chapters/Substitutionsverfahren.tex}
\input{chapters/Modulare Arithmetik.tex}
\input{chapters/IT-Sicherheit.tex}
\input{chapters/Verschlüsselungsverfahren.tex}
\input{chapters/Stromverschlüsselungsverfahren.tex}
\input{chapters/Blockverschlüsselungsverfahren.tex}
\input{chapters/Hashfunktionen.tex}
\input{chapters/MAC-Verfahren.tex}
\input{chapters/Modulare Arithmetik - Teil 2.tex}

35
Packages.tex Normal file
View File

@ -0,0 +1,35 @@
%numbering depth
\setcounter{secnumdepth}{5}
%page setup
\usepackage[a4paper, margin=2cm]{geometry}
%encoding
\usepackage[utf8]{inputenc}
\usepackage[T1]{fontenc}
%language
\usepackage[ngerman]{babel}
%images
\usepackage{graphicx}
\graphicspath{ {./images/} }
%mathsymbols
\usepackage{amsmath}
\usepackage{amssymb}
\usepackage{amsfonts}
\usepackage{mathrsfs}
%for code highlighting
\usepackage{xcolor}
\usepackage{listings}
%quotation
\usepackage[%
left = \glqq,%
right = \grqq,%
leftsub = \glq,%
rightsub = \grq%
]{dirtytalk}
%automatic links
\usepackage{hyperref}
%graphics
\usepackage{tikz}
%boxes
\usepackage[framemethod=tikz]{mdframed}
%enumeration
\usepackage{enumerate}

View File

@ -1,153 +1,192 @@
\relax
\providecommand\hyper@newdestlabel[2]{}
\providecommand\zref@newlabel[2]{}
\@nameuse{bbl@beforestart}
\catcode `"\active
\providecommand\HyperFirstAtBeginDocument{\AtBeginDocument}
\HyperFirstAtBeginDocument{\ifx\hyper@anchor\@undefined
\global\let\oldcontentsline\contentsline
\gdef\contentsline#1#2#3#4{\oldcontentsline{#1}{#2}{#3}}
\global\let\oldnewlabel\newlabel
\gdef\newlabel#1#2{\newlabelxx{#1}#2}
\gdef\newlabelxx#1#2#3#4#5#6{\oldnewlabel{#1}{{#2}{#3}}}
\AtEndDocument{\ifx\hyper@anchor\@undefined
\let\contentsline\oldcontentsline
\let\newlabel\oldnewlabel
\fi}
\fi}
\global\let\hyper@last\relax
\gdef\HyperFirstAtBeginDocument#1{#1}
\providecommand\HyField@AuxAddToFields[1]{}
\providecommand\HyField@AuxAddToCoFields[2]{}
\babel@aux{ngerman}{}
\@writefile{toc}{\contentsline {chapter}{\numberline {1}Substitionsverfahren}{4}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {1}Substitionsverfahren}{4}{chapter.1}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {1.1}Skytale}{4}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{4}\protected@file@percent }
\newlabel{monoalphabet}{{1.2}{4}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{5}\protected@file@percent }
\newlabel{häufigkeit}{{1.2.2}{5}}
\@writefile{toc}{\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{6}\protected@file@percent }
\newlabel{otp}{{1.3.2}{6}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{6}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{7}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.1}Skytale}{4}{section.1.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{4}{section.1.2}\protected@file@percent }
\newlabel{monoalphabet}{{1.2}{4}{Monoalphabetische Substitionsverfahren}{section.1.2}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{5}{subsection.1.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{5}{subsection.1.2.2}\protected@file@percent }
\newlabel{häufigkeit}{{1.2.2}{5}{Häufigkeitsanalyse}{subsection.1.2.2}{}}
\@writefile{toc}{\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{5}{section.1.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{5}{subsection.1.3.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{5}{subsubsection.1.3.1.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{6}{subsection.1.3.2}\protected@file@percent }
\newlabel{otp}{{1.3.2}{6}{One-Time-Pad}{subsection.1.3.2}{}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{6}{subsubsection.1.3.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{6}{subsubsection.1.3.2.2}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{6}{section.1.4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{6}{subsection.1.4.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{6}{subsubsection.1.4.1.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{6}{subsubsection.1.4.1.2}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{7}{chapter.2}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{7}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{7}\protected@file@percent }
\newlabel{Der Ring Z}{{2.2}{7}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{7}\protected@file@percent }
\newlabel{modulare_addition}{{2.2.1}{7}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{7}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{7}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.5}Matrizen}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{9}\protected@file@percent }
\newlabel{euklid}{{2.3.1}{9}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{9}\protected@file@percent }
\newlabel{erweiterter Euklid}{{2.3.2}{9}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{9}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{10}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{10}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{11}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{7}{section.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{7}{section.2.2}\protected@file@percent }
\newlabel{Der Ring Z}{{2.2}{7}{Der Ring $\mathbb {Z}_n$}{section.2.2}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{7}{subsection.2.2.1}\protected@file@percent }
\newlabel{modulare_addition}{{2.2.1}{7}{Addition und Multiplikation}{subsection.2.2.1}{}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{7}{subsubsection.2.2.1.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{7}{subsubsection.2.2.1.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{8}{subsection.2.2.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{8}{subsection.2.2.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{8}{subsubsection.2.2.3.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{8}{subsection.2.2.4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.5}Matrizen}{8}{subsection.2.2.5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{8}{subsubsection.2.2.5.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{8}{subsubsection.2.2.5.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.6}Kartesisches Produkt von Ringen}{8}{subsection.2.2.6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.7}Isomorphie von Ringen}{9}{subsection.2.2.7}\protected@file@percent }
\newlabel{Isomorphie}{{2.2.7}{9}{Isomorphie von Ringen}{subsection.2.2.7}{}}
\@writefile{toc}{\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{9}{section.2.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{9}{subsection.2.3.1}\protected@file@percent }
\newlabel{euklid}{{2.3.1}{9}{Euklid'scher Algorithmus}{subsection.2.3.1}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{9}{subsection.2.3.2}\protected@file@percent }
\newlabel{erweiterter Euklid}{{2.3.2}{9}{erweiterter Euklid'scher Algorithmus}{subsection.2.3.2}{}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{9}{subsubsection.2.3.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{10}{section.2.4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{10}{subsection.2.4.1}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{11}{chapter.3}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {3.1}Vertraulichkeit}{11}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{11}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.2}Integrität}{11}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.3}Authenzität der Daten}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{12}\protected@file@percent }
\newlabel{signature}{{3.3.1}{12}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{12}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{13}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{13}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{13}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.7}Verfügbarkeit}{13}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{13}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.8}Anonymität}{13}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{14}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.1}Vertraulichkeit}{11}{section.3.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{11}{subsection.3.1.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.2}Integrität}{11}{section.3.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{12}{subsection.3.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.3}Authenzität der Daten}{12}{section.3.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{12}{subsection.3.3.1}\protected@file@percent }
\newlabel{signature}{{3.3.1}{12}{Schutzmaßnahme: Signaturen}{subsection.3.3.1}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{12}{subsection.3.3.2}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{12}{section.3.4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{12}{subsection.3.4.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{12}{section.3.5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{13}{subsection.3.5.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{13}{section.3.6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{13}{subsection.3.6.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.7}Verfügbarkeit}{13}{section.3.7}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{13}{subsection.3.7.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.8}Anonymität}{13}{section.3.8}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{14}{chapter.4}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{14}\protected@file@percent }
\newlabel{kerckhoff}{{4.1}{14}}
\@writefile{toc}{\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{14}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{14}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.4}Angriffsszenarien}{15}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{15}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{15}\protected@file@percent }
\newlabel{known-plaintext}{{4.4.2}{15}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{15}\protected@file@percent }
\newlabel{chosen-plaintext}{{4.4.3}{15}}
\@writefile{toc}{\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{15}\protected@file@percent }
\newlabel{brute-force}{{4.5}{15}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{15}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{15}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{15}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{16}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{16}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{16}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{17}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{14}{section.4.1}\protected@file@percent }
\newlabel{kerckhoff}{{4.1}{14}{Das Kerckhoffs'sche Prinzip}{section.4.1}{}}
\@writefile{toc}{\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{14}{section.4.2}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{14}{section.4.3}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.4}Angriffsszenarien}{15}{section.4.4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{15}{subsection.4.4.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{15}{subsection.4.4.2}\protected@file@percent }
\newlabel{known-plaintext}{{4.4.2}{15}{Known-plaintext Angriffe}{subsection.4.4.2}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{15}{subsection.4.4.3}\protected@file@percent }
\newlabel{chosen-plaintext}{{4.4.3}{15}{Chosen-plaintext Angriffe}{subsection.4.4.3}{}}
\@writefile{toc}{\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{15}{section.4.5}\protected@file@percent }
\newlabel{brute-force}{{4.5}{15}{Brute-Force Angriffe}{section.4.5}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{15}{subsection.4.5.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{15}{subsection.4.5.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{15}{subsection.4.5.3}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{16}{section.4.6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{16}{subsection.4.6.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{16}{subsubsection.4.6.1.1}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{17}{chapter.5}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{17}\protected@file@percent }
\newlabel{synchrone Stromverschlüsselung}{{5.1}{17}}
\@writefile{toc}{\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{18}\protected@file@percent }
\newlabel{zustandsabhängige Stromverschlüsselung}{{5.2}{18}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{19}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{19}\protected@file@percent }
\newlabel{synchron additive Stromverschlüsselung}{{5.2.1.1}{19}}
\@writefile{toc}{\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{20}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{20}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.5}ChaCha20}{21}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{22}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{23}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{17}{section.5.1}\protected@file@percent }
\newlabel{synchrone Stromverschlüsselung}{{5.1}{17}{Synchrone Stromverschlüsselungsverfahren}{section.5.1}{}}
\@writefile{toc}{\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{18}{section.5.2}\protected@file@percent }
\newlabel{zustandsabhängige Stromverschlüsselung}{{5.2}{18}{Zustandsabhängige Stromverschlüsselungsverfahren}{section.5.2}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{19}{subsection.5.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{19}{subsubsection.5.2.1.1}\protected@file@percent }
\newlabel{synchron additive Stromverschlüsselung}{{5.2.1.1}{19}{Synchrone additive Stromverschlüsselungsverfahren}{subsubsection.5.2.1.1}{}}
\@writefile{toc}{\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{20}{section.5.3}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{20}{section.5.4}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.5}ChaCha20}{21}{section.5.5}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{22}{section.5.6}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{23}{chapter.6}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\newlabel{Blockverschlüsselungsverfahren}{{6}{23}}
\@writefile{toc}{\contentsline {section}{\numberline {6.1}Padding-Verfahren}{23}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.2}Betriebsmodi}{23}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{23}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{24}\protected@file@percent }
\newlabel{CBC}{{6.2.2}{24}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{25}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{25}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{26}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{26}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{26}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{26}\protected@file@percent }
\newlabel{OFB}{{6.2.5}{26}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{27}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{27}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{27}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{28}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.4}DES}{28}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{28}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{29}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{30}\protected@file@percent }
\newlabel{aes}{{6.6}{30}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.6.1}AES-128}{30}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {7}Hashfunktionen}{32}\protected@file@percent }
\newlabel{Blockverschlüsselungsverfahren}{{6}{23}{Blockverschlüsselungsverfahren}{chapter.6}{}}
\@writefile{toc}{\contentsline {section}{\numberline {6.1}Padding-Verfahren}{23}{section.6.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.2}Betriebsmodi}{23}{section.6.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{23}{subsection.6.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{24}{subsection.6.2.2}\protected@file@percent }
\newlabel{CBC}{{6.2.2}{24}{CBC (Cipher Block Chaining)}{subsection.6.2.2}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{25}{subsection.6.2.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{25}{subsubsection.6.2.3.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{26}{subsubsection.6.2.3.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{26}{subsubsection.6.2.3.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{26}{subsection.6.2.4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{26}{subsection.6.2.5}\protected@file@percent }
\newlabel{OFB}{{6.2.5}{26}{OFB (Output Feedback)}{subsection.6.2.5}{}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{27}{subsubsection.6.2.5.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{27}{subsection.6.2.6}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{27}{subsubsection.6.2.6.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{28}{section.6.3}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.4}DES}{28}{section.6.4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{28}{subsection.6.4.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{29}{section.6.5}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{30}{section.6.6}\protected@file@percent }
\newlabel{aes}{{6.6}{30}{AES (Advanced Encryption Standard)}{section.6.6}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.6.1}AES-128}{30}{subsection.6.6.1}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {7}Hashfunktionen}{32}{chapter.7}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\newlabel{Hashfunktionen}{{7}{32}}
\@writefile{toc}{\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{32}\protected@file@percent }
\newlabel{schwache Kollisionsfreiheit}{{7.1}{32}}
\@writefile{toc}{\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{32}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{33}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{34}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{34}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {8}MAC-Verfahren}{36}\protected@file@percent }
\newlabel{Hashfunktionen}{{7}{32}{Hashfunktionen}{chapter.7}{}}
\@writefile{toc}{\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{32}{section.7.1}\protected@file@percent }
\newlabel{schwache Kollisionsfreiheit}{{7.1}{32}{schwache Kollisionsfreiheit}{section.7.1}{}}
\@writefile{toc}{\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{32}{section.7.2}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{33}{section.7.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{33}{subsection.7.3.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{33}{subsubsection.7.3.1.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{33}{subsection.7.3.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{33}{subsection.7.3.3}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{33}{section.7.4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{33}{subsection.7.4.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{34}{subsection.7.4.2}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{34}{section.7.5}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {8}MAC-Verfahren}{36}{chapter.8}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {8.1}HMAC}{36}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {8.2}CMAC, CBC-MAC}{36}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {8.2.1}CMAC}{36}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {8.2.2}CBC-MAC}{37}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {8.1}HMAC}{36}{section.8.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {8.2}CMAC, CBC-MAC}{36}{section.8.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {8.2.1}CMAC}{36}{subsection.8.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {8.2.2}CBC-MAC}{37}{subsection.8.2.2}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {9}Modulare Arithmetik - Teil 2}{38}{chapter.9}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {9.1}Potenzen}{38}{section.9.1}\protected@file@percent }
\pgfsyspdfmark {pgfid1}{3729359}{26373413}
\@writefile{toc}{\contentsline {subsection}{\numberline {9.1.1}Erzeugnis und Ordnung eines invertierbaren Elements}{38}{subsection.9.1.1}\protected@file@percent }
\pgfsyspdfmark {pgfid2}{3729359}{4826162}
\pgfsyspdfmark {pgfid3}{3729359}{49277275}
\@writefile{toc}{\contentsline {subsection}{\numberline {9.1.2}Faktorenzerlegung}{39}{subsection.9.1.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {9.1.3}Kleiner Satz von Fermat}{39}{subsection.9.1.3}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {9.2}Exkurs: Einheitengruppe $\mathbb {Z}_{p^e}^*$}{39}{section.9.2}\protected@file@percent }
\pgfsyspdfmark {pgfid4}{3729359}{25355837}
\pgfsyspdfmark {pgfid5}{3729359}{18777221}
\@writefile{toc}{\contentsline {subsection}{\numberline {9.2.1}$\mathbb {Z}_{2^e}^*$}{39}{subsection.9.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {9.3}Der chinesische Restsatz}{39}{section.9.3}\protected@file@percent }
\pgfsyspdfmark {pgfid6}{3729359}{42949702}
\@writefile{toc}{\contentsline {subsection}{\numberline {9.3.1}Beispiel}{40}{subsection.9.3.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {9.4}Elemente gerader und ungerader Ordnung in $\mathbb {Z}_n$**}{40}{section.9.4}\protected@file@percent }

BIN
Zusammenfassung_DC.dvi Normal file

Binary file not shown.

View File

@ -1,5 +1,5 @@
# Fdb version 3
["pdflatex"] 1600449989 "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" "Zusammenfassung_DC" 1600449989
["pdflatex"] 1600530206 "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" "Zusammenfassung_DC" 1600530207
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/3DES.png" 1600198739 21419 7bf85db371a659f085d9c727a1835013 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/AES S-Box.png" 1600269267 23090 2ccce6631c19f6339868594d4b8f11fd ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Abhörung.png" 1599946545 2649 d6dd82c7c38c06d31f966207a71dc01b ""
@ -23,18 +23,27 @@
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone additive Stromverschlüsselung.png" 1600003271 10891 bfed2f0ea0241a4a2a4bf215a3d59c32 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/zustandsabhängige Stromverschlüsselung.png" 1600002333 10276 422a1760594d1c860f8d7aa6dc5ed032 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Übertragungsmanipulation.png" 1599947212 3178 33bbd19fca19c787748d9158d802ceb1 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux" 1600449989 14728 218d8302697279964c9c5cac607bb3f7 "pdflatex"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" 1600448009 1164 63060c3089d19db142722eb600fa368b ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc" 1600449989 8648 2da1b659a745416645125d00d326d2be "pdflatex"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex" 1600448893 17264 63a210833f62fb093168d19f774d7af2 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Inhalt.tex" 1600528928 477 731e7da602023cb3181a2728c7b93b6e ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Packages.tex" 1600518243 677 f913f8c8ea9afee0f43bf284802baf62 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux" 1600530207 20315 541cfd414ee85744d016431a074e0598 "pdflatex"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out" 1600530207 8028 705a165d003f9245e6172cc1858c04f3 "pdflatex"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" 1600516760 357 a0335ff799ae7a1c8ac010ada4e25a6b ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc" 1600530207 11630 a7da7b3501ce35c57f808d1013372157 "pdflatex"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex" 1600460544 17233 bda824d83abd3946c7f9968db3206a11 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex" 1600448588 10246 7885d54a32da2f0500e74d589ed65022 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex" 1599950390 6191 fdec0aff09dab6668264963cb44ee2f3 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex" 1600449988 2852 e14fb50fd5672a6215d5d27dd7fa0b13 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex" 1600284018 6736 3dece8651acf670a27e1fb6d604e2027 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik - Teil 2.tex" 1600530203 7347 fd2f1da6b182e03e481b7b6b7a4e0b14 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex" 1600529293 7698 1c8e8de96ac5d83aa003e539928fae4b ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Stromverschlüsselungsverfahren.tex" 1600194483 9836 ddaca4f3d88a46ce7c40ec5d75657c71 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex" 1600001305 6264 cba30a66f463934bc822d2ee54ac4b90 ""
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Verschlüsselungsverfahren.tex" 1600003902 7321 b77786564ba0de93d6d5b8a73400fcd1 ""
"/usr/local/share/texmf/tex/latex/dirtytalk/dirtytalk.sty" 1599986679 1915 75d8498f106e3f673b6267693e944869 ""
"/usr/local/share/texmf/tex/latex/mdframed/md-frame-1.mdf" 1600516250 24632 760c4c81e779e6958bac43417deb524f ""
"/usr/local/share/texmf/tex/latex/mdframed/mdframed.sty" 1600516250 53487 3e997243f47cb3ba8b4c7b8df9c82989 ""
"/usr/local/share/texmf/tex/latex/needspace/needspace.sty" 1600516701 852 0e34dbb72efc69fa07602405ad95585e ""
"/usr/local/share/texmf/tex/latex/zref/zref-abspage.sty" 1600516525 2275 f674c50b1da0a158a02ffafeda53322d ""
"/usr/local/share/texmf/tex/latex/zref/zref-base.sty" 1600516525 20632 508d53001f8de763d8dd867401d0c8b1 ""
"/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc" 1591545468 2971 def0b6c1f0b107b3b936def894055589 ""
"/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc" 1591545468 2900 1537cc8184ad1792082cd229ecc269f4 ""
"/usr/share/texmf-dist/fonts/map/fontname/texfonts.map" 1591545468 3524 cb3e574dea2d1052e39280babc910dc8 ""
@ -65,7 +74,9 @@
"/usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msbm10.tfm" 1591545468 908 2921f8a10601f252058503cc6570e581 ""
"/usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msbm7.tfm" 1591545468 940 228d6584342e91276bf566bcf9716b83 ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmbx10.tfm" 1591545468 1328 c834bbb027764024c09d3d2bf908b5f0 ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmbx12.tfm" 1591545468 1324 c910af8c371558dc20f2d7822f66fe64 ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmbx6.tfm" 1591545468 1344 8a0be4fe4d376203000810ad4dc81558 ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmbx7.tfm" 1591545468 1336 3125ccb448c1a09074e3aa4a9832f130 ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmbx8.tfm" 1591545468 1332 1fde11373e221473104d6cc5993f046e ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmex10.tfm" 1591545468 992 662f679a0b3d2d53c1b94050fdaa3f50 ""
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmmi10.tfm" 1591545468 1528 abec98dbc43e172678c11b3b9031252a ""
@ -88,6 +99,7 @@
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi10.pfb" 1591545468 36299 5f9df58c2139e7edcf37c8fca4bd384d ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb" 1591545468 36741 fa121aac0049305630cf160b86157ee4 ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi6.pfb" 1591545468 37166 8ab3487cbe3ab49ebce74c29ea2418db ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi7.pfb" 1591545468 36281 c355509802a035cadc5f15869451dcee ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi8.pfb" 1591545468 35469 70d41d2b9ea31d5d813066df7c99281c ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb" 1591545468 35752 024fb6c41858982481f6968b5fc26508 ""
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr6.pfb" 1591545468 32734 69e00a6b65cedb993666e42eedb3d48f ""
@ -110,15 +122,78 @@
"/usr/share/texmf-dist/fonts/type1/public/cm-super/sftt1440.pfb" 1591545468 166192 d74933432e33dffe92198fe51b7b0dcb ""
"/usr/share/texmf-dist/fonts/type1/public/rsfs/rsfs10.pfb" 1591545468 16077 4737ac34f0fb5608550f3780a0202c22 ""
"/usr/share/texmf-dist/tex/context/base/mkii/supp-pdf.mkii" 1591545468 71627 94eb9990bed73c364d7f53f960cc8c5b ""
"/usr/share/texmf-dist/tex/generic/atbegshi/atbegshi.sty" 1591545468 24708 5584a51a7101caf7e6bbf1fc27d8f7b1 ""
"/usr/share/texmf-dist/tex/generic/babel-german/ngerman.ldf" 1591545468 2164 da22692bce498dcc4f70209c7185a346 ""
"/usr/share/texmf-dist/tex/generic/babel-german/ngermanb.ldf" 1591545468 7584 40e9a51a28a966f337267407ea4ab873 ""
"/usr/share/texmf-dist/tex/generic/babel/babel.def" 1591545468 107158 a58f7a1696ebeb13376aa0f8720600d4 ""
"/usr/share/texmf-dist/tex/generic/babel/babel.sty" 1591545468 35343 180ff3fc8cf1d846a7f48b26f8aa7c17 ""
"/usr/share/texmf-dist/tex/generic/babel/txtbabel.def" 1591545468 5211 2c3605e674ad86cdc9fdcfcd3de3a1da ""
"/usr/share/texmf-dist/tex/generic/bigintcalc/bigintcalc.sty" 1591545468 40635 c40361e206be584d448876bba8a64a3b ""
"/usr/share/texmf-dist/tex/generic/bitset/bitset.sty" 1591545468 33961 6b5c75130e435b2bfdb9f480a09a39f9 ""
"/usr/share/texmf-dist/tex/generic/etexcmds/etexcmds.sty" 1591545468 7734 b98cbb34c81f667027c1e3ebdbfce34b ""
"/usr/share/texmf-dist/tex/generic/gettitlestring/gettitlestring.sty" 1591545468 8371 9d55b8bd010bc717624922fb3477d92e ""
"/usr/share/texmf-dist/tex/generic/iftex/iftex.sty" 1591545468 6501 4011d89d9621e0b0901138815ba5ff29 ""
"/usr/share/texmf-dist/tex/generic/iftex/ifvtex.sty" 1591545468 1057 525c2192b5febbd8c1f662c9468335bb ""
"/usr/share/texmf-dist/tex/generic/infwarerr/infwarerr.sty" 1591545468 8356 7bbb2c2373aa810be568c29e333da8ed ""
"/usr/share/texmf-dist/tex/generic/intcalc/intcalc.sty" 1591545468 31769 002a487f55041f8e805cfbf6385ffd97 ""
"/usr/share/texmf-dist/tex/generic/kvdefinekeys/kvdefinekeys.sty" 1591545468 5412 d5a2436094cd7be85769db90f29250a6 ""
"/usr/share/texmf-dist/tex/generic/kvsetkeys/kvsetkeys.sty" 1591545468 13807 952b0226d4efca026f0e19dd266dcc22 ""
"/usr/share/texmf-dist/tex/generic/ltxcmds/ltxcmds.sty" 1591545468 18552 1e1cc7b75da0dfaacce7cdcb27d306bf ""
"/usr/share/texmf-dist/tex/generic/pdfescape/pdfescape.sty" 1591545468 19007 15924f7228aca6c6d184b115f4baa231 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcore.code.tex" 1591545468 992 fb3cda354707a54fda62787a411c7c22 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorearrows.code.tex" 1591545468 43820 bc6cf5aa959817914ace33f5c6232161 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreexternal.code.tex" 1591545468 19324 c9a64402f22bd8d81821141a357af653 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoregraphicstate.code.tex" 1591545468 6038 d639d02574be9a72f3c602c2a3510e02 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreimage.code.tex" 1591545468 6948 284bbe3c9a7ca0a826c1c03895e69b9f ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorelayers.code.tex" 1591545468 4883 a6f3eb1f71d8c4affaf43a169828b043 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreobjects.code.tex" 1591545468 2544 3b1b198fd49f01e328adc9162a07b213 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathconstruct.code.tex" 1591545468 44189 1fd6229dad4c898883516c032f2ca5d2 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathprocessing.code.tex" 1591545468 17311 3092579be20ef0f229c42ad3f09da85c ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathusage.code.tex" 1591545468 21302 d6c4b340248adbe650ebf6ca76bdccca ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepatterns.code.tex" 1591545468 9690 7585efa5a591822837f837bc5bc35621 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepoints.code.tex" 1591545468 33335 942ccafe284041918d36e54696b98aa7 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorequick.code.tex" 1591545468 2965 502761b60f43ab2de5ecb2f4625163ae ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorerdf.code.tex" 1591545468 5196 f8c5c775d4d6e2cb050392127cabda72 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorescopes.code.tex" 1591545468 20726 ed6ec1d6f0f35e7a93de4e79af83dbce ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreshade.code.tex" 1591545468 35249 144a6b9c4df4644618bb3a0a40472608 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoretransformations.code.tex" 1591545468 21989 266e83c51fe41eb8b8d5e6896dc71cc1 ""
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoretransparency.code.tex" 1591545468 8842 5cc856e132fac404805c6da091779283 ""
"/usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/libraries/tikzlibrarytopaths.code.tex" 1591545468 11544 2a5d66a3270abf4ef673e8a0b7734a90 ""
"/usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/tikz.code.tex" 1591545468 187592 7922ceab1864698dec4c84978d5b182f ""
"/usr/share/texmf-dist/tex/generic/pgf/libraries/pgflibraryplothandlers.code.tex" 1591545468 32995 a4d54c043ae5274ceaaddeb36ad43a6f ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfint.code.tex" 1591545468 3063 8c415c68a0f3394e45cfeca0b65f6ee6 ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex" 1591545468 521 c70cf6ad609de83a27ee7929eb356332 ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathcalc.code.tex" 1591545468 13391 933cab19c6d27039dbfc487330d1005a ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfloat.code.tex" 1591545468 104938 15f2d8bdabd6bf9ca70f62cd8e3d4940 ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.base.code.tex" 1591545468 10157 218d58ab074e5bd0d027de45ec64cc00 ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.basic.code.tex" 1591545468 28176 568b081ec39645f2db1a29fbd0c635e2 ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.code.tex" 1591545468 9054 388d21239a1b6df2cc8beaae31c976b0 ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.comparison.code.tex" 1591545468 3865 cddf7ddc80f018587c55afdcc79fc333 ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.integerarithmetics.code.tex" 1591545468 3177 27d85c44fbfe09ff3b2cf2879e3ea434 ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.misc.code.tex" 1591545468 10925 df50b8a6e5660a585e3a2bf55726dcc8 ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.random.code.tex" 1591545468 7787 1750fc3f164703caf31fc8ea9218c67e ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.round.code.tex" 1591545468 3379 cbd0948a550bd7a495a160ca6beee9ed ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.trigonometric.code.tex" 1591545468 92405 bba89470858d7b0788a9c09331c39653 ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathparser.code.tex" 1591545468 36526 453db1f8626a56b5ebb0fad496d6a39f ""
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathutil.code.tex" 1591545468 8471 b18959397c76e1e582402ab9f592ed9f ""
"/usr/share/texmf-dist/tex/generic/pgf/modules/pgfmodulematrix.code.tex" 1591545468 21201 46a4dded6619f990ac7347f99fbaac9f ""
"/usr/share/texmf-dist/tex/generic/pgf/modules/pgfmoduleplot.code.tex" 1591545468 16121 9e240115374a8d489f2f786115df83a9 ""
"/usr/share/texmf-dist/tex/generic/pgf/modules/pgfmoduleshapes.code.tex" 1591545468 43259 3e05ba63539916af2eaca603c2eda780 ""
"/usr/share/texmf-dist/tex/generic/pgf/pgf.revision.tex" 1591545468 465 1f401ab1e7fc6cb7ede39e96c66531fd ""
"/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgf.cfg" 1591545468 926 70ff613fabeb70f5d1673dc0c93987bd ""
"/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys-common-pdf.def" 1591545468 5546 3586827e6032c95512b2a6682d2979a3 ""
"/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys-pdftex.def" 1591545468 12603 c02869ea216d842c29d52fae8738264e ""
"/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys.code.tex" 1591545468 60269 e86bc0081af83a4ad47e4500ee09a2e4 ""
"/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsysprotocol.code.tex" 1591545468 1896 82c274ff520f9e450ccea4e3ef4edc12 ""
"/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsyssoftpath.code.tex" 1591545468 7778 a25a32a10ca820357491d4c7b3ac02ea ""
"/usr/share/texmf-dist/tex/generic/pgf/utilities/pgffor.code.tex" 1591545468 23777 cb6c8f02f87d86d621f5cb92c44f4998 ""
"/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeys.code.tex" 1591545468 36815 f7f1772c398f07af2cb741992963045c ""
"/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeysfiltered.code.tex" 1591545468 37439 bd44d50aef702b03193f731207931834 ""
"/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfrcs.code.tex" 1591545468 4494 7e5ace0ccf59408f2cf63219a5d36927 ""
"/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-common-lists.tex" 1591545468 7250 03b2b9fb5fa38e7ca5cc3c45860fb210 ""
"/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-common.tex" 1591545468 28309 488ccc6c701bbdd1bf671f708757aa5c ""
"/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-latex.def" 1591545468 6286 1bd76fc45da9929ab2a64f51cba3ab6f ""
"/usr/share/texmf-dist/tex/generic/uniquecounter/uniquecounter.sty" 1591545468 7008 f92eaa0a3872ed622bbf538217cd2ab7 ""
"/usr/share/texmf-dist/tex/latex/amsfonts/amsfonts.sty" 1591545468 5949 3f3fd50a8cc94c3d4cbf4fc66cd3df1c ""
"/usr/share/texmf-dist/tex/latex/amsfonts/amssymb.sty" 1591545468 13829 94730e64147574077f8ecfea9bb69af4 ""
"/usr/share/texmf-dist/tex/latex/amsfonts/umsa.fd" 1591545468 961 6518c6525a34feb5e8250ffa91731cff ""
@ -128,6 +203,8 @@
"/usr/share/texmf-dist/tex/latex/amsmath/amsmath.sty" 1591545468 85660 baee036978c7a91f4e2bba43f05e5945 ""
"/usr/share/texmf-dist/tex/latex/amsmath/amsopn.sty" 1591545468 4116 32e6abd27229755a83a8b7f18e583890 ""
"/usr/share/texmf-dist/tex/latex/amsmath/amstext.sty" 1591545468 2432 8ff93b1137020e8f21930562a874ae66 ""
"/usr/share/texmf-dist/tex/latex/atveryend/atveryend.sty" 1591545468 19336 ce7ae9438967282886b3b036cfad1e4d ""
"/usr/share/texmf-dist/tex/latex/auxhook/auxhook.sty" 1591545468 3935 57aa3c3e203a5c2effb4d2bd2efbc323 ""
"/usr/share/texmf-dist/tex/latex/base/fontenc.sty" 1591545468 4947 0c2888dd88121ae675fc6e82213623ba ""
"/usr/share/texmf-dist/tex/latex/base/ifthen.sty" 1591545468 5159 892429808d9e0e2b3548aaefd9a06ed0 ""
"/usr/share/texmf-dist/tex/latex/base/inputenc.sty" 1591545468 5050 8933a39ad74377accd18991c5eb90c58 ""
@ -135,6 +212,7 @@
"/usr/share/texmf-dist/tex/latex/base/size11.clo" 1591545468 8462 61fdf79debfc3dc4dab35ec6cf83fbf7 ""
"/usr/share/texmf-dist/tex/latex/base/t1cmtt.fd" 1591545468 2444 92c1f2a3fb5fbd5ac60f99eac55c9b29 ""
"/usr/share/texmf-dist/tex/latex/epstopdf-pkg/epstopdf-base.sty" 1591545468 13886 d1306dcf79a944f6988e688c1785f9ce ""
"/usr/share/texmf-dist/tex/latex/etoolbox/etoolbox.sty" 1591545468 45259 743c52a37a6e5ed83cfe0e128b2da10d ""
"/usr/share/texmf-dist/tex/latex/geometry/geometry.sty" 1591545468 41601 9cf6c5257b1bc7af01a58859749dd37a ""
"/usr/share/texmf-dist/tex/latex/graphics-cfg/color.cfg" 1591545468 1213 620bba36b25224fa9b7e1ccb4ecb76fd ""
"/usr/share/texmf-dist/tex/latex/graphics-cfg/graphics.cfg" 1591545468 1224 978390e9c2234eab29404bc21b268d1e ""
@ -143,20 +221,46 @@
"/usr/share/texmf-dist/tex/latex/graphics/graphicx.sty" 1591545468 9067 1b996612394a52e1efe89c8bfe8a5892 ""
"/usr/share/texmf-dist/tex/latex/graphics/keyval.sty" 1591545468 2590 e3b24ff953e5b58d924f163d25380312 ""
"/usr/share/texmf-dist/tex/latex/graphics/trig.sty" 1591545468 3976 d7fa7d81d2870d509d25b17d0245e735 ""
"/usr/share/texmf-dist/tex/latex/hycolor/hycolor.sty" 1591545468 17914 4c28a13fc3d975e6e81c9bea1d697276 ""
"/usr/share/texmf-dist/tex/latex/hyperref/hpdftex.def" 1591545468 50570 2e81797743231d9037b0cbe3436d74ba ""
"/usr/share/texmf-dist/tex/latex/hyperref/hyperref.sty" 1591545468 236775 8ab18a05f69e6caef423fa59cb0af03b ""
"/usr/share/texmf-dist/tex/latex/hyperref/nameref.sty" 1591545468 13244 0070bcab7b5a88187847128d22faf4d8 ""
"/usr/share/texmf-dist/tex/latex/hyperref/pd1enc.def" 1591545468 14134 c11767c54bd7ecab56984ee4e4e3158c ""
"/usr/share/texmf-dist/tex/latex/jknapltx/mathrsfs.sty" 1591545468 300 12fa6f636b617656f2810ee82cb05015 ""
"/usr/share/texmf-dist/tex/latex/jknapltx/ursfs.fd" 1591545468 548 cc4e3557704bfed27c7002773fad6c90 ""
"/usr/share/texmf-dist/tex/latex/kvoptions/kvoptions.sty" 1591545468 22520 c4c2dab203104295e1e618be7e5c0f5b ""
"/usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdfmode.def" 1591545468 25742 5de23a2d2bc67a3139433e702e64a437 ""
"/usr/share/texmf-dist/tex/latex/l3kernel/expl3.sty" 1591545468 4713 eb01a5180e90c7ac1715bb64e2c31227 ""
"/usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse-generic.tex" 1591545468 80141 edbf9289c99ff37db17116af7a3a423f ""
"/usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse.sty" 1591545468 5914 5eaa255b13fb7a5e47ededc8ec098dba ""
"/usr/share/texmf-dist/tex/latex/latexconfig/epstopdf-sys.cfg" 1591545468 678 4792914a8f45be57bb98413425e4c7af ""
"/usr/share/texmf-dist/tex/latex/letltxmacro/letltxmacro.sty" 1591545468 5766 13a9e8766c47f30327caf893ece86ac8 ""
"/usr/share/texmf-dist/tex/latex/listings/listings.cfg" 1591545468 1830 e31effa752c61538383451ae21332364 ""
"/usr/share/texmf-dist/tex/latex/listings/listings.sty" 1591545468 80964 64e57373f36316e4a09b517cbf1aba2e ""
"/usr/share/texmf-dist/tex/latex/listings/lstmisc.sty" 1591545468 77022 ee25ce086f4a79d8cf73bac6f94c02a5 ""
"/usr/share/texmf-dist/tex/latex/ms/everyshi.sty" 1591545468 3878 6aa7c08ff2621006e0603349e40a30a8 ""
"/usr/share/texmf-dist/tex/latex/pdftexcmds/pdftexcmds.sty" 1591545468 19989 e08c4750d96640367c4b141017eda013 ""
"/usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgf.sty" 1591545468 1090 d20f587ea9464d1841bd0d13d3ff9856 ""
"/usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgfcore.sty" 1591545468 410 5bf12ea7330e5f12c445332a4fe9a263 ""
"/usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-0-65.sty" 1591545468 21013 e98e1aaaf40d31632787c2bd25d24b57 ""
"/usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-1-18.sty" 1591545468 989 2cf3da8e8ec55131c49389428d565e37 ""
"/usr/share/texmf-dist/tex/latex/pgf/frontendlayer/tikz.sty" 1591545468 339 592cf35cba3d400082b8a9a5d0199d70 ""
"/usr/share/texmf-dist/tex/latex/pgf/math/pgfmath.sty" 1591545468 306 0796eafca5e159e6ec2167a6d22d81b1 ""
"/usr/share/texmf-dist/tex/latex/pgf/systemlayer/pgfsys.sty" 1591545468 443 0b2e781830192df35c0fd357cf13e26e ""
"/usr/share/texmf-dist/tex/latex/pgf/utilities/pgffor.sty" 1591545468 348 8927fde343487e003b01a4c2ca34073b ""
"/usr/share/texmf-dist/tex/latex/pgf/utilities/pgfkeys.sty" 1591545468 274 4cad6e665cc93ac2ac979039a94fa1e1 ""
"/usr/share/texmf-dist/tex/latex/pgf/utilities/pgfrcs.sty" 1591545468 325 2bcd023400636339210573e2b3ee298b ""
"/usr/share/texmf-dist/tex/latex/refcount/refcount.sty" 1591545468 9878 9e94e8fa600d95f9c7731bb21dfb67a4 ""
"/usr/share/texmf-dist/tex/latex/rerunfilecheck/rerunfilecheck.sty" 1591545468 9715 b051d5b493d9fe5f4bc251462d039e5f ""
"/usr/share/texmf-dist/tex/latex/tools/enumerate.sty" 1591545468 3469 19b6cb25f21abe53fb90b9fe27615441 ""
"/usr/share/texmf-dist/tex/latex/url/url.sty" 1591545468 12796 8edb7d69a20b857904dd0ea757c14ec9 ""
"/usr/share/texmf-dist/tex/latex/xcolor/xcolor.sty" 1591545468 55589 34128738f682d033422ca125f82e5d62 ""
"/usr/share/texmf-dist/web2c/texmf.cnf" 1591545468 33301 a3134070eacafb10b1f371612ce2650d ""
"/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map" 1599837712 334180 163417853e75f7c89e92e140d6d6e976 ""
"/var/lib/texmf/web2c/pdftex/pdflatex.fmt" 1599837703 2514050 ecf9fe402c479fca46412778ddf38de8 ""
(generated)
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc"
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.log"

View File

@ -9,6 +9,8 @@ INPUT /usr/share/texmf-dist/tex/latex/base/size11.clo
INPUT /usr/share/texmf-dist/tex/latex/base/size11.clo
INPUT /usr/share/texmf-dist/fonts/map/fontname/texfonts.map
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmr10.tfm
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Packages.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Packages.tex
INPUT /usr/share/texmf-dist/tex/latex/geometry/geometry.sty
INPUT /usr/share/texmf-dist/tex/latex/geometry/geometry.sty
INPUT /usr/share/texmf-dist/tex/latex/graphics/keyval.sty
@ -75,8 +77,158 @@ INPUT /usr/share/texmf-dist/tex/generic/kvsetkeys/kvsetkeys.sty
INPUT /usr/share/texmf-dist/tex/generic/kvsetkeys/kvsetkeys.sty
INPUT /usr/share/texmf-dist/tex/latex/base/ifthen.sty
INPUT /usr/share/texmf-dist/tex/latex/base/ifthen.sty
INPUT /usr/share/texmf-dist/tex/latex/hyperref/hyperref.sty
INPUT /usr/share/texmf-dist/tex/latex/hyperref/hyperref.sty
INPUT /usr/share/texmf-dist/tex/latex/pdftexcmds/pdftexcmds.sty
INPUT /usr/share/texmf-dist/tex/latex/pdftexcmds/pdftexcmds.sty
INPUT /usr/share/texmf-dist/tex/generic/infwarerr/infwarerr.sty
INPUT /usr/share/texmf-dist/tex/generic/infwarerr/infwarerr.sty
INPUT /usr/share/texmf-dist/tex/generic/kvdefinekeys/kvdefinekeys.sty
INPUT /usr/share/texmf-dist/tex/generic/kvdefinekeys/kvdefinekeys.sty
INPUT /usr/share/texmf-dist/tex/generic/pdfescape/pdfescape.sty
INPUT /usr/share/texmf-dist/tex/generic/pdfescape/pdfescape.sty
INPUT /usr/share/texmf-dist/tex/latex/hycolor/hycolor.sty
INPUT /usr/share/texmf-dist/tex/latex/hycolor/hycolor.sty
INPUT /usr/share/texmf-dist/tex/latex/letltxmacro/letltxmacro.sty
INPUT /usr/share/texmf-dist/tex/latex/letltxmacro/letltxmacro.sty
INPUT /usr/share/texmf-dist/tex/latex/auxhook/auxhook.sty
INPUT /usr/share/texmf-dist/tex/latex/auxhook/auxhook.sty
INPUT /usr/share/texmf-dist/tex/latex/hyperref/pd1enc.def
INPUT /usr/share/texmf-dist/tex/latex/hyperref/pd1enc.def
INPUT /usr/share/texmf-dist/tex/generic/intcalc/intcalc.sty
INPUT /usr/share/texmf-dist/tex/generic/intcalc/intcalc.sty
INPUT /usr/share/texmf-dist/tex/generic/etexcmds/etexcmds.sty
INPUT /usr/share/texmf-dist/tex/generic/etexcmds/etexcmds.sty
INPUT /usr/share/texmf-dist/tex/latex/url/url.sty
INPUT /usr/share/texmf-dist/tex/latex/url/url.sty
INPUT /usr/share/texmf-dist/tex/generic/bitset/bitset.sty
INPUT /usr/share/texmf-dist/tex/generic/bitset/bitset.sty
INPUT /usr/share/texmf-dist/tex/generic/bigintcalc/bigintcalc.sty
INPUT /usr/share/texmf-dist/tex/generic/bigintcalc/bigintcalc.sty
INPUT /usr/share/texmf-dist/tex/generic/atbegshi/atbegshi.sty
INPUT /usr/share/texmf-dist/tex/generic/atbegshi/atbegshi.sty
INPUT /usr/share/texmf-dist/tex/latex/hyperref/hpdftex.def
INPUT /usr/share/texmf-dist/tex/latex/hyperref/hpdftex.def
INPUT /usr/share/texmf-dist/tex/latex/atveryend/atveryend.sty
INPUT /usr/share/texmf-dist/tex/latex/atveryend/atveryend.sty
INPUT /usr/share/texmf-dist/tex/latex/rerunfilecheck/rerunfilecheck.sty
INPUT /usr/share/texmf-dist/tex/latex/rerunfilecheck/rerunfilecheck.sty
INPUT /usr/share/texmf-dist/tex/generic/uniquecounter/uniquecounter.sty
INPUT /usr/share/texmf-dist/tex/generic/uniquecounter/uniquecounter.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/frontendlayer/tikz.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/frontendlayer/tikz.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgf.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgf.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/utilities/pgfrcs.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/utilities/pgfrcs.sty
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-common.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-common-lists.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-latex.def
INPUT /usr/share/texmf-dist/tex/latex/ms/everyshi.sty
INPUT /usr/share/texmf-dist/tex/latex/ms/everyshi.sty
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfrcs.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfrcs.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/pgf.revision.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/pgf.revision.tex
INPUT /usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgfcore.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgfcore.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/systemlayer/pgfsys.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/systemlayer/pgfsys.sty
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeys.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeysfiltered.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgf.cfg
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys-pdftex.def
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys-pdftex.def
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys-common-pdf.def
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsyssoftpath.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsyssoftpath.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsysprotocol.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsysprotocol.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcore.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcore.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathcalc.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathutil.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathparser.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.basic.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.trigonometric.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.random.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.comparison.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.base.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.round.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.misc.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.integerarithmetics.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfloat.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfint.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepoints.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathconstruct.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathusage.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorescopes.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoregraphicstate.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoretransformations.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorequick.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreobjects.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathprocessing.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorearrows.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreshade.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreimage.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreexternal.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorelayers.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoretransparency.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepatterns.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorerdf.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/modules/pgfmoduleshapes.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/modules/pgfmoduleplot.code.tex
INPUT /usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-0-65.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-0-65.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-1-18.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-1-18.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/utilities/pgffor.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/utilities/pgffor.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/utilities/pgfkeys.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/utilities/pgfkeys.sty
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeys.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeys.code.tex
INPUT /usr/share/texmf-dist/tex/latex/pgf/math/pgfmath.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/math/pgfmath.sty
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgffor.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgffor.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/tikz.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/tikz.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/libraries/pgflibraryplothandlers.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/libraries/pgflibraryplothandlers.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/modules/pgfmodulematrix.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/libraries/tikzlibrarytopaths.code.tex
INPUT /usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/libraries/tikzlibrarytopaths.code.tex
INPUT /usr/local/share/texmf/tex/latex/mdframed/mdframed.sty
INPUT /usr/local/share/texmf/tex/latex/mdframed/mdframed.sty
INPUT /usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse.sty
INPUT /usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse.sty
INPUT /usr/share/texmf-dist/tex/latex/l3kernel/expl3.sty
INPUT /usr/share/texmf-dist/tex/latex/l3kernel/expl3.sty
INPUT /usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdfmode.def
INPUT /usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdfmode.def
INPUT /usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse-generic.tex
INPUT /usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse-generic.tex
INPUT /usr/share/texmf-dist/tex/latex/etoolbox/etoolbox.sty
INPUT /usr/share/texmf-dist/tex/latex/etoolbox/etoolbox.sty
INPUT /usr/local/share/texmf/tex/latex/zref/zref-abspage.sty
INPUT /usr/local/share/texmf/tex/latex/zref/zref-abspage.sty
INPUT /usr/local/share/texmf/tex/latex/zref/zref-base.sty
INPUT /usr/local/share/texmf/tex/latex/zref/zref-base.sty
INPUT /usr/local/share/texmf/tex/latex/needspace/needspace.sty
INPUT /usr/local/share/texmf/tex/latex/needspace/needspace.sty
INPUT /usr/share/texmf-dist/tex/latex/pgf/frontendlayer/tikz.sty
INPUT /usr/local/share/texmf/tex/latex/mdframed/md-frame-1.mdf
INPUT /usr/local/share/texmf/tex/latex/mdframed/md-frame-1.mdf
INPUT /usr/share/texmf-dist/tex/latex/tools/enumerate.sty
INPUT /usr/share/texmf-dist/tex/latex/tools/enumerate.sty
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux
OUTPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux
@ -86,6 +238,20 @@ INPUT /usr/share/texmf-dist/tex/latex/epstopdf-pkg/epstopdf-base.sty
INPUT /usr/share/texmf-dist/tex/latex/epstopdf-pkg/epstopdf-base.sty
INPUT /usr/share/texmf-dist/tex/latex/latexconfig/epstopdf-sys.cfg
INPUT /usr/share/texmf-dist/tex/latex/latexconfig/epstopdf-sys.cfg
INPUT /usr/share/texmf-dist/tex/latex/hyperref/nameref.sty
INPUT /usr/share/texmf-dist/tex/latex/hyperref/nameref.sty
INPUT /usr/share/texmf-dist/tex/latex/refcount/refcount.sty
INPUT /usr/share/texmf-dist/tex/latex/refcount/refcount.sty
INPUT /usr/share/texmf-dist/tex/generic/gettitlestring/gettitlestring.sty
INPUT /usr/share/texmf-dist/tex/generic/gettitlestring/gettitlestring.sty
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
OUTPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
OUTPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm1728.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm1200.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmr12.tfm
@ -115,7 +281,6 @@ INPUT /usr/share/texmf-dist/tex/latex/jknapltx/ursfs.fd
INPUT /usr/share/texmf-dist/fonts/tfm/public/rsfs/rsfs10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/rsfs/rsfs10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/rsfs/rsfs5.tfm
OUTPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf
INPUT /var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm2488.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecbx2488.tfm
@ -132,6 +297,8 @@ INPUT /usr/share/texmf-dist/tex/latex/base/t1cmtt.fd
INPUT /usr/share/texmf-dist/tex/latex/base/t1cmtt.fd
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ectt1095.tfm
OUTPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Inhalt.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Inhalt.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm2074.tfm
@ -248,7 +415,15 @@ INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hash
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ectt1440.tfm
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik - Teil 2.tex
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik - Teil 2.tex
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmbx12.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmbx10.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmbx7.tfm
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmbx12.tfm
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
INPUT /usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc
INPUT /usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx10.pfb
@ -257,6 +432,7 @@ INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmex10.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi10.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi6.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi7.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi8.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr6.pfb

View File

@ -1,4 +1,4 @@
This is pdfTeX, Version 3.14159265-2.6-1.40.21 (TeX Live 2020/Arch Linux) (preloaded format=pdflatex 2020.9.11) 18 SEP 2020 19:26
This is pdfTeX, Version 3.14159265-2.6-1.40.21 (TeX Live 2020/Arch Linux) (preloaded format=pdflatex 2020.9.11) 19 SEP 2020 17:43
entering extended mode
restricted \write18 enabled.
file:line:error style messages enabled.
@ -23,7 +23,7 @@ File: size11.clo 2019/12/20 v1.4l Standard LaTeX file (size option)
\abovecaptionskip=\skip47
\belowcaptionskip=\skip48
\bibindent=\dimen134
) (/usr/share/texmf-dist/tex/latex/geometry/geometry.sty
) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Packages.tex (/usr/share/texmf-dist/tex/latex/geometry/geometry.sty
Package: geometry 2020/01/02 v5.9 Page Geometry
(/usr/share/texmf-dist/tex/latex/graphics/keyval.sty
Package: keyval 2014/10/28 v1.15 key=value parser (DPC)
@ -197,25 +197,413 @@ Package: kvsetkeys 2019/12/15 v1.18 Key value parser (HO)
Package: ifthen 2014/09/29 v1.1c Standard LaTeX ifthen package (DPC)
)
\c@dirtytalk@qdepth=\count267
) (/usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdfmode.def
) (/usr/share/texmf-dist/tex/latex/hyperref/hyperref.sty
Package: hyperref 2020-05-15 v7.00e Hypertext links for LaTeX
(/usr/share/texmf-dist/tex/latex/pdftexcmds/pdftexcmds.sty
Package: pdftexcmds 2020-06-04 v0.32 Utility functions of pdfTeX for LuaTeX (HO)
(/usr/share/texmf-dist/tex/generic/infwarerr/infwarerr.sty
Package: infwarerr 2019/12/03 v1.5 Providing info/warning/error messages (HO)
)
Package pdftexcmds Info: \pdf@primitive is available.
Package pdftexcmds Info: \pdf@ifprimitive is available.
Package pdftexcmds Info: \pdfdraftmode found.
) (/usr/share/texmf-dist/tex/generic/kvdefinekeys/kvdefinekeys.sty
Package: kvdefinekeys 2019-12-19 v1.6 Define keys (HO)
) (/usr/share/texmf-dist/tex/generic/pdfescape/pdfescape.sty
Package: pdfescape 2019/12/09 v1.15 Implements pdfTeX's escape features (HO)
) (/usr/share/texmf-dist/tex/latex/hycolor/hycolor.sty
Package: hycolor 2020-01-27 v1.10 Color options for hyperref/bookmark (HO)
) (/usr/share/texmf-dist/tex/latex/letltxmacro/letltxmacro.sty
Package: letltxmacro 2019/12/03 v1.6 Let assignment for LaTeX macros (HO)
) (/usr/share/texmf-dist/tex/latex/auxhook/auxhook.sty
Package: auxhook 2019-12-17 v1.6 Hooks for auxiliary files (HO)
)
\@linkdim=\dimen159
\Hy@linkcounter=\count268
\Hy@pagecounter=\count269
(/usr/share/texmf-dist/tex/latex/hyperref/pd1enc.def
File: pd1enc.def 2020-05-15 v7.00e Hyperref: PDFDocEncoding definition (HO)
Now handling font encoding PD1 ...
... no UTF-8 mapping file for font encoding PD1
) (/usr/share/texmf-dist/tex/generic/intcalc/intcalc.sty
Package: intcalc 2019/12/15 v1.3 Expandable calculations with integers (HO)
) (/usr/share/texmf-dist/tex/generic/etexcmds/etexcmds.sty
Package: etexcmds 2019/12/15 v1.7 Avoid name clashes with e-TeX commands (HO)
)
\Hy@SavedSpaceFactor=\count270
Package hyperref Info: Hyper figures OFF on input line 4464.
Package hyperref Info: Link nesting OFF on input line 4469.
Package hyperref Info: Hyper index ON on input line 4472.
Package hyperref Info: Plain pages OFF on input line 4479.
Package hyperref Info: Backreferencing OFF on input line 4484.
Package hyperref Info: Implicit mode ON; LaTeX internals redefined.
Package hyperref Info: Bookmarks ON on input line 4717.
\c@Hy@tempcnt=\count271
(/usr/share/texmf-dist/tex/latex/url/url.sty
\Urlmuskip=\muskip17
Package: url 2013/09/16 ver 3.4 Verb mode for urls, etc.
)
LaTeX Info: Redefining \url on input line 5076.
\XeTeXLinkMargin=\dimen160
(/usr/share/texmf-dist/tex/generic/bitset/bitset.sty
Package: bitset 2019/12/09 v1.3 Handle bit-vector datatype (HO)
(/usr/share/texmf-dist/tex/generic/bigintcalc/bigintcalc.sty
Package: bigintcalc 2019/12/15 v1.5 Expandable calculations on big integers (HO)
))
\Fld@menulength=\count272
\Field@Width=\dimen161
\Fld@charsize=\dimen162
Package hyperref Info: Hyper figures OFF on input line 6347.
Package hyperref Info: Link nesting OFF on input line 6352.
Package hyperref Info: Hyper index ON on input line 6355.
Package hyperref Info: backreferencing OFF on input line 6362.
Package hyperref Info: Link coloring OFF on input line 6367.
Package hyperref Info: Link coloring with OCG OFF on input line 6372.
Package hyperref Info: PDF/A mode OFF on input line 6377.
LaTeX Info: Redefining \ref on input line 6417.
LaTeX Info: Redefining \pageref on input line 6421.
(/usr/share/texmf-dist/tex/generic/atbegshi/atbegshi.sty
Package: atbegshi 2019/12/05 v1.19 At begin shipout hook (HO)
)
\Hy@abspage=\count273
\c@Item=\count274
\c@Hfootnote=\count275
)
Package hyperref Info: Driver (autodetected): hpdftex.
(/usr/share/texmf-dist/tex/latex/hyperref/hpdftex.def
File: hpdftex.def 2020-05-15 v7.00e Hyperref driver for pdfTeX
(/usr/share/texmf-dist/tex/latex/atveryend/atveryend.sty
Package: atveryend 2019-12-11 v1.11 Hooks at the very end of document (HO)
Package atveryend Info: \enddocument detected (standard20110627).
)
\Fld@listcount=\count276
\c@bookmark@seq@number=\count277
(/usr/share/texmf-dist/tex/latex/rerunfilecheck/rerunfilecheck.sty
Package: rerunfilecheck 2019/12/05 v1.9 Rerun checks for auxiliary files (HO)
(/usr/share/texmf-dist/tex/generic/uniquecounter/uniquecounter.sty
Package: uniquecounter 2019/12/15 v1.4 Provide unlimited unique counter (HO)
)
Package uniquecounter Info: New unique counter `rerunfilecheck' on input line 286.
)
\Hy@SectionHShift=\skip52
) (/usr/share/texmf-dist/tex/latex/pgf/frontendlayer/tikz.sty (/usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgf.sty (/usr/share/texmf-dist/tex/latex/pgf/utilities/pgfrcs.sty (/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-common.tex
\pgfutil@everybye=\toks25
\pgfutil@tempdima=\dimen163
\pgfutil@tempdimb=\dimen164
(/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-common-lists.tex)) (/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-latex.def
\pgfutil@abb=\box49
(/usr/share/texmf-dist/tex/latex/ms/everyshi.sty
Package: everyshi 2001/05/15 v3.00 EveryShipout Package (MS)
)) (/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfrcs.code.tex (/usr/share/texmf-dist/tex/generic/pgf/pgf.revision.tex)
Package: pgfrcs 2020/01/08 v3.1.5b (3.1.5b)
))
Package: pgf 2020/01/08 v3.1.5b (3.1.5b)
(/usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgfcore.sty (/usr/share/texmf-dist/tex/latex/pgf/systemlayer/pgfsys.sty (/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys.code.tex
Package: pgfsys 2020/01/08 v3.1.5b (3.1.5b)
(/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeys.code.tex
\pgfkeys@pathtoks=\toks26
\pgfkeys@temptoks=\toks27
(/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeysfiltered.code.tex
\pgfkeys@tmptoks=\toks28
))
\pgf@x=\dimen165
\pgf@y=\dimen166
\pgf@xa=\dimen167
\pgf@ya=\dimen168
\pgf@xb=\dimen169
\pgf@yb=\dimen170
\pgf@xc=\dimen171
\pgf@yc=\dimen172
\pgf@xd=\dimen173
\pgf@yd=\dimen174
\w@pgf@writea=\write3
\r@pgf@reada=\read3
\c@pgf@counta=\count278
\c@pgf@countb=\count279
\c@pgf@countc=\count280
\c@pgf@countd=\count281
\t@pgf@toka=\toks29
\t@pgf@tokb=\toks30
\t@pgf@tokc=\toks31
\pgf@sys@id@count=\count282
(/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgf.cfg
File: pgf.cfg 2020/01/08 v3.1.5b (3.1.5b)
)
Driver file for pgf: pgfsys-pdftex.def
(/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys-pdftex.def
File: pgfsys-pdftex.def 2020/01/08 v3.1.5b (3.1.5b)
(/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys-common-pdf.def
File: pgfsys-common-pdf.def 2020/01/08 v3.1.5b (3.1.5b)
))) (/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsyssoftpath.code.tex
File: pgfsyssoftpath.code.tex 2020/01/08 v3.1.5b (3.1.5b)
\pgfsyssoftpath@smallbuffer@items=\count283
\pgfsyssoftpath@bigbuffer@items=\count284
) (/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsysprotocol.code.tex
File: pgfsysprotocol.code.tex 2020/01/08 v3.1.5b (3.1.5b)
)) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcore.code.tex
Package: pgfcore 2020/01/08 v3.1.5b (3.1.5b)
(/usr/share/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathcalc.code.tex (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathutil.code.tex) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathparser.code.tex
\pgfmath@dimen=\dimen175
\pgfmath@count=\count285
\pgfmath@box=\box50
\pgfmath@toks=\toks32
\pgfmath@stack@operand=\toks33
\pgfmath@stack@operation=\toks34
) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.code.tex (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.basic.code.tex) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.trigonometric.code.tex) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.random.code.tex) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.comparison.code.tex) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.base.code.tex) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.round.code.tex) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.misc.code.tex) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.integerarithmetics.code.tex))) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfloat.code.tex
\c@pgfmathroundto@lastzeros=\count286
)) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfint.code.tex) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepoints.code.tex
File: pgfcorepoints.code.tex 2020/01/08 v3.1.5b (3.1.5b)
\pgf@picminx=\dimen176
\pgf@picmaxx=\dimen177
\pgf@picminy=\dimen178
\pgf@picmaxy=\dimen179
\pgf@pathminx=\dimen180
\pgf@pathmaxx=\dimen181
\pgf@pathminy=\dimen182
\pgf@pathmaxy=\dimen183
\pgf@xx=\dimen184
\pgf@xy=\dimen185
\pgf@yx=\dimen186
\pgf@yy=\dimen187
\pgf@zx=\dimen188
\pgf@zy=\dimen189
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathconstruct.code.tex
File: pgfcorepathconstruct.code.tex 2020/01/08 v3.1.5b (3.1.5b)
\pgf@path@lastx=\dimen190
\pgf@path@lasty=\dimen191
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathusage.code.tex
File: pgfcorepathusage.code.tex 2020/01/08 v3.1.5b (3.1.5b)
\pgf@shorten@end@additional=\dimen192
\pgf@shorten@start@additional=\dimen193
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorescopes.code.tex
File: pgfcorescopes.code.tex 2020/01/08 v3.1.5b (3.1.5b)
\pgfpic=\box51
\pgf@hbox=\box52
\pgf@layerbox@main=\box53
\pgf@picture@serial@count=\count287
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoregraphicstate.code.tex
File: pgfcoregraphicstate.code.tex 2020/01/08 v3.1.5b (3.1.5b)
\pgflinewidth=\dimen194
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoretransformations.code.tex
File: pgfcoretransformations.code.tex 2020/01/08 v3.1.5b (3.1.5b)
\pgf@pt@x=\dimen195
\pgf@pt@y=\dimen196
\pgf@pt@temp=\dimen197
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorequick.code.tex
File: pgfcorequick.code.tex 2020/01/08 v3.1.5b (3.1.5b)
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreobjects.code.tex
File: pgfcoreobjects.code.tex 2020/01/08 v3.1.5b (3.1.5b)
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathprocessing.code.tex
File: pgfcorepathprocessing.code.tex 2020/01/08 v3.1.5b (3.1.5b)
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorearrows.code.tex
File: pgfcorearrows.code.tex 2020/01/08 v3.1.5b (3.1.5b)
\pgfarrowsep=\dimen198
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreshade.code.tex
File: pgfcoreshade.code.tex 2020/01/08 v3.1.5b (3.1.5b)
\pgf@max=\dimen199
\pgf@sys@shading@range@num=\count288
\pgf@shadingcount=\count289
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreimage.code.tex
File: pgfcoreimage.code.tex 2020/01/08 v3.1.5b (3.1.5b)
(/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreexternal.code.tex
File: pgfcoreexternal.code.tex 2020/01/08 v3.1.5b (3.1.5b)
\pgfexternal@startupbox=\box54
)) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorelayers.code.tex
File: pgfcorelayers.code.tex 2020/01/08 v3.1.5b (3.1.5b)
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoretransparency.code.tex
File: pgfcoretransparency.code.tex 2020/01/08 v3.1.5b (3.1.5b)
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepatterns.code.tex
File: pgfcorepatterns.code.tex 2020/01/08 v3.1.5b (3.1.5b)
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorerdf.code.tex
File: pgfcorerdf.code.tex 2020/01/08 v3.1.5b (3.1.5b)
))) (/usr/share/texmf-dist/tex/generic/pgf/modules/pgfmoduleshapes.code.tex
File: pgfmoduleshapes.code.tex 2020/01/08 v3.1.5b (3.1.5b)
\pgfnodeparttextbox=\box55
) (/usr/share/texmf-dist/tex/generic/pgf/modules/pgfmoduleplot.code.tex
File: pgfmoduleplot.code.tex 2020/01/08 v3.1.5b (3.1.5b)
) (/usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-0-65.sty
Package: pgfcomp-version-0-65 2020/01/08 v3.1.5b (3.1.5b)
\pgf@nodesepstart=\dimen256
\pgf@nodesepend=\dimen257
) (/usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-1-18.sty
Package: pgfcomp-version-1-18 2020/01/08 v3.1.5b (3.1.5b)
)) (/usr/share/texmf-dist/tex/latex/pgf/utilities/pgffor.sty (/usr/share/texmf-dist/tex/latex/pgf/utilities/pgfkeys.sty (/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeys.code.tex)) (/usr/share/texmf-dist/tex/latex/pgf/math/pgfmath.sty (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex)) (/usr/share/texmf-dist/tex/generic/pgf/utilities/pgffor.code.tex
Package: pgffor 2020/01/08 v3.1.5b (3.1.5b)
(/usr/share/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex)
\pgffor@iter=\dimen258
\pgffor@skip=\dimen259
\pgffor@stack=\toks35
\pgffor@toks=\toks36
)) (/usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/tikz.code.tex
Package: tikz 2020/01/08 v3.1.5b (3.1.5b)
(/usr/share/texmf-dist/tex/generic/pgf/libraries/pgflibraryplothandlers.code.tex
File: pgflibraryplothandlers.code.tex 2020/01/08 v3.1.5b (3.1.5b)
\pgf@plot@mark@count=\count290
\pgfplotmarksize=\dimen260
)
\tikz@lastx=\dimen261
\tikz@lasty=\dimen262
\tikz@lastxsaved=\dimen263
\tikz@lastysaved=\dimen264
\tikz@lastmovetox=\dimen265
\tikz@lastmovetoy=\dimen266
\tikzleveldistance=\dimen267
\tikzsiblingdistance=\dimen268
\tikz@figbox=\box56
\tikz@figbox@bg=\box57
\tikz@tempbox=\box58
\tikz@tempbox@bg=\box59
\tikztreelevel=\count291
\tikznumberofchildren=\count292
\tikznumberofcurrentchild=\count293
\tikz@fig@count=\count294
(/usr/share/texmf-dist/tex/generic/pgf/modules/pgfmodulematrix.code.tex
File: pgfmodulematrix.code.tex 2020/01/08 v3.1.5b (3.1.5b)
\pgfmatrixcurrentrow=\count295
\pgfmatrixcurrentcolumn=\count296
\pgf@matrix@numberofcolumns=\count297
)
\tikz@expandcount=\count298
(/usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/libraries/tikzlibrarytopaths.code.tex
File: tikzlibrarytopaths.code.tex 2020/01/08 v3.1.5b (3.1.5b)
))) (/usr/local/share/texmf/tex/latex/mdframed/mdframed.sty
Package: mdframed 2013/07/01 1.9b: mdframed
(/usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse.sty (/usr/share/texmf-dist/tex/latex/l3kernel/expl3.sty
Package: expl3 2020-06-03 L3 programming layer (loader)
(/usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdfmode.def
File: l3backend-pdfmode.def 2020-06-03 L3 backend support: PDF mode
\l__kernel_color_stack_int=\count268
\l__pdf_internal_box=\box49
\l__kernel_color_stack_int=\count299
\l__pdf_internal_box=\box60
))
Package: xparse 2020-05-15 L3 Experimental document command parser
(/usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse-generic.tex
\l__xparse_current_arg_int=\count300
\g__xparse_grabber_int=\count301
\l__xparse_m_args_int=\count302
\l__xparse_v_nesting_int=\count303
)) (/usr/share/texmf-dist/tex/latex/etoolbox/etoolbox.sty
Package: etoolbox 2019/09/21 v2.5h e-TeX tools for LaTeX (JAW)
\etb@tempcnta=\count304
) (/usr/local/share/texmf/tex/latex/zref/zref-abspage.sty
Package: zref-abspage 2020-05-28 v2.31 Module abspage for zref (HO)
(/usr/local/share/texmf/tex/latex/zref/zref-base.sty
Package: zref-base 2020-05-28 v2.31 Module base for zref (HO)
Package zref Info: New property list: main on input line 763.
Package zref Info: New property: default on input line 764.
Package zref Info: New property: page on input line 765.
)
\c@abspage=\count305
Package zref Info: New property: abspage on input line 66.
) (/usr/local/share/texmf/tex/latex/needspace/needspace.sty
Package: needspace 2010/09/12 v1.3d reserve vertical space
)
\mdf@templength=\skip53
\c@mdf@globalstyle@cnt=\count306
\mdf@skipabove@length=\skip54
\mdf@skipbelow@length=\skip55
\mdf@leftmargin@length=\skip56
\mdf@rightmargin@length=\skip57
\mdf@innerleftmargin@length=\skip58
\mdf@innerrightmargin@length=\skip59
\mdf@innertopmargin@length=\skip60
\mdf@innerbottommargin@length=\skip61
\mdf@splittopskip@length=\skip62
\mdf@splitbottomskip@length=\skip63
\mdf@outermargin@length=\skip64
\mdf@innermargin@length=\skip65
\mdf@linewidth@length=\skip66
\mdf@innerlinewidth@length=\skip67
\mdf@middlelinewidth@length=\skip68
\mdf@outerlinewidth@length=\skip69
\mdf@roundcorner@length=\skip70
\mdf@footenotedistance@length=\skip71
\mdf@userdefinedwidth@length=\skip72
\mdf@needspace@length=\skip73
\mdf@frametitleaboveskip@length=\skip74
\mdf@frametitlebelowskip@length=\skip75
\mdf@frametitlerulewidth@length=\skip76
\mdf@frametitleleftmargin@length=\skip77
\mdf@frametitlerightmargin@length=\skip78
\mdf@shadowsize@length=\skip79
\mdf@extratopheight@length=\skip80
\mdf@subtitleabovelinewidth@length=\skip81
\mdf@subtitlebelowlinewidth@length=\skip82
\mdf@subtitleaboveskip@length=\skip83
\mdf@subtitlebelowskip@length=\skip84
\mdf@subtitleinneraboveskip@length=\skip85
\mdf@subtitleinnerbelowskip@length=\skip86
\mdf@subsubtitleabovelinewidth@length=\skip87
\mdf@subsubtitlebelowlinewidth@length=\skip88
\mdf@subsubtitleaboveskip@length=\skip89
\mdf@subsubtitlebelowskip@length=\skip90
\mdf@subsubtitleinneraboveskip@length=\skip91
\mdf@subsubtitleinnerbelowskip@length=\skip92
(/usr/local/share/texmf/tex/latex/mdframed/md-frame-1.mdf
File: md-frame-1.mdf 2013/07/01\ 1.9b: md-frame-1
)
\mdf@frametitlebox=\box61
\mdf@footnotebox=\box62
\mdf@splitbox@one=\box63
\mdf@splitbox@two=\box64
\mdf@splitbox@save=\box65
\mdfsplitboxwidth=\skip93
\mdfsplitboxtotalwidth=\skip94
\mdfsplitboxheight=\skip95
\mdfsplitboxdepth=\skip96
\mdfsplitboxtotalheight=\skip97
\mdfframetitleboxwidth=\skip98
\mdfframetitleboxtotalwidth=\skip99
\mdfframetitleboxheight=\skip100
\mdfframetitleboxdepth=\skip101
\mdfframetitleboxtotalheight=\skip102
\mdffootnoteboxwidth=\skip103
\mdffootnoteboxtotalwidth=\skip104
\mdffootnoteboxheight=\skip105
\mdffootnoteboxdepth=\skip106
\mdffootnoteboxtotalheight=\skip107
\mdftotallinewidth=\skip108
\mdfboundingboxwidth=\skip109
\mdfboundingboxtotalwidth=\skip110
\mdfboundingboxheight=\skip111
\mdfboundingboxdepth=\skip112
\mdfboundingboxtotalheight=\skip113
\mdf@freevspace@length=\skip114
\mdf@horizontalwidthofbox@length=\skip115
\mdf@verticalmarginwhole@length=\skip116
\mdf@horizontalspaceofbox=\skip117
\mdfsubtitleheight=\skip118
\mdfsubsubtitleheight=\skip119
\c@mdfcountframes=\count307
****** mdframed patching \endmdf@trivlist
****** -- success******
\mdf@envdepth=\count308
\c@mdf@env@i=\count309
\c@mdf@env@ii=\count310
\c@mdf@zref@counter=\count311
Package zref Info: New property: mdf@pagevalue on input line 895.
)) (/usr/share/texmf-dist/tex/latex/tools/enumerate.sty
Package: enumerate 2015/07/23 v3.00 enumerate extensions (DPC)
\@enLab=\toks37
) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux)
LaTeX Font Info: Checking defaults for OML/cmm/m/it on input line 35.
LaTeX Font Info: ... okay on input line 35.
LaTeX Font Info: Checking defaults for OMS/cmsy/m/n on input line 35.
LaTeX Font Info: ... okay on input line 35.
LaTeX Font Info: Checking defaults for OT1/cmr/m/n on input line 35.
LaTeX Font Info: ... okay on input line 35.
LaTeX Font Info: Checking defaults for T1/cmr/m/n on input line 35.
LaTeX Font Info: ... okay on input line 35.
LaTeX Font Info: Checking defaults for TS1/cmr/m/n on input line 35.
LaTeX Font Info: ... okay on input line 35.
LaTeX Font Info: Checking defaults for OMX/cmex/m/n on input line 35.
LaTeX Font Info: ... okay on input line 35.
LaTeX Font Info: Checking defaults for U/cmr/m/n on input line 35.
LaTeX Font Info: ... okay on input line 35.
LaTeX Font Info: Checking defaults for OML/cmm/m/it on input line 11.
LaTeX Font Info: ... okay on input line 11.
LaTeX Font Info: Checking defaults for OMS/cmsy/m/n on input line 11.
LaTeX Font Info: ... okay on input line 11.
LaTeX Font Info: Checking defaults for OT1/cmr/m/n on input line 11.
LaTeX Font Info: ... okay on input line 11.
LaTeX Font Info: Checking defaults for T1/cmr/m/n on input line 11.
LaTeX Font Info: ... okay on input line 11.
LaTeX Font Info: Checking defaults for TS1/cmr/m/n on input line 11.
LaTeX Font Info: ... okay on input line 11.
LaTeX Font Info: Checking defaults for OMX/cmex/m/n on input line 11.
LaTeX Font Info: ... okay on input line 11.
LaTeX Font Info: Checking defaults for U/cmr/m/n on input line 11.
LaTeX Font Info: ... okay on input line 11.
LaTeX Font Info: Checking defaults for PD1/pdf/m/n on input line 11.
LaTeX Font Info: ... okay on input line 11.
*geometry* driver: auto-detecting
*geometry* detected driver: pdftex
@ -253,49 +641,70 @@ LaTeX Font Info: ... okay on input line 35.
(/usr/share/texmf-dist/tex/context/base/mkii/supp-pdf.mkii
[Loading MPS to PDF converter (version 2006.09.02).]
\scratchcounter=\count269
\scratchdimen=\dimen159
\scratchbox=\box50
\nofMPsegments=\count270
\nofMParguments=\count271
\everyMPshowfont=\toks25
\MPscratchCnt=\count272
\MPscratchDim=\dimen160
\MPnumerator=\count273
\makeMPintoPDFobject=\count274
\everyMPtoPDFconversion=\toks26
\scratchcounter=\count312
\scratchdimen=\dimen269
\scratchbox=\box66
\nofMPsegments=\count313
\nofMParguments=\count314
\everyMPshowfont=\toks38
\MPscratchCnt=\count315
\MPscratchDim=\dimen270
\MPnumerator=\count316
\makeMPintoPDFobject=\count317
\everyMPtoPDFconversion=\toks39
) (/usr/share/texmf-dist/tex/latex/epstopdf-pkg/epstopdf-base.sty
Package: epstopdf-base 2020-01-24 v2.11 Base part for package epstopdf
Package epstopdf-base Info: Redefining graphics rule for `.eps' on input line 485.
(/usr/share/texmf-dist/tex/latex/latexconfig/epstopdf-sys.cfg
File: epstopdf-sys.cfg 2010/07/13 v1.3 Configuration of (r)epstopdf for TeX Live
))
\c@lstlisting=\count275
LaTeX Font Info: Trying to load font information for U+msa on input line 38.
\c@lstlisting=\count318
\AtBeginShipoutBox=\box67
Package hyperref Info: Link coloring OFF on input line 11.
(/usr/share/texmf-dist/tex/latex/hyperref/nameref.sty
Package: nameref 2019/09/16 v2.46 Cross-referencing by name of section
(/usr/share/texmf-dist/tex/latex/refcount/refcount.sty
Package: refcount 2019/12/15 v3.6 Data extraction from label references (HO)
) (/usr/share/texmf-dist/tex/generic/gettitlestring/gettitlestring.sty
Package: gettitlestring 2019/12/15 v1.6 Cleanup title references (HO)
)
\c@section@level=\count319
)
LaTeX Info: Redefining \ref on input line 11.
LaTeX Info: Redefining \pageref on input line 11.
LaTeX Info: Redefining \nameref on input line 11.
(/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out)
\@outlinefile=\write4
ABD: EveryShipout initializing macros
LaTeX Font Info: Trying to load font information for U+msa on input line 15.
(/usr/share/texmf-dist/tex/latex/amsfonts/umsa.fd
File: umsa.fd 2013/01/14 v3.01 AMS symbols A
)
LaTeX Font Info: Trying to load font information for U+msb on input line 38.
LaTeX Font Info: Trying to load font information for U+msb on input line 15.
(/usr/share/texmf-dist/tex/latex/amsfonts/umsb.fd
File: umsb.fd 2013/01/14 v3.01 AMS symbols B
)
LaTeX Font Info: Trying to load font information for U+rsfs on input line 38.
LaTeX Font Info: Trying to load font information for U+rsfs on input line 15.
(/usr/share/texmf-dist/tex/latex/jknapltx/ursfs.fd
File: ursfs.fd 1998/03/24 rsfs font definition file (jk)
) [1
{/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map}] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc [1
{/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map}] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tocpdfTeX warning (ext4): destination with the same identifier (name{page.1}) has been already used, duplicate ignored
<to be read again>
\relax
l.55 ...Verschlüsselungsverfahren}{14}{chapter.4}
% [1
]
LaTeX Font Info: Trying to load font information for T1+cmtt on input line 99.
LaTeX Font Info: Trying to load font information for T1+cmtt on input line 101.
(/usr/share/texmf-dist/tex/latex/base/t1cmtt.fd
File: t1cmtt.fd 2019/12/16 v2.5j Standard LaTeX font definitions
) [2])
\tf@toc=\write3
[3] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex
\tf@toc=\write5
[3] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Inhalt.tex (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex
Kapitel 1.
<./images/Skytale.png, id=24, 614.6965pt x 351.3125pt>
<./images/Skytale.png, id=564, 614.6965pt x 351.3125pt>
File: ./images/Skytale.png Graphic file (type png)
<use ./images/Skytale.png>
Package pdftex.def Info: ./images/Skytale.png used on input line 6.
@ -308,7 +717,7 @@ Underfull \hbox (badness 10000) in paragraph at lines 11--12
[4
</home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Skytale.png>]
<./images/Vignère-Verfahren.png, id=35, 444.41896pt x 257.5138pt>
<./images/Vignère-Verfahren.png, id=579, 444.41896pt x 257.5138pt>
File: ./images/Vignère-Verfahren.png Graphic file (type png)
<use ./images/Vignère-Verfahren.png>
Package pdftex.def Info: ./images/Vignère-Verfahren.png used on input line 50.
@ -320,21 +729,58 @@ Underfull \hbox (badness 10000) in paragraph at lines 47--51
[5 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Vignère-Verfahren.png (PNG copy)>]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex [6]
Kapitel 2.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `math shift' on input line 10.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `subscript' on input line 10.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `math shift' on input line 10.
[7
] [8]
Underfull \hbox (badness 10000) in paragraph at lines 108--109
Underfull \hbox (badness 10000) in paragraph at lines 125--126
[]
[9]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex [10]
[9]
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `math shift' on input line 141.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `\varphi' on input line 141.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `math shift' on input line 141.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `math shift' on input line 154.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `\varphi' on input line 154.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `math shift' on input line 154.
) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex [10]
Kapitel 3.
<./images/Abhörung.png, id=63, 158.66173pt x 78.08482pt>
<./images/Abhörung.png, id=640, 158.66173pt x 78.08482pt>
File: ./images/Abhörung.png Graphic file (type png)
<use ./images/Abhörung.png>
Package pdftex.def Info: ./images/Abhörung.png used on input line 6.
(pdftex.def) Requested size: 158.66132pt x 78.08463pt.
<./images/Übertragungsmanipulation.png, id=64, 160.3231pt x 72.27pt>
<./images/Übertragungsmanipulation.png, id=641, 160.3231pt x 72.27pt>
File: ./images/Übertragungsmanipulation.png Graphic file (type png)
<use ./images/Übertragungsmanipulation.png>
Package pdftex.def Info: ./images/Übertragungsmanipulation.png used on input line 23.
@ -342,17 +788,17 @@ Package pdftex.def Info: ./images/Übertragungsmanipulation.png used on input l
[11
</home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Abhörung.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Übertragungsmanipulation.png (PNG copy)>]
<./images/Authenzitätsstörung_0.png, id=69, 156.16966pt x 61.47104pt>
<./images/Authenzitätsstörung_0.png, id=647, 156.16966pt x 61.47104pt>
File: ./images/Authenzitätsstörung_0.png Graphic file (type png)
<use ./images/Authenzitätsstörung_0.png>
Package pdftex.def Info: ./images/Authenzitätsstörung_0.png used on input line 30.
(pdftex.def) Requested size: 156.16927pt x 61.47087pt.
<./images/Authenzitätsstörung_1.png, id=70, 147.03207pt x 62.30173pt>
<./images/Authenzitätsstörung_1.png, id=648, 147.03207pt x 62.30173pt>
File: ./images/Authenzitätsstörung_1.png Graphic file (type png)
<use ./images/Authenzitätsstörung_1.png>
Package pdftex.def Info: ./images/Authenzitätsstörung_1.png used on input line 31.
(pdftex.def) Requested size: 147.03171pt x 62.30157pt.
<./images/Authenzitätsstörung_2.png, id=71, 153.67758pt x 72.27pt>
<./images/Authenzitätsstörung_2.png, id=649, 153.67758pt x 72.27pt>
File: ./images/Authenzitätsstörung_2.png Graphic file (type png)
<use ./images/Authenzitätsstörung_2.png>
Package pdftex.def Info: ./images/Authenzitätsstörung_2.png used on input line 32.
@ -382,6 +828,22 @@ Underfull \hbox (badness 10000) in paragraph at lines 50--53
[]
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `math shift' on input line 53.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `math shift' on input line 53.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `math shift' on input line 61.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `math shift' on input line 61.
Overfull \hbox (30.70032pt too wide) in paragraph at lines 69--70
[]\T1/cmr/m/n/10.95 Es soll kei-nen An-griff auf die Klar-text-nach-richt $\OML/cmm/m/it/10.95 m$ \T1/cmr/m/n/10.95 ge-ben, der durch-schnitt-lich we-ni-ger als $[] [][]\OML/cmm/m/it/10.95 ; [][]$
[]
@ -393,7 +855,7 @@ Overfull \hbox (29.27113pt too wide) in paragraph at lines 8--10
\T1/cmr/m/n/10.95 Bei man-chen Ver-fah-ren kön-nen bei der Be-rech-nung des $\OML/cmm/m/it/10.95 i$\T1/cmr/m/n/10.95 -ten Ge-heim-text-zei-chens $\OML/cmm/m/it/10.95 c[] \OT1/cmr/m/n/10.95 = \OML/cmm/m/it/10.95 E[]\OT1/cmr/m/n/10.95 (\OML/cmm/m/it/10.95 k; \OT1/cmr/m/n/10.95 (\OML/cmm/m/it/10.95 m[]; m[]; :::; m[]\OT1/cmr/m/n/10.95 ))$
[]
<./images/Stromverschlüsselung.png, id=88, 472.66241pt x 229.27034pt>
<./images/Stromverschlüsselung.png, id=682, 472.66241pt x 229.27034pt>
File: ./images/Stromverschlüsselung.png Graphic file (type png)
<use ./images/Stromverschlüsselung.png>
Package pdftex.def Info: ./images/Stromverschlüsselung.png used on input line 11.
@ -403,7 +865,7 @@ Overfull \hbox (5.96439pt too wide) in paragraph at lines 11--12
[][]
[]
<./images/synchrone Stromverschlüsselung.png, id=89, 469.33966pt x 215.97931pt>
<./images/synchrone Stromverschlüsselung.png, id=684, 469.33966pt x 215.97931pt>
File: ./images/synchrone Stromverschlüsselung.png Graphic file (type png)
<use ./images/synchrone Stromverschlüsselung.png>
Package pdftex.def Info: ./images/synchrone Stromverschlüsselung.png used on input line 21.
@ -416,7 +878,7 @@ Overfull \hbox (2.64163pt too wide) in paragraph at lines 21--22
[17
</home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Stromverschlüsselung.png (PNG copy)>]
<./images/zustandsabhängige Stromverschlüsselung.png, id=93, 482.63069pt x 217.64069pt>
<./images/zustandsabhängige Stromverschlüsselung.png, id=689, 482.63069pt x 217.64069pt>
File: ./images/zustandsabhängige Stromverschlüsselung.png Graphic file (type png)
<use ./images/zustandsabhängige Stromverschlüsselung.png>
Package pdftex.def Info: ./images/zustandsabhängige Stromverschlüsselung.png used on input line 38.
@ -427,7 +889,7 @@ Overfull \hbox (15.93263pt too wide) in paragraph at lines 38--39
[]
[18 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone Stromverschlüsselung.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/zustandsabhängige Stromverschlüsselung.png (PNG copy)>]
<./images/additive zustandsabhängige Stromverschlüsselung.png, id=98, 471.00104pt x 219.30206pt>
<./images/additive zustandsabhängige Stromverschlüsselung.png, id=696, 471.00104pt x 219.30206pt>
File: ./images/additive zustandsabhängige Stromverschlüsselung.png Graphic file (type png)
<use ./images/additive zustandsabhängige Stromverschlüsselung.png>
Package pdftex.def Info: ./images/additive zustandsabhängige Stromverschlüsselung.png used on input line 46.
@ -437,7 +899,7 @@ Overfull \hbox (4.30301pt too wide) in paragraph at lines 46--47
[][]
[]
<./images/synchrone additive Stromverschlüsselung.png, id=99, 471.83173pt x 218.47137pt>
<./images/synchrone additive Stromverschlüsselung.png, id=697, 471.83173pt x 218.47137pt>
File: ./images/synchrone additive Stromverschlüsselung.png Graphic file (type png)
<use ./images/synchrone additive Stromverschlüsselung.png>
Package pdftex.def Info: ./images/synchrone additive Stromverschlüsselung.png used on input line 54.
@ -449,7 +911,7 @@ Overfull \hbox (5.1337pt too wide) in paragraph at lines 54--55
[19 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/additive zustandsabhängige Stromverschlüsselung.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone additive Stromverschlüsselung.png (PNG copy)>]
Missing character: There is no k in font rsfs10!
<./images/Schlüsselstromgenerator mit Nonce.png, id=103, 473.4931pt x 215.97931pt>
<./images/Schlüsselstromgenerator mit Nonce.png, id=707, 473.4931pt x 215.97931pt>
File: ./images/Schlüsselstromgenerator mit Nonce.png Graphic file (type png)
<use ./images/Schlüsselstromgenerator mit Nonce.png>
Package pdftex.def Info: ./images/Schlüsselstromgenerator mit Nonce.png used on input line 82.
@ -474,23 +936,23 @@ Underfull \hbox (badness 10000) in paragraph at lines 4--6
[23
]
<./images/ECB.png, id=118, 466.84758pt x 215.97931pt>
<./images/ECB.png, id=727, 466.84758pt x 215.97931pt>
File: ./images/ECB.png Graphic file (type png)
<use ./images/ECB.png>
Package pdftex.def Info: ./images/ECB.png used on input line 34.
(pdftex.def) Requested size: 466.84644pt x 215.97878pt.
<./images/ECB_Nonce.png, id=119, 471.00104pt x 221.79414pt>
<./images/ECB_Nonce.png, id=728, 471.00104pt x 221.79414pt>
File: ./images/ECB_Nonce.png Graphic file (type png)
<use ./images/ECB_Nonce.png>
Package pdftex.def Info: ./images/ECB_Nonce.png used on input line 36.
(pdftex.def) Requested size: 470.99988pt x 221.7936pt.
<./images/CBC_enc.png, id=120, 474.32379pt x 219.30206pt>
<./images/CBC_enc.png, id=729, 474.32379pt x 219.30206pt>
File: ./images/CBC_enc.png Graphic file (type png)
<use ./images/CBC_enc.png>
Package pdftex.def Info: ./images/CBC_enc.png used on input line 45.
(pdftex.def) Requested size: 474.32263pt x 219.30151pt.
[24 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB_Nonce.png (PNG copy)>]
<./images/CBC_dec.png, id=125, 469.33966pt x 214.31793pt>
<./images/CBC_dec.png, id=735, 469.33966pt x 214.31793pt>
File: ./images/CBC_dec.png Graphic file (type png)
<use ./images/CBC_dec.png>
Package pdftex.def Info: ./images/CBC_dec.png used on input line 51.
@ -505,7 +967,7 @@ Overfull \hbox (61.4574pt too wide) in paragraph at lines 68--70
\T1/cmr/m/n/10.95 Wenn die Län-ge der Nach-richt $\OML/cmm/m/it/10.95 m$ \T1/cmr/m/n/10.95 ein Viel-fa-ches des Block-län-ge $\OML/cmm/m/it/10.95 l$ \T1/cmr/m/n/10.95 ist wird das nor-ma-le CBC-Verschlüsselungsverfahren
[]
<./images/CTR.png, id=129, 515.02759pt x 240.0693pt>
<./images/CTR.png, id=744, 515.02759pt x 240.0693pt>
File: ./images/CTR.png Graphic file (type png)
<use ./images/CTR.png>
Package pdftex.def Info: ./images/CTR.png used on input line 85.
@ -515,7 +977,7 @@ Overfull \hbox (31.32945pt too wide) in paragraph at lines 84--86
[]
[]
<./images/OFB.png, id=130, 516.42938pt x 235.63031pt>
<./images/OFB.png, id=746, 516.42938pt x 235.63031pt>
File: ./images/OFB.png Graphic file (type png)
<use ./images/OFB.png>
Package pdftex.def Info: ./images/OFB.png used on input line 90.
@ -531,7 +993,7 @@ Underfull \hbox (badness 10000) in paragraph at lines 88--91
[]
[26 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CTR.png (PNG copy)>]
<./images/CFB.png, id=134, 518.6878pt x 239.39438pt>
<./images/CFB.png, id=754, 518.6878pt x 239.39438pt>
File: ./images/CFB.png Graphic file (type png)
<use ./images/CFB.png>
Package pdftex.def Info: ./images/CFB.png used on input line 101.
@ -542,27 +1004,24 @@ Overfull \hbox (34.98967pt too wide) in paragraph at lines 98--102
[]
[27 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/OFB.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CFB.png (PNG copy)>]
<./images/3DES.png, id=138, 274.77657pt x 331.99031pt>
<./images/3DES.png, id=763, 274.77657pt x 331.99031pt>
File: ./images/3DES.png Graphic file (type png)
<use ./images/3DES.png>
Package pdftex.def Info: ./images/3DES.png used on input line 144.
(pdftex.def) Requested size: 219.82153pt x 265.59259pt.
[28]
<./images/meet-in-the-middle.png, id=143, 260.47313pt x 247.67531pt>
<./images/meet-in-the-middle.png, id=770, 260.47313pt x 247.67531pt>
File: ./images/meet-in-the-middle.png Graphic file (type png)
<use ./images/meet-in-the-middle.png>
Package pdftex.def Info: ./images/meet-in-the-middle.png used on input line 150.
(pdftex.def) Requested size: 260.47249pt x 247.6747pt.
[29 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/3DES.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/meet-in-the-middle.png (PNG copy)>]
<./images/AES S-Box.png, id=147, 424.58624pt x 396.48125pt>
<./images/AES S-Box.png, id=775, 424.58624pt x 396.48125pt>
File: ./images/AES S-Box.png Graphic file (type png)
<use ./images/AES S-Box.png>
Package pdftex.def Info: ./images/AES S-Box.png used on input line 196.
(pdftex.def) Requested size: 339.66945pt x 317.18542pt.
[30 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/AES S-Box.png (PNG copy)>]
LaTeX Warning: Reference `endliche Körper' on page 31 undefined on input line 222.
LaTeX Font Info: Font shape `T1/cmtt/bx/n' in size <10.95> not available
(Font) Font shape `T1/cmtt/m/n' tried instead on input line 245.
) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex [31]
@ -574,26 +1033,97 @@ LaTeX Font Info: Font shape `T1/cmtt/bx/n' in size <14.4> not available
] [33] [34]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex [35]
Kapitel 8.
) [36
) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik - Teil 2.tex [36
] [37] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux)
] [37]
Kapitel 9.
LaTeX Warning: There were undefined references.
Underfull \hbox (badness 10000) in paragraph at lines 21--24
[]
Package mdframed Info: Not enough space on this page on input line 37.
[38
]
Package mdframed Info: Not enough space on this page on input line 37.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `math shift' on input line 48.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `subscript' on input line 48.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `superscript' on input line 48.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `superscript' on input line 48.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `math shift' on input line 48.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `math shift' on input line 71.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `subscript' on input line 71.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `superscript' on input line 71.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `superscript' on input line 71.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `math shift' on input line 71.
[39]
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `math shift' on input line 127.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `subscript' on input line 127.
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
(hyperref) removing `math shift' on input line 127.
)) [40]
Package atveryend Info: Empty hook `BeforeClearDocument' on input line 24.
Package atveryend Info: Empty hook `AfterLastShipout' on input line 24.
(/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux)
Package atveryend Info: Executing hook `AtVeryEndDocument' on input line 24.
Package atveryend Info: Executing hook `AtEndAfterFileList' on input line 24.
Package rerunfilecheck Info: File `Zusammenfassung_DC.out' has not changed.
(rerunfilecheck) Checksum: 705A165D003F9245E6172CC1858C04F3;8028.
Package atveryend Info: Empty hook `AtVeryVeryEnd' on input line 24.
)
Here is how much of TeX's memory you used:
6325 strings out of 480478
88970 string characters out of 5905959
355969 words of memory out of 5000000
22191 multiletter control sequences out of 15000+600000
557083 words of font info for 90 fonts, out of 8000000 for 9000
21610 strings out of 480478
396029 string characters out of 5905959
677108 words of memory out of 5000000
36918 multiletter control sequences out of 15000+600000
558315 words of font info for 94 fonts, out of 8000000 for 9000
1141 hyphenation exceptions out of 8191
30i,14n,37p,377b,255s stack positions out of 5000i,500n,10000p,200000b,80000s
{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc}{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmex10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msam10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msbm10.pfb></usr/share/texmf-dist/fonts/type1/public/rsfs/rsfs10.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1200.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1440.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2074.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2488.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1200.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1728.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfti1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sftt1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sftt1440.pfb>
Output written on "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" (38 pages, 2637795 bytes).
63i,14n,80p,1043b,1062s stack positions out of 5000i,500n,10000p,200000b,80000s
{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc}{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmex10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi7.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msam10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msbm10.pfb></usr/share/texmf-dist/fonts/type1/public/rsfs/rsfs10.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1200.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1440.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2074.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2488.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1200.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1728.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfti1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sftt1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sftt1440.pfb>
Output written on "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" (41 pages, 2678272 bytes).
PDF statistics:
266 PDF objects out of 1000 (max. 8388607)
173 compressed objects within 2 object streams
0 named destinations out of 1000 (max. 500000)
116 words of extra memory for PDF output out of 10000 (max. 10000000)
1001 PDF objects out of 1200 (max. 8388607)
897 compressed objects within 9 object streams
211 named destinations out of 1000 (max. 500000)
968 words of extra memory for PDF output out of 10000 (max. 10000000)

105
Zusammenfassung_DC.out Normal file
View File

@ -0,0 +1,105 @@
\BOOKMARK [0][-]{chapter.1}{Substitionsverfahren}{}% 1
\BOOKMARK [1][-]{section.1.1}{Skytale}{chapter.1}% 2
\BOOKMARK [1][-]{section.1.2}{Monoalphabetische Substitionsverfahren}{chapter.1}% 3
\BOOKMARK [2][-]{subsection.1.2.1}{Caesar-Verschl\374sselung}{section.1.2}% 4
\BOOKMARK [2][-]{subsection.1.2.2}{H\344ufigkeitsanalyse}{section.1.2}% 5
\BOOKMARK [1][-]{section.1.3}{Polyalphabetische Substitutionsverfahren}{chapter.1}% 6
\BOOKMARK [2][-]{subsection.1.3.1}{Vign\350re-Verfahren}{section.1.3}% 7
\BOOKMARK [2][-]{subsection.1.3.2}{One-Time-Pad}{section.1.3}% 8
\BOOKMARK [1][-]{section.1.4}{algebraische Substitionsverfahren}{chapter.1}% 9
\BOOKMARK [2][-]{subsection.1.4.1}{Hill-Verfahren}{section.1.4}% 10
\BOOKMARK [0][-]{chapter.2}{Modulare Arithmetik}{}% 11
\BOOKMARK [1][-]{section.2.1}{Exkurs: Division mit Rest}{chapter.2}% 12
\BOOKMARK [1][-]{section.2.2}{Der Ring Zn}{chapter.2}% 13
\BOOKMARK [2][-]{subsection.2.2.1}{Addition und Multiplikation}{section.2.2}% 14
\BOOKMARK [2][-]{subsection.2.2.2}{Subtraktion}{section.2.2}% 15
\BOOKMARK [2][-]{subsection.2.2.3}{Teiler, Vielfache}{section.2.2}% 16
\BOOKMARK [2][-]{subsection.2.2.4}{Kongruenz}{section.2.2}% 17
\BOOKMARK [2][-]{subsection.2.2.5}{Matrizen}{section.2.2}% 18
\BOOKMARK [2][-]{subsection.2.2.6}{Kartesisches Produkt von Ringen}{section.2.2}% 19
\BOOKMARK [2][-]{subsection.2.2.7}{Isomorphie von Ringen}{section.2.2}% 20
\BOOKMARK [1][-]{section.2.3}{Der erweiterte Euklid'sche Algorithmus}{chapter.2}% 21
\BOOKMARK [2][-]{subsection.2.3.1}{Euklid'scher Algorithmus}{section.2.3}% 22
\BOOKMARK [2][-]{subsection.2.3.2}{erweiterter Euklid'scher Algorithmus}{section.2.3}% 23
\BOOKMARK [1][-]{section.2.4}{Euler'sche -Funktion}{chapter.2}% 24
\BOOKMARK [2][-]{subsection.2.4.1}{-Funktion und Primzahlen}{section.2.4}% 25
\BOOKMARK [0][-]{chapter.3}{IT-Sicherheit: Gef\344hrdungen und Ma\337nahmen}{}% 26
\BOOKMARK [1][-]{section.3.1}{Vertraulichkeit}{chapter.3}% 27
\BOOKMARK [2][-]{subsection.3.1.1}{Schutzma\337nahmen: Verschl\374sselungsverfahren}{section.3.1}% 28
\BOOKMARK [1][-]{section.3.2}{Integrit\344t}{chapter.3}% 29
\BOOKMARK [2][-]{subsection.3.2.1}{Schutzma\337nahme: Hashfunktionen, Whitelists}{section.3.2}% 30
\BOOKMARK [1][-]{section.3.3}{Authenzit\344t der Daten}{chapter.3}% 31
\BOOKMARK [2][-]{subsection.3.3.1}{Schutzma\337nahme: Signaturen}{section.3.3}% 32
\BOOKMARK [2][-]{subsection.3.3.2}{Schutz vor Replay-Angriffen}{section.3.3}% 33
\BOOKMARK [1][-]{section.3.4}{Authenzit\344t von Nutzern}{chapter.3}% 34
\BOOKMARK [2][-]{subsection.3.4.1}{Schutzma\337nahmen}{section.3.4}% 35
\BOOKMARK [1][-]{section.3.5}{Zugriffskontrolle}{chapter.3}% 36
\BOOKMARK [2][-]{subsection.3.5.1}{Schutzma\337name: Zugriffskontrollsystem}{section.3.5}% 37
\BOOKMARK [1][-]{section.3.6}{Nichtabstreitbarkeit, Verbindlichkeit}{chapter.3}% 38
\BOOKMARK [2][-]{subsection.3.6.1}{Schutzma\337name: Signaturen und PKI}{section.3.6}% 39
\BOOKMARK [1][-]{section.3.7}{Verf\374gbarkeit}{chapter.3}% 40
\BOOKMARK [2][-]{subsection.3.7.1}{Schutzma\337nahmen}{section.3.7}% 41
\BOOKMARK [1][-]{section.3.8}{Anonymit\344t}{chapter.3}% 42
\BOOKMARK [0][-]{chapter.4}{Verschl\374sselungsverfahren}{}% 43
\BOOKMARK [1][-]{section.4.1}{Das Kerckhoffs'sche Prinzip}{chapter.4}% 44
\BOOKMARK [1][-]{section.4.2}{Mathematische Modelierung von Verschl\374sselungsverfahren}{chapter.4}% 45
\BOOKMARK [1][-]{section.4.3}{Schl\374sselaustausch}{chapter.4}% 46
\BOOKMARK [1][-]{section.4.4}{Angriffsszenarien}{chapter.4}% 47
\BOOKMARK [2][-]{subsection.4.4.1}{Ciphertext-only Angriffe}{section.4.4}% 48
\BOOKMARK [2][-]{subsection.4.4.2}{Known-plaintext Angriffe}{section.4.4}% 49
\BOOKMARK [2][-]{subsection.4.4.3}{Chosen-plaintext Angriffe}{section.4.4}% 50
\BOOKMARK [1][-]{section.4.5}{Brute-Force Angriffe}{chapter.4}% 51
\BOOKMARK [2][-]{subsection.4.5.1}{Beispiel: Brute-Force Angriff auf k}{section.4.5}% 52
\BOOKMARK [2][-]{subsection.4.5.2}{Beispiel: Brute-Force Angriff auf m}{section.4.5}% 53
\BOOKMARK [2][-]{subsection.4.5.3}{Anforderungen zum Schutz vor Brute-Force}{section.4.5}% 54
\BOOKMARK [1][-]{section.4.6}{W\366rterbuchangriffe}{chapter.4}% 55
\BOOKMARK [2][-]{subsection.4.6.1}{Schutz vor W\366rterbuchangriffen}{section.4.6}% 56
\BOOKMARK [0][-]{chapter.5}{Stromverschl\374sselungsverfahren}{}% 57
\BOOKMARK [1][-]{section.5.1}{Synchrone Stromverschl\374sselungsverfahren}{chapter.5}% 58
\BOOKMARK [1][-]{section.5.2}{Zustandsabh\344ngige Stromverschl\374sselungsverfahren}{chapter.5}% 59
\BOOKMARK [2][-]{subsection.5.2.1}{Additive zustandsabh\344ngige Stromverschl\374sselungsverfahren}{section.5.2}% 60
\BOOKMARK [1][-]{section.5.3}{Schl\374sselstrom vs. One-Time-Pad}{chapter.5}% 61
\BOOKMARK [1][-]{section.5.4}{Nonces zur Initialisierung eines Schl\374sselstromgenerators}{chapter.5}% 62
\BOOKMARK [1][-]{section.5.5}{ChaCha20}{chapter.5}% 63
\BOOKMARK [1][-]{section.5.6}{Cipher-Instanzen: Verschl\374sselungsalgorithmen in Java-Laufzeitumgebungen}{chapter.5}% 64
\BOOKMARK [0][-]{chapter.6}{Blockverschl\374sselungsverfahren}{}% 65
\BOOKMARK [1][-]{section.6.1}{Padding-Verfahren}{chapter.6}% 66
\BOOKMARK [1][-]{section.6.2}{Betriebsmodi}{chapter.6}% 67
\BOOKMARK [2][-]{subsection.6.2.1}{ECB \(Electronic Code Book\)}{section.6.2}% 68
\BOOKMARK [2][-]{subsection.6.2.2}{CBC \(Cipher Block Chaining\)}{section.6.2}% 69
\BOOKMARK [2][-]{subsection.6.2.3}{CBC-CS \(Chiphertext Stealing for CBC Mode\)}{section.6.2}% 70
\BOOKMARK [2][-]{subsection.6.2.4}{CTR \(Counter\)}{section.6.2}% 71
\BOOKMARK [2][-]{subsection.6.2.5}{OFB \(Output Feedback\)}{section.6.2}% 72
\BOOKMARK [2][-]{subsection.6.2.6}{CFB \(Cipher-Feedback\)}{section.6.2}% 73
\BOOKMARK [1][-]{section.6.3}{Konstruktionsprinzipien von Blockverschl\374sselungsverfahren}{chapter.6}% 74
\BOOKMARK [1][-]{section.6.4}{DES}{chapter.6}% 75
\BOOKMARK [2][-]{subsection.6.4.1}{Triple-DES \(3DES\)}{section.6.4}% 76
\BOOKMARK [1][-]{section.6.5}{Meet-in-the-Middle-Angriff}{chapter.6}% 77
\BOOKMARK [1][-]{section.6.6}{AES \(Advanced Encryption Standard\)}{chapter.6}% 78
\BOOKMARK [2][-]{subsection.6.6.1}{AES-128}{section.6.6}% 79
\BOOKMARK [0][-]{chapter.7}{Hashfunktionen}{}% 80
\BOOKMARK [1][-]{section.7.1}{schwache Kollisionsfreiheit}{chapter.7}% 81
\BOOKMARK [1][-]{section.7.2}{MessageDigest-Instanzen: Hashfunktionen in Java}{chapter.7}% 82
\BOOKMARK [1][-]{section.7.3}{Anwendungsbeispiele}{chapter.7}% 83
\BOOKMARK [2][-]{subsection.7.3.1}{Anwendungsbeispiel: Passwortdatei}{section.7.3}% 84
\BOOKMARK [2][-]{subsection.7.3.2}{Anwendungsbeispiel: Integrit\344tsschutz von Dateien}{section.7.3}% 85
\BOOKMARK [2][-]{subsection.7.3.3}{Anwendungsbeispiel: Integrit\344tsschutz bei einem Dateidownload}{section.7.3}% 86
\BOOKMARK [1][-]{section.7.4}{Brute-Force-Angriffe auf Hashfunktionen}{chapter.7}% 87
\BOOKMARK [2][-]{subsection.7.4.1}{Brute-Force-Urbildsuche}{section.7.4}% 88
\BOOKMARK [2][-]{subsection.7.4.2}{Brute-Force-Kollisionssuche}{section.7.4}% 89
\BOOKMARK [1][-]{section.7.5}{Konstruktionsverfahren von Hashfunktionen}{chapter.7}% 90
\BOOKMARK [0][-]{chapter.8}{MAC-Verfahren}{}% 91
\BOOKMARK [1][-]{section.8.1}{HMAC}{chapter.8}% 92
\BOOKMARK [1][-]{section.8.2}{CMAC, CBC-MAC}{chapter.8}% 93
\BOOKMARK [2][-]{subsection.8.2.1}{CMAC}{section.8.2}% 94
\BOOKMARK [2][-]{subsection.8.2.2}{CBC-MAC}{section.8.2}% 95
\BOOKMARK [0][-]{chapter.9}{Modulare Arithmetik - Teil 2}{}% 96
\BOOKMARK [1][-]{section.9.1}{Potenzen}{chapter.9}% 97
\BOOKMARK [2][-]{subsection.9.1.1}{Erzeugnis und Ordnung eines invertierbaren Elements}{section.9.1}% 98
\BOOKMARK [2][-]{subsection.9.1.2}{Faktorenzerlegung}{section.9.1}% 99
\BOOKMARK [2][-]{subsection.9.1.3}{Kleiner Satz von Fermat}{section.9.1}% 100
\BOOKMARK [1][-]{section.9.2}{Exkurs: Einheitengruppe Zpe*}{chapter.9}% 101
\BOOKMARK [2][-]{subsection.9.2.1}{Z2e*}{section.9.2}% 102
\BOOKMARK [1][-]{section.9.3}{Der chinesische Restsatz}{chapter.9}% 103
\BOOKMARK [2][-]{subsection.9.3.1}{Beispiel}{section.9.3}% 104
\BOOKMARK [1][-]{section.9.4}{Elemente gerader und ungerader Ordnung in Zn**}{chapter.9}% 105

Binary file not shown.

Binary file not shown.

View File

@ -1,32 +1,8 @@
\documentclass[a4paper,11pt,oneside]{report}
%numbering depth
\setcounter{secnumdepth}{5}
%page setup
\usepackage[a4paper, margin=2cm]{geometry}
%encoding
\usepackage[utf8]{inputenc}
\usepackage[T1]{fontenc}
%language
\usepackage[ngerman]{babel}
%images
\usepackage{graphicx}
\graphicspath{ {./images/} }
%mathsymbols
\usepackage{amsmath}
\usepackage{amssymb}
\usepackage{amsfonts}
\usepackage{mathrsfs}
%for code highlighting
\usepackage{xcolor}
\usepackage{listings}
%quotation
\usepackage[%
left = \glqq,%
right = \grqq,%
leftsub = \glq,%
rightsub = \grq%
]{dirtytalk}
%load packages
\input{Packages.tex}
%opening
\title{Zusammenfassung DC}
\author{Paul Lödige \\ Matrikel: 15405036}
@ -42,20 +18,7 @@ rightsub = \grq%
\tableofcontents
\pagebreak
\input{chapters/Substitutionsverfahren.tex}
\input{chapters/Modulare Arithmetik.tex}
\input{chapters/IT-Sicherheit.tex}
\input{chapters/Verschlüsselungsverfahren.tex}
\input{chapters/Stromverschlüsselungsverfahren.tex}
\input{chapters/Blockverschlüsselungsverfahren.tex}
\input{chapters/Hashfunktionen.tex}
\input{chapters/MAC-Verfahren.tex}
%load content
\input{Inhalt.tex}
\end{document}

View File

@ -1,113 +1,125 @@
\babel@toc {ngerman}{}
\contentsline {chapter}{\numberline {1}Substitionsverfahren}{4}%
\contentsline {section}{\numberline {1.1}Skytale}{4}%
\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{4}%
\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{5}%
\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{5}%
\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{5}%
\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{5}%
\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{5}%
\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{6}%
\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{6}%
\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{6}%
\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{6}%
\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{6}%
\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{6}%
\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{6}%
\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{7}%
\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{7}%
\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{7}%
\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{7}%
\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{7}%
\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{7}%
\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{8}%
\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{8}%
\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{8}%
\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{8}%
\contentsline {subsection}{\numberline {2.2.5}Matrizen}{8}%
\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{8}%
\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{8}%
\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{8}%
\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{9}%
\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{9}%
\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{9}%
\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{10}%
\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{10}%
\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{11}%
\contentsline {section}{\numberline {3.1}Vertraulichkeit}{11}%
\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{11}%
\contentsline {section}{\numberline {3.2}Integrität}{11}%
\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{12}%
\contentsline {section}{\numberline {3.3}Authenzität der Daten}{12}%
\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{12}%
\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{12}%
\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{12}%
\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{12}%
\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{12}%
\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{13}%
\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{13}%
\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{13}%
\contentsline {section}{\numberline {3.7}Verfügbarkeit}{13}%
\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{13}%
\contentsline {section}{\numberline {3.8}Anonymität}{13}%
\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{14}%
\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{14}%
\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{14}%
\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{14}%
\contentsline {section}{\numberline {4.4}Angriffsszenarien}{15}%
\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{15}%
\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{15}%
\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{15}%
\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{15}%
\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{15}%
\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{15}%
\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{15}%
\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{16}%
\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{16}%
\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{16}%
\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{17}%
\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{17}%
\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{18}%
\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{19}%
\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{19}%
\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{20}%
\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{20}%
\contentsline {section}{\numberline {5.5}ChaCha20}{21}%
\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{22}%
\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{23}%
\contentsline {section}{\numberline {6.1}Padding-Verfahren}{23}%
\contentsline {section}{\numberline {6.2}Betriebsmodi}{23}%
\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{23}%
\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{24}%
\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{25}%
\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{25}%
\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{26}%
\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{26}%
\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{26}%
\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{26}%
\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{27}%
\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{27}%
\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{27}%
\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{28}%
\contentsline {section}{\numberline {6.4}DES}{28}%
\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{28}%
\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{29}%
\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{30}%
\contentsline {subsection}{\numberline {6.6.1}AES-128}{30}%
\contentsline {chapter}{\numberline {7}Hashfunktionen}{32}%
\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{32}%
\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{32}%
\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{33}%
\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{33}%
\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{33}%
\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{33}%
\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{33}%
\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{33}%
\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{33}%
\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{34}%
\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{34}%
\contentsline {chapter}{\numberline {8}MAC-Verfahren}{36}%
\contentsline {section}{\numberline {8.1}HMAC}{36}%
\contentsline {section}{\numberline {8.2}CMAC, CBC-MAC}{36}%
\contentsline {subsection}{\numberline {8.2.1}CMAC}{36}%
\contentsline {subsection}{\numberline {8.2.2}CBC-MAC}{37}%
\contentsline {chapter}{\numberline {1}Substitionsverfahren}{4}{chapter.1}%
\contentsline {section}{\numberline {1.1}Skytale}{4}{section.1.1}%
\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{4}{section.1.2}%
\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{5}{subsection.1.2.1}%
\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{5}{subsection.1.2.2}%
\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{5}{section.1.3}%
\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{5}{subsection.1.3.1}%
\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{5}{subsubsection.1.3.1.1}%
\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{6}{subsection.1.3.2}%
\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{6}{subsubsection.1.3.2.1}%
\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{6}{subsubsection.1.3.2.2}%
\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{6}{section.1.4}%
\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{6}{subsection.1.4.1}%
\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{6}{subsubsection.1.4.1.1}%
\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{6}{subsubsection.1.4.1.2}%
\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{7}{chapter.2}%
\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{7}{section.2.1}%
\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{7}{section.2.2}%
\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{7}{subsection.2.2.1}%
\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{7}{subsubsection.2.2.1.1}%
\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{7}{subsubsection.2.2.1.2}%
\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{8}{subsection.2.2.2}%
\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{8}{subsection.2.2.3}%
\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{8}{subsubsection.2.2.3.1}%
\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{8}{subsection.2.2.4}%
\contentsline {subsection}{\numberline {2.2.5}Matrizen}{8}{subsection.2.2.5}%
\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{8}{subsubsection.2.2.5.1}%
\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{8}{subsubsection.2.2.5.2}%
\contentsline {subsection}{\numberline {2.2.6}Kartesisches Produkt von Ringen}{8}{subsection.2.2.6}%
\contentsline {subsection}{\numberline {2.2.7}Isomorphie von Ringen}{9}{subsection.2.2.7}%
\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{9}{section.2.3}%
\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{9}{subsection.2.3.1}%
\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{9}{subsection.2.3.2}%
\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{9}{subsubsection.2.3.2.1}%
\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{10}{section.2.4}%
\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{10}{subsection.2.4.1}%
\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{11}{chapter.3}%
\contentsline {section}{\numberline {3.1}Vertraulichkeit}{11}{section.3.1}%
\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{11}{subsection.3.1.1}%
\contentsline {section}{\numberline {3.2}Integrität}{11}{section.3.2}%
\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{12}{subsection.3.2.1}%
\contentsline {section}{\numberline {3.3}Authenzität der Daten}{12}{section.3.3}%
\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{12}{subsection.3.3.1}%
\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{12}{subsection.3.3.2}%
\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{12}{section.3.4}%
\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{12}{subsection.3.4.1}%
\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{12}{section.3.5}%
\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{13}{subsection.3.5.1}%
\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{13}{section.3.6}%
\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{13}{subsection.3.6.1}%
\contentsline {section}{\numberline {3.7}Verfügbarkeit}{13}{section.3.7}%
\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{13}{subsection.3.7.1}%
\contentsline {section}{\numberline {3.8}Anonymität}{13}{section.3.8}%
\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{14}{chapter.4}%
\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{14}{section.4.1}%
\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{14}{section.4.2}%
\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{14}{section.4.3}%
\contentsline {section}{\numberline {4.4}Angriffsszenarien}{15}{section.4.4}%
\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{15}{subsection.4.4.1}%
\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{15}{subsection.4.4.2}%
\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{15}{subsection.4.4.3}%
\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{15}{section.4.5}%
\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{15}{subsection.4.5.1}%
\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{15}{subsection.4.5.2}%
\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{15}{subsection.4.5.3}%
\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{16}{section.4.6}%
\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{16}{subsection.4.6.1}%
\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{16}{subsubsection.4.6.1.1}%
\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{17}{chapter.5}%
\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{17}{section.5.1}%
\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{18}{section.5.2}%
\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{19}{subsection.5.2.1}%
\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{19}{subsubsection.5.2.1.1}%
\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{20}{section.5.3}%
\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{20}{section.5.4}%
\contentsline {section}{\numberline {5.5}ChaCha20}{21}{section.5.5}%
\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{22}{section.5.6}%
\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{23}{chapter.6}%
\contentsline {section}{\numberline {6.1}Padding-Verfahren}{23}{section.6.1}%
\contentsline {section}{\numberline {6.2}Betriebsmodi}{23}{section.6.2}%
\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{23}{subsection.6.2.1}%
\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{24}{subsection.6.2.2}%
\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{25}{subsection.6.2.3}%
\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{25}{subsubsection.6.2.3.1}%
\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{26}{subsubsection.6.2.3.2}%
\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{26}{subsubsection.6.2.3.3}%
\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{26}{subsection.6.2.4}%
\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{26}{subsection.6.2.5}%
\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{27}{subsubsection.6.2.5.1}%
\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{27}{subsection.6.2.6}%
\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{27}{subsubsection.6.2.6.1}%
\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{28}{section.6.3}%
\contentsline {section}{\numberline {6.4}DES}{28}{section.6.4}%
\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{28}{subsection.6.4.1}%
\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{29}{section.6.5}%
\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{30}{section.6.6}%
\contentsline {subsection}{\numberline {6.6.1}AES-128}{30}{subsection.6.6.1}%
\contentsline {chapter}{\numberline {7}Hashfunktionen}{32}{chapter.7}%
\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{32}{section.7.1}%
\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{32}{section.7.2}%
\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{33}{section.7.3}%
\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{33}{subsection.7.3.1}%
\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{33}{subsubsection.7.3.1.1}%
\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{33}{subsection.7.3.2}%
\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{33}{subsection.7.3.3}%
\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{33}{section.7.4}%
\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{33}{subsection.7.4.1}%
\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{34}{subsection.7.4.2}%
\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{34}{section.7.5}%
\contentsline {chapter}{\numberline {8}MAC-Verfahren}{36}{chapter.8}%
\contentsline {section}{\numberline {8.1}HMAC}{36}{section.8.1}%
\contentsline {section}{\numberline {8.2}CMAC, CBC-MAC}{36}{section.8.2}%
\contentsline {subsection}{\numberline {8.2.1}CMAC}{36}{subsection.8.2.1}%
\contentsline {subsection}{\numberline {8.2.2}CBC-MAC}{37}{subsection.8.2.2}%
\contentsline {chapter}{\numberline {9}Modulare Arithmetik - Teil 2}{38}{chapter.9}%
\contentsline {section}{\numberline {9.1}Potenzen}{38}{section.9.1}%
\contentsline {subsection}{\numberline {9.1.1}Erzeugnis und Ordnung eines invertierbaren Elements}{38}{subsection.9.1.1}%
\contentsline {subsection}{\numberline {9.1.2}Faktorenzerlegung}{39}{subsection.9.1.2}%
\contentsline {subsection}{\numberline {9.1.3}Kleiner Satz von Fermat}{39}{subsection.9.1.3}%
\contentsline {section}{\numberline {9.2}Exkurs: Einheitengruppe $\mathbb {Z}_{p^e}^*$}{39}{section.9.2}%
\contentsline {subsection}{\numberline {9.2.1}$\mathbb {Z}_{2^e}^*$}{39}{subsection.9.2.1}%
\contentsline {section}{\numberline {9.3}Der chinesische Restsatz}{39}{section.9.3}%
\contentsline {subsection}{\numberline {9.3.1}Beispiel}{40}{subsection.9.3.1}%
\contentsline {section}{\numberline {9.4}Elemente gerader und ungerader Ordnung in $\mathbb {Z}_n$**}{40}{section.9.4}%

View File

@ -219,7 +219,7 @@
03 & 02 & 01 & 02 \\
\end{pmatrix}$$
Hierbei ist wichtig anzumerken, dass die Multiplikation nicht in $\mathbf{Z}_{256}$ berechnet wird.
Stattdessen sind die Elemente als Elemente des Körpers $\mathbf{F}_{256}$ aufzufassen (siehe \ref{endliche Körper}),
Stattdessen sind die Elemente als Elemente des Körpers $\mathbf{F}_{256}$ aufzufassen,
der bezüglich des irreduziblen Polynoms $m(x)=x^8+x^4+x^3+x+1\in\mathbb{F}_2[x]$ definiert ist.
\item AddRoundKey()\\
Es wird eine XOR-Operation der Einträge des S-Arrays mit den entsprechenden Einträgen aus \textbf{K} durchgeführt.

View File

@ -1,4 +1,4 @@
\chapter{Endliche Körper $\mathbb{F}_{p^n}$} \label{endliche Körper}
\chapter{Endliche Körper $\mathbb{F}_{p^n}$}\label{endliche Körper}
$\mathbb{F}_p:=\mathbb{Z}_p$ ($p$ ist eine Primzahl) ist ein Körper.
Zudem können Körper auch für beliebige Primzahlpotenzen $p^n$ mit $n\in\mathbb{N},n>0$ mithilfe der Polynome aus $\mathbb{F}_p$ vom Grad $<n$ konstruiert werden:
$$\begin{aligned}

View File

@ -0,0 +1,128 @@
\chapter{Modulare Arithmetik - Teil 2}
\section{Potenzen}
Potenzen sind für beliebige Zahlen $a\in\mathbb{Z}_n$ für natürliche Exponenten $i\in\mathbb{N}$ wie üblich definiert:
$$a^i:=\underbrace{a\cdot a\cdots a}_i$$
Ist $a$ invertierbar ($a\in\mathbb{Z}_n^*$) so sind die Potenzen für alle ganzzahligen Exponenten $i\in\mathbb{Z}$ definiert,
indem $a^0 = 1$ und $a^{-i}:=(a^{-1})^i$ definiert werden.
Folglich gelten die Folgenden Regeln:
\begin{mybox}
für $a,b\in\mathbb{Z}_n$ und $i,j\in \mathbb{N}$ oder für $a,b\in\mathbb{Z}_n^*$ und $i,j\in\mathbb{Z}$ gilt:
$$\begin{aligned}
a^i\cdot a^j &= a^{i+j}\\
(a^i)^j &= a^{ij}\\
a^i\cdot b^i &= (ab)^i\\
\end{aligned}$$
\end{mybox}
\subsection{Erzeugnis und Ordnung eines invertierbaren Elements}
Die zyklische Untergruppe, die aus den Potenzen eines Elementes $a\in\mathbb{Z}_n^*$ entsteht wird als Erzeugnis von $a$ in $\mathbb{Z}_n^*$ bezeichnet.
$$<a>:=\{a^i\mid i\in\mathbb{Z}\}$$
Die Anzahl der verschiedenen Potenzen von $a$ wird als Ordnung von $a$ in $\mathbb{Z}_n^*$ bezeichnet:
$$o_n(a):=|<a>|$$
Hierbei ergibt sich $a^{o(a)}=1$ und $<a>=\{1,a,a^2,a^3,...,a^{o(a)-1}\}$.\\
\begin{mybox}
für $n\in\mathbb{N}(n\ge 2);a,b\in \mathbb{Z}_n^*$ und $i\in\mathbb{Z}$ gilt:
\begin{enumerate}[(i)]
\item $a^i=1 \Longrightarrow o(a)|i$
\item $o(a^i)|o(a)$
\item $i|o(a) \Longrightarrow o(a^i)=\frac{o(a)}{|i|}$
\item $\text{ggT}(o(a),i)=1 \Longrightarrow o(a^i)=o(a)$
\item $o(ab)|o(a)\cdot o(b)$
\item $\text{ggT}(o(a),o(b))=1\Longrightarrow o(a\cdot b)=o(a)\cdot o(b)$
\end{enumerate}
\end{mybox}
\begin{mybox}
Wenn $\mu_n$ für $n\in\mathbb{N},n\ge2$ die maximale Ordnung eines Elementes aus $\mathbb{Z}_n^*$ ($\mu_n:=\max\{o(a)\mid a\in\mathbb{Z}_n^*\}$),
ist jede Ordnung von $a$ ein Teiler von $\mu_n$
\end{mybox}
\subsection{Faktorenzerlegung}
Falls es für ein Polynom $p(x) \in \mathbb{Z}_n[x]$ ($n\in\mathbb{N}$) vom Grad $k$ eine Nullstelle $a\in\mathbb{Z}_n$ gibt,
muss es ein Polynom $q(x) \in \mathbb{Z}_n[x]$ vom Grad $k-1$ geben, für das gilt:
$$p(x)=(x-a)\cdot q(x)$$
\subsection{Kleiner Satz von Fermat}
Für eine Primzahl $p$ gilt für alle $a\in\mathbb{Z}$ mit $\text{ggT}(a,p)=1$:
$$a^{p-1}\equiv 1 \hspace{10mm}(\mod p)$$
\section{Exkurs: Einheitengruppe $\mathbb{Z}_{p^e}^*$}
Für eine Primzahl $p$ gibt es ein Element $g\in\mathbb{Z}_p^*$ mit $o(g)=p-1$ ($\mathbb{Z}_p^*=<g>=\{1,g,g^2,...,g^{p-2}\}$).
Diese Elemente $g$ werden als \textbf{primitive Elemente} bezeichnet.\\
Mithilfe der Potenzen der primitiven Elemente lassen sich alle Elemente von $\mathbb{Z}_p^*$ generieren:
$$<g>=\mathbb{Z}_p^*$$
Diese Elemente werden daher auch als \textbf{Generatoren} von $\mathbb{Z}_p^*$ bezeichnet.
Auch für Einheitengruppen $\mathbb{Z}_{p^e}$ für Primzahlpotenzen mit $e>1$ gibt es solche zyklische Generatoren:
\begin{mybox}
für eine Primzahl $p\ne2$ und $e\in\mathbb{N}$ gibt es ein $g\in\mathbb{Z}_{p^e}^*$ für das gilt:
$$\begin{aligned}
o(g)=p^{e-1}(p-1) &= \varphi(p^e)=|\mathbb{Z}_{p^e}^*\\
\Leftrightarrow\hspace{10mm}<g>&=\mathbb{Z}_{p^e}^*
\end{aligned}$$
\end{mybox}
Hierbei gilt:
\begin{mybox}
Für ein primitives Element $g\in\mathbb{Z}_p^*$ gilt mit $a:=g^{\frac{o_{p^e}(g)}{p-1}}$:
$$\begin{aligned}
\mathbb{Z}_{p^e}^*&=<a>\cdot <1+p>\\
:&=\{a^i\cdot (1+p)^j\mid i=0,1,...,p-2; j=0,1,...p^{e-1}-1\}
\end{aligned}$$
\end{mybox}
\subsection{$\mathbb{Z}_{2^e}^*$}
Die Primzahl 2 stellt eine besonderheit dar, da $\mathbb{Z}_{2^e}^*$ für $e\ge3$ nicht zyklisch ist.
So gilt $o(5)=2^{e-2}$ und allgemein:
$$\begin{aligned}
\mathbb{Z}_{2^e}^*&=<2^e-1>\cdot <5>\\
&= \{(2^e-1)^i\cdot 5^j\mid i=0,1;j=0,1,...,2^{e-2}-1\}
\end{aligned}$$
\section{Der chinesische Restsatz}
Für eine Menge teilerfremder Zahlen $\{(n_1,...,n_r)\mid n_i\in\mathbb{N}\}$ bildet einen Menge $\{(a_1,...,a_r)\mid a_i\in\mathbb{Z}\}$ ein System aus Kongruenzen:
$$\begin{aligned}
x\equiv&a_1\hspace{10mm} &(\textbf{mod }n_1)\\
x\equiv&a_2 &(\textbf{mod } n_2)\\
\vdots\\
x\equiv&a_r &(\textbf{mod } n_r)\\
\end{aligned}$$
Die Menge der ganzzahligen Lösungen ist gegeben durch:
$$\mathbb{L}=\{a+v\cdot n_1n_2\cdots n_r\mid v\in\mathbb{Z}\}$$
Hierbei ist $0\le a < n_1n_2\cdots n_r$ eindeutig.
$a$ wird im folgenden Beispiel mithilfe des erweiterten Euklid'schen Algorithmus (siehe \ref{erweiterter Euklid}) berechnet.
Aus dem Restsatz leitet sich folgender Satz ab:
\begin{mybox}
Sind $n_1,n_2,...,n_r$ paarweise teilerfremde Zahlen gibt es die folgende Isomorphie (\ref{Isomorphie}):
$$\mathbb{Z}_{n_1n_2\cdots n_r}\cong \mathbb{Z}_{n_1}\times \mathbb{Z}_{n_2}\times\cdots\times\mathbb{Z}_{n_r}$$
\end{mybox}
\subsection{Beispiel}
folgende Kongruenzen sind gegeben:
$$\begin{aligned}
x\equiv&2\hspace{10mm}&(\textbf{mod }5)\\
x\equiv&7 &(\textbf{mod }2)\\
x\equiv&2 &(\textbf{mod }5)\\
\end{aligned}$$
\begin{itemize}
\item \textbf{Bestimmung von} $e_1$\\
für $n_1=5$ und $m_1=21\cdot 11=231$ liefert der erweiterte Euklid'sche Algorithmus (\ref{erweiterter Euklid}):
$$(-46)\cdot 5+1\cdot 231 = 1$$
Daher ist $e_1 = 1\cdot 231$
\item \textbf{Bestimmung von} $e_2$\\
für $n_2=21$ und $m_2=5\cdot 11=55$ liefert der erweiterte Euklid'sche Algorithmus (\ref{erweiterter Euklid}):
$$(-21)\cdot 21+(-8)\cdot 55 = 1$$
Daher ist $e_2 = (-8)\cdot 55=-440$
\item \textbf{Bestimmung von} $e_3$\\
für $n_3=11$ und $m_3=5\cdot 21=105$ liefert der erweiterte Euklid'sche Algorithmus (\ref{erweiterter Euklid}):
$$(-19)\cdot 11+2\cdot 105 = 1$$
Daher ist $e_3 = 2\cdot 105=210$
\item \textbf{Berechnung der Lösung}\\
$n=5\cdot 21\cdot 11=1155$:
$$\begin{aligned}
a=&(2\cdot e_1+7\cdot e_2+6\cdot e_3)\mod 1155\\
=&(2\cdot 231-7\cdot 440+6\cdot 210)\mod 1155\\
=&-1358\mod 1155\\
=952
\end{aligned}$$
\end{itemize}
\section{Elemente gerader und ungerader Ordnung in $\mathbb{Z}_n$**}
siehe Skript 3 Kapitel 1.4 auf Seite 17(23).

View File

@ -72,6 +72,23 @@
Die Inverse einer quadratischen Matrix $A$ über $\mathbb{Z}_n$ lässt sich mithilfe der Adjunkten berechnen:
$$A^{-1} = (\det(A))^{-1} \cdot adj(A)$$
Die Adjunkte lässt sich über $\mathbb{Z}_n$ berechnen, da lediglich Summen und Differenzen von Produkten berechnet werden müssen.
\subsection{Kartesisches Produkt von Ringen}
Sind $R_1,R_2,...,R_r$ Ringe, so bildet das kartesische Produkt ($R_1\times R_2\times\cdots\times R_r$)ebenfalls einen Ring mit den folgenden Verknüpfungen:
$$\begin{aligned}
(a_1,...,a_r)+(b_1,...,b_r)&=(a_1+b_1,...,a_r+b_r)\\
(a_1,...,a_r)\cdot(b_1,...,b_r)&=(a_1\cdot b_1,...,a_r\cdot b_r)\\
\end{aligned}$$
Auch das kartesische Produkt der Einheitengruppen bildet einen Ring:
$$R^*=R_1^*\times\cdots\times R_r^*$$
\subsection{Isomorphie von Ringen}\label{Isomorphie}
Eine bijektive Abbildung $f:R_1\rightarrow R_2$ wird Isomorphismus genannt, falls für alle $a,b\in R_1$ gilt:
$$\begin{aligned}
f(a+b)&=f(a)+f(b)\\
f(a\cdot b)&=f(a)\cdot f(b)\\
\end{aligned}$$
Zwei isomorphe Ringe werden als $R_1\cong R_2$ geschrieben.
\section{Der erweiterte Euklid'sche Algorithmus}
Der Euklid'sche Algorithmus ist ein sehr effizienter Weg den ggT zweier Zahlen zu ermitteln.