provisional version of Modulare Arithmetik - Teil 2 finished
This commit is contained in:
parent
cacbf109c0
commit
a690196fe5
19
Inhalt.tex
Normal file
19
Inhalt.tex
Normal file
@ -0,0 +1,19 @@
|
||||
\newmdenv[roundcorner=2mm, linecolor=blue, backgroundcolor=blue!5]{mybox}
|
||||
|
||||
\input{chapters/Substitutionsverfahren.tex}
|
||||
|
||||
\input{chapters/Modulare Arithmetik.tex}
|
||||
|
||||
\input{chapters/IT-Sicherheit.tex}
|
||||
|
||||
\input{chapters/Verschlüsselungsverfahren.tex}
|
||||
|
||||
\input{chapters/Stromverschlüsselungsverfahren.tex}
|
||||
|
||||
\input{chapters/Blockverschlüsselungsverfahren.tex}
|
||||
|
||||
\input{chapters/Hashfunktionen.tex}
|
||||
|
||||
\input{chapters/MAC-Verfahren.tex}
|
||||
|
||||
\input{chapters/Modulare Arithmetik - Teil 2.tex}
|
35
Packages.tex
Normal file
35
Packages.tex
Normal file
@ -0,0 +1,35 @@
|
||||
%numbering depth
|
||||
\setcounter{secnumdepth}{5}
|
||||
%page setup
|
||||
\usepackage[a4paper, margin=2cm]{geometry}
|
||||
%encoding
|
||||
\usepackage[utf8]{inputenc}
|
||||
\usepackage[T1]{fontenc}
|
||||
%language
|
||||
\usepackage[ngerman]{babel}
|
||||
%images
|
||||
\usepackage{graphicx}
|
||||
\graphicspath{ {./images/} }
|
||||
%mathsymbols
|
||||
\usepackage{amsmath}
|
||||
\usepackage{amssymb}
|
||||
\usepackage{amsfonts}
|
||||
\usepackage{mathrsfs}
|
||||
%for code highlighting
|
||||
\usepackage{xcolor}
|
||||
\usepackage{listings}
|
||||
%quotation
|
||||
\usepackage[%
|
||||
left = \glqq,%
|
||||
right = \grqq,%
|
||||
leftsub = \glq,%
|
||||
rightsub = \grq%
|
||||
]{dirtytalk}
|
||||
%automatic links
|
||||
\usepackage{hyperref}
|
||||
%graphics
|
||||
\usepackage{tikz}
|
||||
%boxes
|
||||
\usepackage[framemethod=tikz]{mdframed}
|
||||
%enumeration
|
||||
\usepackage{enumerate}
|
@ -1,153 +1,192 @@
|
||||
\relax
|
||||
\providecommand\hyper@newdestlabel[2]{}
|
||||
\providecommand\zref@newlabel[2]{}
|
||||
\@nameuse{bbl@beforestart}
|
||||
\catcode `"\active
|
||||
\providecommand\HyperFirstAtBeginDocument{\AtBeginDocument}
|
||||
\HyperFirstAtBeginDocument{\ifx\hyper@anchor\@undefined
|
||||
\global\let\oldcontentsline\contentsline
|
||||
\gdef\contentsline#1#2#3#4{\oldcontentsline{#1}{#2}{#3}}
|
||||
\global\let\oldnewlabel\newlabel
|
||||
\gdef\newlabel#1#2{\newlabelxx{#1}#2}
|
||||
\gdef\newlabelxx#1#2#3#4#5#6{\oldnewlabel{#1}{{#2}{#3}}}
|
||||
\AtEndDocument{\ifx\hyper@anchor\@undefined
|
||||
\let\contentsline\oldcontentsline
|
||||
\let\newlabel\oldnewlabel
|
||||
\fi}
|
||||
\fi}
|
||||
\global\let\hyper@last\relax
|
||||
\gdef\HyperFirstAtBeginDocument#1{#1}
|
||||
\providecommand\HyField@AuxAddToFields[1]{}
|
||||
\providecommand\HyField@AuxAddToCoFields[2]{}
|
||||
\babel@aux{ngerman}{}
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {1}Substitionsverfahren}{4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {1}Substitionsverfahren}{4}{chapter.1}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.1}Skytale}{4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{4}\protected@file@percent }
|
||||
\newlabel{monoalphabet}{{1.2}{4}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{5}\protected@file@percent }
|
||||
\newlabel{häufigkeit}{{1.2.2}{5}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{6}\protected@file@percent }
|
||||
\newlabel{otp}{{1.3.2}{6}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.1}Skytale}{4}{section.1.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{4}{section.1.2}\protected@file@percent }
|
||||
\newlabel{monoalphabet}{{1.2}{4}{Monoalphabetische Substitionsverfahren}{section.1.2}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{5}{subsection.1.2.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{5}{subsection.1.2.2}\protected@file@percent }
|
||||
\newlabel{häufigkeit}{{1.2.2}{5}{Häufigkeitsanalyse}{subsection.1.2.2}{}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{5}{section.1.3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{5}{subsection.1.3.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{5}{subsubsection.1.3.1.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{6}{subsection.1.3.2}\protected@file@percent }
|
||||
\newlabel{otp}{{1.3.2}{6}{One-Time-Pad}{subsection.1.3.2}{}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{6}{subsubsection.1.3.2.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{6}{subsubsection.1.3.2.2}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{6}{section.1.4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{6}{subsection.1.4.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{6}{subsubsection.1.4.1.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{6}{subsubsection.1.4.1.2}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{7}{chapter.2}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{7}\protected@file@percent }
|
||||
\newlabel{Der Ring Z}{{2.2}{7}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{7}\protected@file@percent }
|
||||
\newlabel{modulare_addition}{{2.2.1}{7}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.5}Matrizen}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{9}\protected@file@percent }
|
||||
\newlabel{euklid}{{2.3.1}{9}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{9}\protected@file@percent }
|
||||
\newlabel{erweiterter Euklid}{{2.3.2}{9}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{9}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{10}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{10}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{7}{section.2.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{7}{section.2.2}\protected@file@percent }
|
||||
\newlabel{Der Ring Z}{{2.2}{7}{Der Ring $\mathbb {Z}_n$}{section.2.2}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{7}{subsection.2.2.1}\protected@file@percent }
|
||||
\newlabel{modulare_addition}{{2.2.1}{7}{Addition und Multiplikation}{subsection.2.2.1}{}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{7}{subsubsection.2.2.1.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{7}{subsubsection.2.2.1.2}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{8}{subsection.2.2.2}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{8}{subsection.2.2.3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{8}{subsubsection.2.2.3.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{8}{subsection.2.2.4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.5}Matrizen}{8}{subsection.2.2.5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{8}{subsubsection.2.2.5.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{8}{subsubsection.2.2.5.2}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.6}Kartesisches Produkt von Ringen}{8}{subsection.2.2.6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.7}Isomorphie von Ringen}{9}{subsection.2.2.7}\protected@file@percent }
|
||||
\newlabel{Isomorphie}{{2.2.7}{9}{Isomorphie von Ringen}{subsection.2.2.7}{}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{9}{section.2.3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{9}{subsection.2.3.1}\protected@file@percent }
|
||||
\newlabel{euklid}{{2.3.1}{9}{Euklid'scher Algorithmus}{subsection.2.3.1}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{9}{subsection.2.3.2}\protected@file@percent }
|
||||
\newlabel{erweiterter Euklid}{{2.3.2}{9}{erweiterter Euklid'scher Algorithmus}{subsection.2.3.2}{}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{9}{subsubsection.2.3.2.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{10}{section.2.4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{10}{subsection.2.4.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{11}{chapter.3}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.1}Vertraulichkeit}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.2}Integrität}{11}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.3}Authenzität der Daten}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{12}\protected@file@percent }
|
||||
\newlabel{signature}{{3.3.1}{12}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{12}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{13}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{13}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{13}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.7}Verfügbarkeit}{13}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{13}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.8}Anonymität}{13}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{14}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.1}Vertraulichkeit}{11}{section.3.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{11}{subsection.3.1.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.2}Integrität}{11}{section.3.2}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{12}{subsection.3.2.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.3}Authenzität der Daten}{12}{section.3.3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{12}{subsection.3.3.1}\protected@file@percent }
|
||||
\newlabel{signature}{{3.3.1}{12}{Schutzmaßnahme: Signaturen}{subsection.3.3.1}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{12}{subsection.3.3.2}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{12}{section.3.4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{12}{subsection.3.4.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{12}{section.3.5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{13}{subsection.3.5.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{13}{section.3.6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{13}{subsection.3.6.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.7}Verfügbarkeit}{13}{section.3.7}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{13}{subsection.3.7.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {3.8}Anonymität}{13}{section.3.8}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{14}{chapter.4}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{14}\protected@file@percent }
|
||||
\newlabel{kerckhoff}{{4.1}{14}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{14}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{14}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.4}Angriffsszenarien}{15}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{15}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{15}\protected@file@percent }
|
||||
\newlabel{known-plaintext}{{4.4.2}{15}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{15}\protected@file@percent }
|
||||
\newlabel{chosen-plaintext}{{4.4.3}{15}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{15}\protected@file@percent }
|
||||
\newlabel{brute-force}{{4.5}{15}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{15}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{15}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{15}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{16}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{16}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{16}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{17}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{14}{section.4.1}\protected@file@percent }
|
||||
\newlabel{kerckhoff}{{4.1}{14}{Das Kerckhoffs'sche Prinzip}{section.4.1}{}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{14}{section.4.2}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{14}{section.4.3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.4}Angriffsszenarien}{15}{section.4.4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{15}{subsection.4.4.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{15}{subsection.4.4.2}\protected@file@percent }
|
||||
\newlabel{known-plaintext}{{4.4.2}{15}{Known-plaintext Angriffe}{subsection.4.4.2}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{15}{subsection.4.4.3}\protected@file@percent }
|
||||
\newlabel{chosen-plaintext}{{4.4.3}{15}{Chosen-plaintext Angriffe}{subsection.4.4.3}{}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{15}{section.4.5}\protected@file@percent }
|
||||
\newlabel{brute-force}{{4.5}{15}{Brute-Force Angriffe}{section.4.5}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{15}{subsection.4.5.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{15}{subsection.4.5.2}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{15}{subsection.4.5.3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{16}{section.4.6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{16}{subsection.4.6.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{16}{subsubsection.4.6.1.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{17}{chapter.5}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{17}\protected@file@percent }
|
||||
\newlabel{synchrone Stromverschlüsselung}{{5.1}{17}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{18}\protected@file@percent }
|
||||
\newlabel{zustandsabhängige Stromverschlüsselung}{{5.2}{18}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{19}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{19}\protected@file@percent }
|
||||
\newlabel{synchron additive Stromverschlüsselung}{{5.2.1.1}{19}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{20}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{20}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.5}ChaCha20}{21}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{22}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{23}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{17}{section.5.1}\protected@file@percent }
|
||||
\newlabel{synchrone Stromverschlüsselung}{{5.1}{17}{Synchrone Stromverschlüsselungsverfahren}{section.5.1}{}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{18}{section.5.2}\protected@file@percent }
|
||||
\newlabel{zustandsabhängige Stromverschlüsselung}{{5.2}{18}{Zustandsabhängige Stromverschlüsselungsverfahren}{section.5.2}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{19}{subsection.5.2.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{19}{subsubsection.5.2.1.1}\protected@file@percent }
|
||||
\newlabel{synchron additive Stromverschlüsselung}{{5.2.1.1}{19}{Synchrone additive Stromverschlüsselungsverfahren}{subsubsection.5.2.1.1}{}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{20}{section.5.3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{20}{section.5.4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.5}ChaCha20}{21}{section.5.5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{22}{section.5.6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{23}{chapter.6}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\newlabel{Blockverschlüsselungsverfahren}{{6}{23}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.1}Padding-Verfahren}{23}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.2}Betriebsmodi}{23}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{23}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{24}\protected@file@percent }
|
||||
\newlabel{CBC}{{6.2.2}{24}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{25}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{25}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{26}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{26}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{26}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{26}\protected@file@percent }
|
||||
\newlabel{OFB}{{6.2.5}{26}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{27}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{27}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{27}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{28}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.4}DES}{28}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{28}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{29}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{30}\protected@file@percent }
|
||||
\newlabel{aes}{{6.6}{30}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.6.1}AES-128}{30}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {7}Hashfunktionen}{32}\protected@file@percent }
|
||||
\newlabel{Blockverschlüsselungsverfahren}{{6}{23}{Blockverschlüsselungsverfahren}{chapter.6}{}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.1}Padding-Verfahren}{23}{section.6.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.2}Betriebsmodi}{23}{section.6.2}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{23}{subsection.6.2.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{24}{subsection.6.2.2}\protected@file@percent }
|
||||
\newlabel{CBC}{{6.2.2}{24}{CBC (Cipher Block Chaining)}{subsection.6.2.2}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{25}{subsection.6.2.3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{25}{subsubsection.6.2.3.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{26}{subsubsection.6.2.3.2}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{26}{subsubsection.6.2.3.3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{26}{subsection.6.2.4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{26}{subsection.6.2.5}\protected@file@percent }
|
||||
\newlabel{OFB}{{6.2.5}{26}{OFB (Output Feedback)}{subsection.6.2.5}{}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{27}{subsubsection.6.2.5.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{27}{subsection.6.2.6}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{27}{subsubsection.6.2.6.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{28}{section.6.3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.4}DES}{28}{section.6.4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{28}{subsection.6.4.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{29}{section.6.5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{30}{section.6.6}\protected@file@percent }
|
||||
\newlabel{aes}{{6.6}{30}{AES (Advanced Encryption Standard)}{section.6.6}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.6.1}AES-128}{30}{subsection.6.6.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {7}Hashfunktionen}{32}{chapter.7}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\newlabel{Hashfunktionen}{{7}{32}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{32}\protected@file@percent }
|
||||
\newlabel{schwache Kollisionsfreiheit}{{7.1}{32}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{32}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{33}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{33}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{33}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{33}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{33}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{33}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{33}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{34}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{34}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {8}MAC-Verfahren}{36}\protected@file@percent }
|
||||
\newlabel{Hashfunktionen}{{7}{32}{Hashfunktionen}{chapter.7}{}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{32}{section.7.1}\protected@file@percent }
|
||||
\newlabel{schwache Kollisionsfreiheit}{{7.1}{32}{schwache Kollisionsfreiheit}{section.7.1}{}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{32}{section.7.2}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{33}{section.7.3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{33}{subsection.7.3.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{33}{subsubsection.7.3.1.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{33}{subsection.7.3.2}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{33}{subsection.7.3.3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{33}{section.7.4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{33}{subsection.7.4.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{34}{subsection.7.4.2}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{34}{section.7.5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {8}MAC-Verfahren}{36}{chapter.8}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {8.1}HMAC}{36}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {8.2}CMAC, CBC-MAC}{36}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {8.2.1}CMAC}{36}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {8.2.2}CBC-MAC}{37}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {8.1}HMAC}{36}{section.8.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {8.2}CMAC, CBC-MAC}{36}{section.8.2}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {8.2.1}CMAC}{36}{subsection.8.2.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {8.2.2}CBC-MAC}{37}{subsection.8.2.2}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {9}Modulare Arithmetik - Teil 2}{38}{chapter.9}\protected@file@percent }
|
||||
\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {9.1}Potenzen}{38}{section.9.1}\protected@file@percent }
|
||||
\pgfsyspdfmark {pgfid1}{3729359}{26373413}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {9.1.1}Erzeugnis und Ordnung eines invertierbaren Elements}{38}{subsection.9.1.1}\protected@file@percent }
|
||||
\pgfsyspdfmark {pgfid2}{3729359}{4826162}
|
||||
\pgfsyspdfmark {pgfid3}{3729359}{49277275}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {9.1.2}Faktorenzerlegung}{39}{subsection.9.1.2}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {9.1.3}Kleiner Satz von Fermat}{39}{subsection.9.1.3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {9.2}Exkurs: Einheitengruppe $\mathbb {Z}_{p^e}^*$}{39}{section.9.2}\protected@file@percent }
|
||||
\pgfsyspdfmark {pgfid4}{3729359}{25355837}
|
||||
\pgfsyspdfmark {pgfid5}{3729359}{18777221}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {9.2.1}$\mathbb {Z}_{2^e}^*$}{39}{subsection.9.2.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {9.3}Der chinesische Restsatz}{39}{section.9.3}\protected@file@percent }
|
||||
\pgfsyspdfmark {pgfid6}{3729359}{42949702}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {9.3.1}Beispiel}{40}{subsection.9.3.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {9.4}Elemente gerader und ungerader Ordnung in $\mathbb {Z}_n$**}{40}{section.9.4}\protected@file@percent }
|
||||
|
BIN
Zusammenfassung_DC.dvi
Normal file
BIN
Zusammenfassung_DC.dvi
Normal file
Binary file not shown.
@ -1,5 +1,5 @@
|
||||
# Fdb version 3
|
||||
["pdflatex"] 1600449989 "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" "Zusammenfassung_DC" 1600449989
|
||||
["pdflatex"] 1600530206 "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" "Zusammenfassung_DC" 1600530207
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/3DES.png" 1600198739 21419 7bf85db371a659f085d9c727a1835013 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/AES S-Box.png" 1600269267 23090 2ccce6631c19f6339868594d4b8f11fd ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Abhörung.png" 1599946545 2649 d6dd82c7c38c06d31f966207a71dc01b ""
|
||||
@ -23,18 +23,27 @@
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone additive Stromverschlüsselung.png" 1600003271 10891 bfed2f0ea0241a4a2a4bf215a3d59c32 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/zustandsabhängige Stromverschlüsselung.png" 1600002333 10276 422a1760594d1c860f8d7aa6dc5ed032 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Übertragungsmanipulation.png" 1599947212 3178 33bbd19fca19c787748d9158d802ceb1 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux" 1600449989 14728 218d8302697279964c9c5cac607bb3f7 "pdflatex"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" 1600448009 1164 63060c3089d19db142722eb600fa368b ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc" 1600449989 8648 2da1b659a745416645125d00d326d2be "pdflatex"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex" 1600448893 17264 63a210833f62fb093168d19f774d7af2 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Inhalt.tex" 1600528928 477 731e7da602023cb3181a2728c7b93b6e ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Packages.tex" 1600518243 677 f913f8c8ea9afee0f43bf284802baf62 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux" 1600530207 20315 541cfd414ee85744d016431a074e0598 "pdflatex"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out" 1600530207 8028 705a165d003f9245e6172cc1858c04f3 "pdflatex"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tex" 1600516760 357 a0335ff799ae7a1c8ac010ada4e25a6b ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc" 1600530207 11630 a7da7b3501ce35c57f808d1013372157 "pdflatex"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Blockverschlüsselungsverfahren.tex" 1600460544 17233 bda824d83abd3946c7f9968db3206a11 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex" 1600448588 10246 7885d54a32da2f0500e74d589ed65022 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex" 1599950390 6191 fdec0aff09dab6668264963cb44ee2f3 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex" 1600449988 2852 e14fb50fd5672a6215d5d27dd7fa0b13 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex" 1600284018 6736 3dece8651acf670a27e1fb6d604e2027 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik - Teil 2.tex" 1600530203 7347 fd2f1da6b182e03e481b7b6b7a4e0b14 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex" 1600529293 7698 1c8e8de96ac5d83aa003e539928fae4b ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Stromverschlüsselungsverfahren.tex" 1600194483 9836 ddaca4f3d88a46ce7c40ec5d75657c71 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex" 1600001305 6264 cba30a66f463934bc822d2ee54ac4b90 ""
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Verschlüsselungsverfahren.tex" 1600003902 7321 b77786564ba0de93d6d5b8a73400fcd1 ""
|
||||
"/usr/local/share/texmf/tex/latex/dirtytalk/dirtytalk.sty" 1599986679 1915 75d8498f106e3f673b6267693e944869 ""
|
||||
"/usr/local/share/texmf/tex/latex/mdframed/md-frame-1.mdf" 1600516250 24632 760c4c81e779e6958bac43417deb524f ""
|
||||
"/usr/local/share/texmf/tex/latex/mdframed/mdframed.sty" 1600516250 53487 3e997243f47cb3ba8b4c7b8df9c82989 ""
|
||||
"/usr/local/share/texmf/tex/latex/needspace/needspace.sty" 1600516701 852 0e34dbb72efc69fa07602405ad95585e ""
|
||||
"/usr/local/share/texmf/tex/latex/zref/zref-abspage.sty" 1600516525 2275 f674c50b1da0a158a02ffafeda53322d ""
|
||||
"/usr/local/share/texmf/tex/latex/zref/zref-base.sty" 1600516525 20632 508d53001f8de763d8dd867401d0c8b1 ""
|
||||
"/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc" 1591545468 2971 def0b6c1f0b107b3b936def894055589 ""
|
||||
"/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc" 1591545468 2900 1537cc8184ad1792082cd229ecc269f4 ""
|
||||
"/usr/share/texmf-dist/fonts/map/fontname/texfonts.map" 1591545468 3524 cb3e574dea2d1052e39280babc910dc8 ""
|
||||
@ -65,7 +74,9 @@
|
||||
"/usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msbm10.tfm" 1591545468 908 2921f8a10601f252058503cc6570e581 ""
|
||||
"/usr/share/texmf-dist/fonts/tfm/public/amsfonts/symbols/msbm7.tfm" 1591545468 940 228d6584342e91276bf566bcf9716b83 ""
|
||||
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmbx10.tfm" 1591545468 1328 c834bbb027764024c09d3d2bf908b5f0 ""
|
||||
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmbx12.tfm" 1591545468 1324 c910af8c371558dc20f2d7822f66fe64 ""
|
||||
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmbx6.tfm" 1591545468 1344 8a0be4fe4d376203000810ad4dc81558 ""
|
||||
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmbx7.tfm" 1591545468 1336 3125ccb448c1a09074e3aa4a9832f130 ""
|
||||
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmbx8.tfm" 1591545468 1332 1fde11373e221473104d6cc5993f046e ""
|
||||
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmex10.tfm" 1591545468 992 662f679a0b3d2d53c1b94050fdaa3f50 ""
|
||||
"/usr/share/texmf-dist/fonts/tfm/public/cm/cmmi10.tfm" 1591545468 1528 abec98dbc43e172678c11b3b9031252a ""
|
||||
@ -88,6 +99,7 @@
|
||||
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi10.pfb" 1591545468 36299 5f9df58c2139e7edcf37c8fca4bd384d ""
|
||||
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb" 1591545468 36741 fa121aac0049305630cf160b86157ee4 ""
|
||||
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi6.pfb" 1591545468 37166 8ab3487cbe3ab49ebce74c29ea2418db ""
|
||||
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi7.pfb" 1591545468 36281 c355509802a035cadc5f15869451dcee ""
|
||||
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi8.pfb" 1591545468 35469 70d41d2b9ea31d5d813066df7c99281c ""
|
||||
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb" 1591545468 35752 024fb6c41858982481f6968b5fc26508 ""
|
||||
"/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr6.pfb" 1591545468 32734 69e00a6b65cedb993666e42eedb3d48f ""
|
||||
@ -110,15 +122,78 @@
|
||||
"/usr/share/texmf-dist/fonts/type1/public/cm-super/sftt1440.pfb" 1591545468 166192 d74933432e33dffe92198fe51b7b0dcb ""
|
||||
"/usr/share/texmf-dist/fonts/type1/public/rsfs/rsfs10.pfb" 1591545468 16077 4737ac34f0fb5608550f3780a0202c22 ""
|
||||
"/usr/share/texmf-dist/tex/context/base/mkii/supp-pdf.mkii" 1591545468 71627 94eb9990bed73c364d7f53f960cc8c5b ""
|
||||
"/usr/share/texmf-dist/tex/generic/atbegshi/atbegshi.sty" 1591545468 24708 5584a51a7101caf7e6bbf1fc27d8f7b1 ""
|
||||
"/usr/share/texmf-dist/tex/generic/babel-german/ngerman.ldf" 1591545468 2164 da22692bce498dcc4f70209c7185a346 ""
|
||||
"/usr/share/texmf-dist/tex/generic/babel-german/ngermanb.ldf" 1591545468 7584 40e9a51a28a966f337267407ea4ab873 ""
|
||||
"/usr/share/texmf-dist/tex/generic/babel/babel.def" 1591545468 107158 a58f7a1696ebeb13376aa0f8720600d4 ""
|
||||
"/usr/share/texmf-dist/tex/generic/babel/babel.sty" 1591545468 35343 180ff3fc8cf1d846a7f48b26f8aa7c17 ""
|
||||
"/usr/share/texmf-dist/tex/generic/babel/txtbabel.def" 1591545468 5211 2c3605e674ad86cdc9fdcfcd3de3a1da ""
|
||||
"/usr/share/texmf-dist/tex/generic/bigintcalc/bigintcalc.sty" 1591545468 40635 c40361e206be584d448876bba8a64a3b ""
|
||||
"/usr/share/texmf-dist/tex/generic/bitset/bitset.sty" 1591545468 33961 6b5c75130e435b2bfdb9f480a09a39f9 ""
|
||||
"/usr/share/texmf-dist/tex/generic/etexcmds/etexcmds.sty" 1591545468 7734 b98cbb34c81f667027c1e3ebdbfce34b ""
|
||||
"/usr/share/texmf-dist/tex/generic/gettitlestring/gettitlestring.sty" 1591545468 8371 9d55b8bd010bc717624922fb3477d92e ""
|
||||
"/usr/share/texmf-dist/tex/generic/iftex/iftex.sty" 1591545468 6501 4011d89d9621e0b0901138815ba5ff29 ""
|
||||
"/usr/share/texmf-dist/tex/generic/iftex/ifvtex.sty" 1591545468 1057 525c2192b5febbd8c1f662c9468335bb ""
|
||||
"/usr/share/texmf-dist/tex/generic/infwarerr/infwarerr.sty" 1591545468 8356 7bbb2c2373aa810be568c29e333da8ed ""
|
||||
"/usr/share/texmf-dist/tex/generic/intcalc/intcalc.sty" 1591545468 31769 002a487f55041f8e805cfbf6385ffd97 ""
|
||||
"/usr/share/texmf-dist/tex/generic/kvdefinekeys/kvdefinekeys.sty" 1591545468 5412 d5a2436094cd7be85769db90f29250a6 ""
|
||||
"/usr/share/texmf-dist/tex/generic/kvsetkeys/kvsetkeys.sty" 1591545468 13807 952b0226d4efca026f0e19dd266dcc22 ""
|
||||
"/usr/share/texmf-dist/tex/generic/ltxcmds/ltxcmds.sty" 1591545468 18552 1e1cc7b75da0dfaacce7cdcb27d306bf ""
|
||||
"/usr/share/texmf-dist/tex/generic/pdfescape/pdfescape.sty" 1591545468 19007 15924f7228aca6c6d184b115f4baa231 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcore.code.tex" 1591545468 992 fb3cda354707a54fda62787a411c7c22 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorearrows.code.tex" 1591545468 43820 bc6cf5aa959817914ace33f5c6232161 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreexternal.code.tex" 1591545468 19324 c9a64402f22bd8d81821141a357af653 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoregraphicstate.code.tex" 1591545468 6038 d639d02574be9a72f3c602c2a3510e02 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreimage.code.tex" 1591545468 6948 284bbe3c9a7ca0a826c1c03895e69b9f ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorelayers.code.tex" 1591545468 4883 a6f3eb1f71d8c4affaf43a169828b043 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreobjects.code.tex" 1591545468 2544 3b1b198fd49f01e328adc9162a07b213 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathconstruct.code.tex" 1591545468 44189 1fd6229dad4c898883516c032f2ca5d2 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathprocessing.code.tex" 1591545468 17311 3092579be20ef0f229c42ad3f09da85c ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathusage.code.tex" 1591545468 21302 d6c4b340248adbe650ebf6ca76bdccca ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepatterns.code.tex" 1591545468 9690 7585efa5a591822837f837bc5bc35621 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepoints.code.tex" 1591545468 33335 942ccafe284041918d36e54696b98aa7 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorequick.code.tex" 1591545468 2965 502761b60f43ab2de5ecb2f4625163ae ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorerdf.code.tex" 1591545468 5196 f8c5c775d4d6e2cb050392127cabda72 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorescopes.code.tex" 1591545468 20726 ed6ec1d6f0f35e7a93de4e79af83dbce ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreshade.code.tex" 1591545468 35249 144a6b9c4df4644618bb3a0a40472608 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoretransformations.code.tex" 1591545468 21989 266e83c51fe41eb8b8d5e6896dc71cc1 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoretransparency.code.tex" 1591545468 8842 5cc856e132fac404805c6da091779283 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/libraries/tikzlibrarytopaths.code.tex" 1591545468 11544 2a5d66a3270abf4ef673e8a0b7734a90 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/tikz.code.tex" 1591545468 187592 7922ceab1864698dec4c84978d5b182f ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/libraries/pgflibraryplothandlers.code.tex" 1591545468 32995 a4d54c043ae5274ceaaddeb36ad43a6f ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfint.code.tex" 1591545468 3063 8c415c68a0f3394e45cfeca0b65f6ee6 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex" 1591545468 521 c70cf6ad609de83a27ee7929eb356332 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathcalc.code.tex" 1591545468 13391 933cab19c6d27039dbfc487330d1005a ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfloat.code.tex" 1591545468 104938 15f2d8bdabd6bf9ca70f62cd8e3d4940 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.base.code.tex" 1591545468 10157 218d58ab074e5bd0d027de45ec64cc00 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.basic.code.tex" 1591545468 28176 568b081ec39645f2db1a29fbd0c635e2 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.code.tex" 1591545468 9054 388d21239a1b6df2cc8beaae31c976b0 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.comparison.code.tex" 1591545468 3865 cddf7ddc80f018587c55afdcc79fc333 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.integerarithmetics.code.tex" 1591545468 3177 27d85c44fbfe09ff3b2cf2879e3ea434 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.misc.code.tex" 1591545468 10925 df50b8a6e5660a585e3a2bf55726dcc8 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.random.code.tex" 1591545468 7787 1750fc3f164703caf31fc8ea9218c67e ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.round.code.tex" 1591545468 3379 cbd0948a550bd7a495a160ca6beee9ed ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.trigonometric.code.tex" 1591545468 92405 bba89470858d7b0788a9c09331c39653 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathparser.code.tex" 1591545468 36526 453db1f8626a56b5ebb0fad496d6a39f ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathutil.code.tex" 1591545468 8471 b18959397c76e1e582402ab9f592ed9f ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/modules/pgfmodulematrix.code.tex" 1591545468 21201 46a4dded6619f990ac7347f99fbaac9f ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/modules/pgfmoduleplot.code.tex" 1591545468 16121 9e240115374a8d489f2f786115df83a9 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/modules/pgfmoduleshapes.code.tex" 1591545468 43259 3e05ba63539916af2eaca603c2eda780 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/pgf.revision.tex" 1591545468 465 1f401ab1e7fc6cb7ede39e96c66531fd ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgf.cfg" 1591545468 926 70ff613fabeb70f5d1673dc0c93987bd ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys-common-pdf.def" 1591545468 5546 3586827e6032c95512b2a6682d2979a3 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys-pdftex.def" 1591545468 12603 c02869ea216d842c29d52fae8738264e ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys.code.tex" 1591545468 60269 e86bc0081af83a4ad47e4500ee09a2e4 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsysprotocol.code.tex" 1591545468 1896 82c274ff520f9e450ccea4e3ef4edc12 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsyssoftpath.code.tex" 1591545468 7778 a25a32a10ca820357491d4c7b3ac02ea ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/utilities/pgffor.code.tex" 1591545468 23777 cb6c8f02f87d86d621f5cb92c44f4998 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeys.code.tex" 1591545468 36815 f7f1772c398f07af2cb741992963045c ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeysfiltered.code.tex" 1591545468 37439 bd44d50aef702b03193f731207931834 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfrcs.code.tex" 1591545468 4494 7e5ace0ccf59408f2cf63219a5d36927 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-common-lists.tex" 1591545468 7250 03b2b9fb5fa38e7ca5cc3c45860fb210 ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-common.tex" 1591545468 28309 488ccc6c701bbdd1bf671f708757aa5c ""
|
||||
"/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-latex.def" 1591545468 6286 1bd76fc45da9929ab2a64f51cba3ab6f ""
|
||||
"/usr/share/texmf-dist/tex/generic/uniquecounter/uniquecounter.sty" 1591545468 7008 f92eaa0a3872ed622bbf538217cd2ab7 ""
|
||||
"/usr/share/texmf-dist/tex/latex/amsfonts/amsfonts.sty" 1591545468 5949 3f3fd50a8cc94c3d4cbf4fc66cd3df1c ""
|
||||
"/usr/share/texmf-dist/tex/latex/amsfonts/amssymb.sty" 1591545468 13829 94730e64147574077f8ecfea9bb69af4 ""
|
||||
"/usr/share/texmf-dist/tex/latex/amsfonts/umsa.fd" 1591545468 961 6518c6525a34feb5e8250ffa91731cff ""
|
||||
@ -128,6 +203,8 @@
|
||||
"/usr/share/texmf-dist/tex/latex/amsmath/amsmath.sty" 1591545468 85660 baee036978c7a91f4e2bba43f05e5945 ""
|
||||
"/usr/share/texmf-dist/tex/latex/amsmath/amsopn.sty" 1591545468 4116 32e6abd27229755a83a8b7f18e583890 ""
|
||||
"/usr/share/texmf-dist/tex/latex/amsmath/amstext.sty" 1591545468 2432 8ff93b1137020e8f21930562a874ae66 ""
|
||||
"/usr/share/texmf-dist/tex/latex/atveryend/atveryend.sty" 1591545468 19336 ce7ae9438967282886b3b036cfad1e4d ""
|
||||
"/usr/share/texmf-dist/tex/latex/auxhook/auxhook.sty" 1591545468 3935 57aa3c3e203a5c2effb4d2bd2efbc323 ""
|
||||
"/usr/share/texmf-dist/tex/latex/base/fontenc.sty" 1591545468 4947 0c2888dd88121ae675fc6e82213623ba ""
|
||||
"/usr/share/texmf-dist/tex/latex/base/ifthen.sty" 1591545468 5159 892429808d9e0e2b3548aaefd9a06ed0 ""
|
||||
"/usr/share/texmf-dist/tex/latex/base/inputenc.sty" 1591545468 5050 8933a39ad74377accd18991c5eb90c58 ""
|
||||
@ -135,6 +212,7 @@
|
||||
"/usr/share/texmf-dist/tex/latex/base/size11.clo" 1591545468 8462 61fdf79debfc3dc4dab35ec6cf83fbf7 ""
|
||||
"/usr/share/texmf-dist/tex/latex/base/t1cmtt.fd" 1591545468 2444 92c1f2a3fb5fbd5ac60f99eac55c9b29 ""
|
||||
"/usr/share/texmf-dist/tex/latex/epstopdf-pkg/epstopdf-base.sty" 1591545468 13886 d1306dcf79a944f6988e688c1785f9ce ""
|
||||
"/usr/share/texmf-dist/tex/latex/etoolbox/etoolbox.sty" 1591545468 45259 743c52a37a6e5ed83cfe0e128b2da10d ""
|
||||
"/usr/share/texmf-dist/tex/latex/geometry/geometry.sty" 1591545468 41601 9cf6c5257b1bc7af01a58859749dd37a ""
|
||||
"/usr/share/texmf-dist/tex/latex/graphics-cfg/color.cfg" 1591545468 1213 620bba36b25224fa9b7e1ccb4ecb76fd ""
|
||||
"/usr/share/texmf-dist/tex/latex/graphics-cfg/graphics.cfg" 1591545468 1224 978390e9c2234eab29404bc21b268d1e ""
|
||||
@ -143,20 +221,46 @@
|
||||
"/usr/share/texmf-dist/tex/latex/graphics/graphicx.sty" 1591545468 9067 1b996612394a52e1efe89c8bfe8a5892 ""
|
||||
"/usr/share/texmf-dist/tex/latex/graphics/keyval.sty" 1591545468 2590 e3b24ff953e5b58d924f163d25380312 ""
|
||||
"/usr/share/texmf-dist/tex/latex/graphics/trig.sty" 1591545468 3976 d7fa7d81d2870d509d25b17d0245e735 ""
|
||||
"/usr/share/texmf-dist/tex/latex/hycolor/hycolor.sty" 1591545468 17914 4c28a13fc3d975e6e81c9bea1d697276 ""
|
||||
"/usr/share/texmf-dist/tex/latex/hyperref/hpdftex.def" 1591545468 50570 2e81797743231d9037b0cbe3436d74ba ""
|
||||
"/usr/share/texmf-dist/tex/latex/hyperref/hyperref.sty" 1591545468 236775 8ab18a05f69e6caef423fa59cb0af03b ""
|
||||
"/usr/share/texmf-dist/tex/latex/hyperref/nameref.sty" 1591545468 13244 0070bcab7b5a88187847128d22faf4d8 ""
|
||||
"/usr/share/texmf-dist/tex/latex/hyperref/pd1enc.def" 1591545468 14134 c11767c54bd7ecab56984ee4e4e3158c ""
|
||||
"/usr/share/texmf-dist/tex/latex/jknapltx/mathrsfs.sty" 1591545468 300 12fa6f636b617656f2810ee82cb05015 ""
|
||||
"/usr/share/texmf-dist/tex/latex/jknapltx/ursfs.fd" 1591545468 548 cc4e3557704bfed27c7002773fad6c90 ""
|
||||
"/usr/share/texmf-dist/tex/latex/kvoptions/kvoptions.sty" 1591545468 22520 c4c2dab203104295e1e618be7e5c0f5b ""
|
||||
"/usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdfmode.def" 1591545468 25742 5de23a2d2bc67a3139433e702e64a437 ""
|
||||
"/usr/share/texmf-dist/tex/latex/l3kernel/expl3.sty" 1591545468 4713 eb01a5180e90c7ac1715bb64e2c31227 ""
|
||||
"/usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse-generic.tex" 1591545468 80141 edbf9289c99ff37db17116af7a3a423f ""
|
||||
"/usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse.sty" 1591545468 5914 5eaa255b13fb7a5e47ededc8ec098dba ""
|
||||
"/usr/share/texmf-dist/tex/latex/latexconfig/epstopdf-sys.cfg" 1591545468 678 4792914a8f45be57bb98413425e4c7af ""
|
||||
"/usr/share/texmf-dist/tex/latex/letltxmacro/letltxmacro.sty" 1591545468 5766 13a9e8766c47f30327caf893ece86ac8 ""
|
||||
"/usr/share/texmf-dist/tex/latex/listings/listings.cfg" 1591545468 1830 e31effa752c61538383451ae21332364 ""
|
||||
"/usr/share/texmf-dist/tex/latex/listings/listings.sty" 1591545468 80964 64e57373f36316e4a09b517cbf1aba2e ""
|
||||
"/usr/share/texmf-dist/tex/latex/listings/lstmisc.sty" 1591545468 77022 ee25ce086f4a79d8cf73bac6f94c02a5 ""
|
||||
"/usr/share/texmf-dist/tex/latex/ms/everyshi.sty" 1591545468 3878 6aa7c08ff2621006e0603349e40a30a8 ""
|
||||
"/usr/share/texmf-dist/tex/latex/pdftexcmds/pdftexcmds.sty" 1591545468 19989 e08c4750d96640367c4b141017eda013 ""
|
||||
"/usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgf.sty" 1591545468 1090 d20f587ea9464d1841bd0d13d3ff9856 ""
|
||||
"/usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgfcore.sty" 1591545468 410 5bf12ea7330e5f12c445332a4fe9a263 ""
|
||||
"/usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-0-65.sty" 1591545468 21013 e98e1aaaf40d31632787c2bd25d24b57 ""
|
||||
"/usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-1-18.sty" 1591545468 989 2cf3da8e8ec55131c49389428d565e37 ""
|
||||
"/usr/share/texmf-dist/tex/latex/pgf/frontendlayer/tikz.sty" 1591545468 339 592cf35cba3d400082b8a9a5d0199d70 ""
|
||||
"/usr/share/texmf-dist/tex/latex/pgf/math/pgfmath.sty" 1591545468 306 0796eafca5e159e6ec2167a6d22d81b1 ""
|
||||
"/usr/share/texmf-dist/tex/latex/pgf/systemlayer/pgfsys.sty" 1591545468 443 0b2e781830192df35c0fd357cf13e26e ""
|
||||
"/usr/share/texmf-dist/tex/latex/pgf/utilities/pgffor.sty" 1591545468 348 8927fde343487e003b01a4c2ca34073b ""
|
||||
"/usr/share/texmf-dist/tex/latex/pgf/utilities/pgfkeys.sty" 1591545468 274 4cad6e665cc93ac2ac979039a94fa1e1 ""
|
||||
"/usr/share/texmf-dist/tex/latex/pgf/utilities/pgfrcs.sty" 1591545468 325 2bcd023400636339210573e2b3ee298b ""
|
||||
"/usr/share/texmf-dist/tex/latex/refcount/refcount.sty" 1591545468 9878 9e94e8fa600d95f9c7731bb21dfb67a4 ""
|
||||
"/usr/share/texmf-dist/tex/latex/rerunfilecheck/rerunfilecheck.sty" 1591545468 9715 b051d5b493d9fe5f4bc251462d039e5f ""
|
||||
"/usr/share/texmf-dist/tex/latex/tools/enumerate.sty" 1591545468 3469 19b6cb25f21abe53fb90b9fe27615441 ""
|
||||
"/usr/share/texmf-dist/tex/latex/url/url.sty" 1591545468 12796 8edb7d69a20b857904dd0ea757c14ec9 ""
|
||||
"/usr/share/texmf-dist/tex/latex/xcolor/xcolor.sty" 1591545468 55589 34128738f682d033422ca125f82e5d62 ""
|
||||
"/usr/share/texmf-dist/web2c/texmf.cnf" 1591545468 33301 a3134070eacafb10b1f371612ce2650d ""
|
||||
"/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map" 1599837712 334180 163417853e75f7c89e92e140d6d6e976 ""
|
||||
"/var/lib/texmf/web2c/pdftex/pdflatex.fmt" 1599837703 2514050 ecf9fe402c479fca46412778ddf38de8 ""
|
||||
(generated)
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc"
|
||||
"/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.log"
|
||||
|
@ -9,6 +9,8 @@ INPUT /usr/share/texmf-dist/tex/latex/base/size11.clo
|
||||
INPUT /usr/share/texmf-dist/tex/latex/base/size11.clo
|
||||
INPUT /usr/share/texmf-dist/fonts/map/fontname/texfonts.map
|
||||
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmr10.tfm
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Packages.tex
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Packages.tex
|
||||
INPUT /usr/share/texmf-dist/tex/latex/geometry/geometry.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/geometry/geometry.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/graphics/keyval.sty
|
||||
@ -75,8 +77,158 @@ INPUT /usr/share/texmf-dist/tex/generic/kvsetkeys/kvsetkeys.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/kvsetkeys/kvsetkeys.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/base/ifthen.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/base/ifthen.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/hyperref/hyperref.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/hyperref/hyperref.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pdftexcmds/pdftexcmds.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pdftexcmds/pdftexcmds.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/infwarerr/infwarerr.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/infwarerr/infwarerr.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/kvdefinekeys/kvdefinekeys.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/kvdefinekeys/kvdefinekeys.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pdfescape/pdfescape.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pdfescape/pdfescape.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/hycolor/hycolor.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/hycolor/hycolor.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/letltxmacro/letltxmacro.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/letltxmacro/letltxmacro.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/auxhook/auxhook.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/auxhook/auxhook.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/hyperref/pd1enc.def
|
||||
INPUT /usr/share/texmf-dist/tex/latex/hyperref/pd1enc.def
|
||||
INPUT /usr/share/texmf-dist/tex/generic/intcalc/intcalc.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/intcalc/intcalc.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/etexcmds/etexcmds.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/etexcmds/etexcmds.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/url/url.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/url/url.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/bitset/bitset.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/bitset/bitset.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/bigintcalc/bigintcalc.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/bigintcalc/bigintcalc.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/atbegshi/atbegshi.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/atbegshi/atbegshi.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/hyperref/hpdftex.def
|
||||
INPUT /usr/share/texmf-dist/tex/latex/hyperref/hpdftex.def
|
||||
INPUT /usr/share/texmf-dist/tex/latex/atveryend/atveryend.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/atveryend/atveryend.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/rerunfilecheck/rerunfilecheck.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/rerunfilecheck/rerunfilecheck.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/uniquecounter/uniquecounter.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/uniquecounter/uniquecounter.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pgf/frontendlayer/tikz.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pgf/frontendlayer/tikz.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgf.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgf.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pgf/utilities/pgfrcs.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pgf/utilities/pgfrcs.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-common.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-common-lists.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-latex.def
|
||||
INPUT /usr/share/texmf-dist/tex/latex/ms/everyshi.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/ms/everyshi.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfrcs.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfrcs.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/pgf.revision.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/pgf.revision.tex
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgfcore.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgfcore.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pgf/systemlayer/pgfsys.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pgf/systemlayer/pgfsys.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeys.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeysfiltered.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgf.cfg
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys-pdftex.def
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys-pdftex.def
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys-common-pdf.def
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsyssoftpath.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsyssoftpath.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsysprotocol.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsysprotocol.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcore.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcore.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathcalc.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathutil.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathparser.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.basic.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.trigonometric.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.random.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.comparison.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.base.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.round.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.misc.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.integerarithmetics.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfloat.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfint.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepoints.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathconstruct.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathusage.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorescopes.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoregraphicstate.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoretransformations.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorequick.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreobjects.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathprocessing.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorearrows.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreshade.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreimage.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreexternal.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorelayers.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoretransparency.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepatterns.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorerdf.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/modules/pgfmoduleshapes.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/modules/pgfmoduleplot.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-0-65.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-0-65.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-1-18.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-1-18.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pgf/utilities/pgffor.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pgf/utilities/pgffor.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pgf/utilities/pgfkeys.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pgf/utilities/pgfkeys.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeys.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeys.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pgf/math/pgfmath.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pgf/math/pgfmath.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgffor.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/utilities/pgffor.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/tikz.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/tikz.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/libraries/pgflibraryplothandlers.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/libraries/pgflibraryplothandlers.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/modules/pgfmodulematrix.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/libraries/tikzlibrarytopaths.code.tex
|
||||
INPUT /usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/libraries/tikzlibrarytopaths.code.tex
|
||||
INPUT /usr/local/share/texmf/tex/latex/mdframed/mdframed.sty
|
||||
INPUT /usr/local/share/texmf/tex/latex/mdframed/mdframed.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/l3kernel/expl3.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/l3kernel/expl3.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdfmode.def
|
||||
INPUT /usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdfmode.def
|
||||
INPUT /usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse-generic.tex
|
||||
INPUT /usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse-generic.tex
|
||||
INPUT /usr/share/texmf-dist/tex/latex/etoolbox/etoolbox.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/etoolbox/etoolbox.sty
|
||||
INPUT /usr/local/share/texmf/tex/latex/zref/zref-abspage.sty
|
||||
INPUT /usr/local/share/texmf/tex/latex/zref/zref-abspage.sty
|
||||
INPUT /usr/local/share/texmf/tex/latex/zref/zref-base.sty
|
||||
INPUT /usr/local/share/texmf/tex/latex/zref/zref-base.sty
|
||||
INPUT /usr/local/share/texmf/tex/latex/needspace/needspace.sty
|
||||
INPUT /usr/local/share/texmf/tex/latex/needspace/needspace.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/pgf/frontendlayer/tikz.sty
|
||||
INPUT /usr/local/share/texmf/tex/latex/mdframed/md-frame-1.mdf
|
||||
INPUT /usr/local/share/texmf/tex/latex/mdframed/md-frame-1.mdf
|
||||
INPUT /usr/share/texmf-dist/tex/latex/tools/enumerate.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/tools/enumerate.sty
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux
|
||||
OUTPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux
|
||||
@ -86,6 +238,20 @@ INPUT /usr/share/texmf-dist/tex/latex/epstopdf-pkg/epstopdf-base.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/epstopdf-pkg/epstopdf-base.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/latexconfig/epstopdf-sys.cfg
|
||||
INPUT /usr/share/texmf-dist/tex/latex/latexconfig/epstopdf-sys.cfg
|
||||
INPUT /usr/share/texmf-dist/tex/latex/hyperref/nameref.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/hyperref/nameref.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/refcount/refcount.sty
|
||||
INPUT /usr/share/texmf-dist/tex/latex/refcount/refcount.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/gettitlestring/gettitlestring.sty
|
||||
INPUT /usr/share/texmf-dist/tex/generic/gettitlestring/gettitlestring.sty
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
|
||||
OUTPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
|
||||
OUTPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
|
||||
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm1728.tfm
|
||||
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm1200.tfm
|
||||
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmr12.tfm
|
||||
@ -115,7 +281,6 @@ INPUT /usr/share/texmf-dist/tex/latex/jknapltx/ursfs.fd
|
||||
INPUT /usr/share/texmf-dist/fonts/tfm/public/rsfs/rsfs10.tfm
|
||||
INPUT /usr/share/texmf-dist/fonts/tfm/public/rsfs/rsfs10.tfm
|
||||
INPUT /usr/share/texmf-dist/fonts/tfm/public/rsfs/rsfs5.tfm
|
||||
OUTPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf
|
||||
INPUT /var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map
|
||||
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm2488.tfm
|
||||
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecbx2488.tfm
|
||||
@ -132,6 +297,8 @@ INPUT /usr/share/texmf-dist/tex/latex/base/t1cmtt.fd
|
||||
INPUT /usr/share/texmf-dist/tex/latex/base/t1cmtt.fd
|
||||
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ectt1095.tfm
|
||||
OUTPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Inhalt.tex
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Inhalt.tex
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex
|
||||
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ecrm2074.tfm
|
||||
@ -248,7 +415,15 @@ INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hash
|
||||
INPUT /usr/share/texmf-dist/fonts/tfm/jknappen/ec/ectt1440.tfm
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik - Teil 2.tex
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik - Teil 2.tex
|
||||
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmbx12.tfm
|
||||
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmbx10.tfm
|
||||
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmbx7.tfm
|
||||
INPUT /usr/share/texmf-dist/fonts/tfm/public/cm/cmbx12.tfm
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
|
||||
INPUT /home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out
|
||||
INPUT /usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc
|
||||
INPUT /usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc
|
||||
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx10.pfb
|
||||
@ -257,6 +432,7 @@ INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmex10.pfb
|
||||
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi10.pfb
|
||||
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb
|
||||
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi6.pfb
|
||||
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi7.pfb
|
||||
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi8.pfb
|
||||
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb
|
||||
INPUT /usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr6.pfb
|
||||
|
@ -1,4 +1,4 @@
|
||||
This is pdfTeX, Version 3.14159265-2.6-1.40.21 (TeX Live 2020/Arch Linux) (preloaded format=pdflatex 2020.9.11) 18 SEP 2020 19:26
|
||||
This is pdfTeX, Version 3.14159265-2.6-1.40.21 (TeX Live 2020/Arch Linux) (preloaded format=pdflatex 2020.9.11) 19 SEP 2020 17:43
|
||||
entering extended mode
|
||||
restricted \write18 enabled.
|
||||
file:line:error style messages enabled.
|
||||
@ -23,7 +23,7 @@ File: size11.clo 2019/12/20 v1.4l Standard LaTeX file (size option)
|
||||
\abovecaptionskip=\skip47
|
||||
\belowcaptionskip=\skip48
|
||||
\bibindent=\dimen134
|
||||
) (/usr/share/texmf-dist/tex/latex/geometry/geometry.sty
|
||||
) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Packages.tex (/usr/share/texmf-dist/tex/latex/geometry/geometry.sty
|
||||
Package: geometry 2020/01/02 v5.9 Page Geometry
|
||||
(/usr/share/texmf-dist/tex/latex/graphics/keyval.sty
|
||||
Package: keyval 2014/10/28 v1.15 key=value parser (DPC)
|
||||
@ -197,25 +197,413 @@ Package: kvsetkeys 2019/12/15 v1.18 Key value parser (HO)
|
||||
Package: ifthen 2014/09/29 v1.1c Standard LaTeX ifthen package (DPC)
|
||||
)
|
||||
\c@dirtytalk@qdepth=\count267
|
||||
) (/usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdfmode.def
|
||||
) (/usr/share/texmf-dist/tex/latex/hyperref/hyperref.sty
|
||||
Package: hyperref 2020-05-15 v7.00e Hypertext links for LaTeX
|
||||
(/usr/share/texmf-dist/tex/latex/pdftexcmds/pdftexcmds.sty
|
||||
Package: pdftexcmds 2020-06-04 v0.32 Utility functions of pdfTeX for LuaTeX (HO)
|
||||
(/usr/share/texmf-dist/tex/generic/infwarerr/infwarerr.sty
|
||||
Package: infwarerr 2019/12/03 v1.5 Providing info/warning/error messages (HO)
|
||||
)
|
||||
Package pdftexcmds Info: \pdf@primitive is available.
|
||||
Package pdftexcmds Info: \pdf@ifprimitive is available.
|
||||
Package pdftexcmds Info: \pdfdraftmode found.
|
||||
) (/usr/share/texmf-dist/tex/generic/kvdefinekeys/kvdefinekeys.sty
|
||||
Package: kvdefinekeys 2019-12-19 v1.6 Define keys (HO)
|
||||
) (/usr/share/texmf-dist/tex/generic/pdfescape/pdfescape.sty
|
||||
Package: pdfescape 2019/12/09 v1.15 Implements pdfTeX's escape features (HO)
|
||||
) (/usr/share/texmf-dist/tex/latex/hycolor/hycolor.sty
|
||||
Package: hycolor 2020-01-27 v1.10 Color options for hyperref/bookmark (HO)
|
||||
) (/usr/share/texmf-dist/tex/latex/letltxmacro/letltxmacro.sty
|
||||
Package: letltxmacro 2019/12/03 v1.6 Let assignment for LaTeX macros (HO)
|
||||
) (/usr/share/texmf-dist/tex/latex/auxhook/auxhook.sty
|
||||
Package: auxhook 2019-12-17 v1.6 Hooks for auxiliary files (HO)
|
||||
)
|
||||
\@linkdim=\dimen159
|
||||
\Hy@linkcounter=\count268
|
||||
\Hy@pagecounter=\count269
|
||||
(/usr/share/texmf-dist/tex/latex/hyperref/pd1enc.def
|
||||
File: pd1enc.def 2020-05-15 v7.00e Hyperref: PDFDocEncoding definition (HO)
|
||||
Now handling font encoding PD1 ...
|
||||
... no UTF-8 mapping file for font encoding PD1
|
||||
) (/usr/share/texmf-dist/tex/generic/intcalc/intcalc.sty
|
||||
Package: intcalc 2019/12/15 v1.3 Expandable calculations with integers (HO)
|
||||
) (/usr/share/texmf-dist/tex/generic/etexcmds/etexcmds.sty
|
||||
Package: etexcmds 2019/12/15 v1.7 Avoid name clashes with e-TeX commands (HO)
|
||||
)
|
||||
\Hy@SavedSpaceFactor=\count270
|
||||
Package hyperref Info: Hyper figures OFF on input line 4464.
|
||||
Package hyperref Info: Link nesting OFF on input line 4469.
|
||||
Package hyperref Info: Hyper index ON on input line 4472.
|
||||
Package hyperref Info: Plain pages OFF on input line 4479.
|
||||
Package hyperref Info: Backreferencing OFF on input line 4484.
|
||||
Package hyperref Info: Implicit mode ON; LaTeX internals redefined.
|
||||
Package hyperref Info: Bookmarks ON on input line 4717.
|
||||
\c@Hy@tempcnt=\count271
|
||||
(/usr/share/texmf-dist/tex/latex/url/url.sty
|
||||
\Urlmuskip=\muskip17
|
||||
Package: url 2013/09/16 ver 3.4 Verb mode for urls, etc.
|
||||
)
|
||||
LaTeX Info: Redefining \url on input line 5076.
|
||||
\XeTeXLinkMargin=\dimen160
|
||||
(/usr/share/texmf-dist/tex/generic/bitset/bitset.sty
|
||||
Package: bitset 2019/12/09 v1.3 Handle bit-vector datatype (HO)
|
||||
(/usr/share/texmf-dist/tex/generic/bigintcalc/bigintcalc.sty
|
||||
Package: bigintcalc 2019/12/15 v1.5 Expandable calculations on big integers (HO)
|
||||
))
|
||||
\Fld@menulength=\count272
|
||||
\Field@Width=\dimen161
|
||||
\Fld@charsize=\dimen162
|
||||
Package hyperref Info: Hyper figures OFF on input line 6347.
|
||||
Package hyperref Info: Link nesting OFF on input line 6352.
|
||||
Package hyperref Info: Hyper index ON on input line 6355.
|
||||
Package hyperref Info: backreferencing OFF on input line 6362.
|
||||
Package hyperref Info: Link coloring OFF on input line 6367.
|
||||
Package hyperref Info: Link coloring with OCG OFF on input line 6372.
|
||||
Package hyperref Info: PDF/A mode OFF on input line 6377.
|
||||
LaTeX Info: Redefining \ref on input line 6417.
|
||||
LaTeX Info: Redefining \pageref on input line 6421.
|
||||
(/usr/share/texmf-dist/tex/generic/atbegshi/atbegshi.sty
|
||||
Package: atbegshi 2019/12/05 v1.19 At begin shipout hook (HO)
|
||||
)
|
||||
\Hy@abspage=\count273
|
||||
\c@Item=\count274
|
||||
\c@Hfootnote=\count275
|
||||
)
|
||||
Package hyperref Info: Driver (autodetected): hpdftex.
|
||||
(/usr/share/texmf-dist/tex/latex/hyperref/hpdftex.def
|
||||
File: hpdftex.def 2020-05-15 v7.00e Hyperref driver for pdfTeX
|
||||
(/usr/share/texmf-dist/tex/latex/atveryend/atveryend.sty
|
||||
Package: atveryend 2019-12-11 v1.11 Hooks at the very end of document (HO)
|
||||
Package atveryend Info: \enddocument detected (standard20110627).
|
||||
)
|
||||
\Fld@listcount=\count276
|
||||
\c@bookmark@seq@number=\count277
|
||||
(/usr/share/texmf-dist/tex/latex/rerunfilecheck/rerunfilecheck.sty
|
||||
Package: rerunfilecheck 2019/12/05 v1.9 Rerun checks for auxiliary files (HO)
|
||||
(/usr/share/texmf-dist/tex/generic/uniquecounter/uniquecounter.sty
|
||||
Package: uniquecounter 2019/12/15 v1.4 Provide unlimited unique counter (HO)
|
||||
)
|
||||
Package uniquecounter Info: New unique counter `rerunfilecheck' on input line 286.
|
||||
)
|
||||
\Hy@SectionHShift=\skip52
|
||||
) (/usr/share/texmf-dist/tex/latex/pgf/frontendlayer/tikz.sty (/usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgf.sty (/usr/share/texmf-dist/tex/latex/pgf/utilities/pgfrcs.sty (/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-common.tex
|
||||
\pgfutil@everybye=\toks25
|
||||
\pgfutil@tempdima=\dimen163
|
||||
\pgfutil@tempdimb=\dimen164
|
||||
(/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-common-lists.tex)) (/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfutil-latex.def
|
||||
\pgfutil@abb=\box49
|
||||
(/usr/share/texmf-dist/tex/latex/ms/everyshi.sty
|
||||
Package: everyshi 2001/05/15 v3.00 EveryShipout Package (MS)
|
||||
)) (/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfrcs.code.tex (/usr/share/texmf-dist/tex/generic/pgf/pgf.revision.tex)
|
||||
Package: pgfrcs 2020/01/08 v3.1.5b (3.1.5b)
|
||||
))
|
||||
Package: pgf 2020/01/08 v3.1.5b (3.1.5b)
|
||||
(/usr/share/texmf-dist/tex/latex/pgf/basiclayer/pgfcore.sty (/usr/share/texmf-dist/tex/latex/pgf/systemlayer/pgfsys.sty (/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys.code.tex
|
||||
Package: pgfsys 2020/01/08 v3.1.5b (3.1.5b)
|
||||
(/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeys.code.tex
|
||||
\pgfkeys@pathtoks=\toks26
|
||||
\pgfkeys@temptoks=\toks27
|
||||
(/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeysfiltered.code.tex
|
||||
\pgfkeys@tmptoks=\toks28
|
||||
))
|
||||
\pgf@x=\dimen165
|
||||
\pgf@y=\dimen166
|
||||
\pgf@xa=\dimen167
|
||||
\pgf@ya=\dimen168
|
||||
\pgf@xb=\dimen169
|
||||
\pgf@yb=\dimen170
|
||||
\pgf@xc=\dimen171
|
||||
\pgf@yc=\dimen172
|
||||
\pgf@xd=\dimen173
|
||||
\pgf@yd=\dimen174
|
||||
\w@pgf@writea=\write3
|
||||
\r@pgf@reada=\read3
|
||||
\c@pgf@counta=\count278
|
||||
\c@pgf@countb=\count279
|
||||
\c@pgf@countc=\count280
|
||||
\c@pgf@countd=\count281
|
||||
\t@pgf@toka=\toks29
|
||||
\t@pgf@tokb=\toks30
|
||||
\t@pgf@tokc=\toks31
|
||||
\pgf@sys@id@count=\count282
|
||||
(/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgf.cfg
|
||||
File: pgf.cfg 2020/01/08 v3.1.5b (3.1.5b)
|
||||
)
|
||||
Driver file for pgf: pgfsys-pdftex.def
|
||||
(/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys-pdftex.def
|
||||
File: pgfsys-pdftex.def 2020/01/08 v3.1.5b (3.1.5b)
|
||||
(/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsys-common-pdf.def
|
||||
File: pgfsys-common-pdf.def 2020/01/08 v3.1.5b (3.1.5b)
|
||||
))) (/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsyssoftpath.code.tex
|
||||
File: pgfsyssoftpath.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
\pgfsyssoftpath@smallbuffer@items=\count283
|
||||
\pgfsyssoftpath@bigbuffer@items=\count284
|
||||
) (/usr/share/texmf-dist/tex/generic/pgf/systemlayer/pgfsysprotocol.code.tex
|
||||
File: pgfsysprotocol.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
)) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcore.code.tex
|
||||
Package: pgfcore 2020/01/08 v3.1.5b (3.1.5b)
|
||||
(/usr/share/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathcalc.code.tex (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathutil.code.tex) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathparser.code.tex
|
||||
\pgfmath@dimen=\dimen175
|
||||
\pgfmath@count=\count285
|
||||
\pgfmath@box=\box50
|
||||
\pgfmath@toks=\toks32
|
||||
\pgfmath@stack@operand=\toks33
|
||||
\pgfmath@stack@operation=\toks34
|
||||
) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.code.tex (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.basic.code.tex) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.trigonometric.code.tex) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.random.code.tex) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.comparison.code.tex) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.base.code.tex) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.round.code.tex) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.misc.code.tex) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.integerarithmetics.code.tex))) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmathfloat.code.tex
|
||||
\c@pgfmathroundto@lastzeros=\count286
|
||||
)) (/usr/share/texmf-dist/tex/generic/pgf/math/pgfint.code.tex) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepoints.code.tex
|
||||
File: pgfcorepoints.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
\pgf@picminx=\dimen176
|
||||
\pgf@picmaxx=\dimen177
|
||||
\pgf@picminy=\dimen178
|
||||
\pgf@picmaxy=\dimen179
|
||||
\pgf@pathminx=\dimen180
|
||||
\pgf@pathmaxx=\dimen181
|
||||
\pgf@pathminy=\dimen182
|
||||
\pgf@pathmaxy=\dimen183
|
||||
\pgf@xx=\dimen184
|
||||
\pgf@xy=\dimen185
|
||||
\pgf@yx=\dimen186
|
||||
\pgf@yy=\dimen187
|
||||
\pgf@zx=\dimen188
|
||||
\pgf@zy=\dimen189
|
||||
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathconstruct.code.tex
|
||||
File: pgfcorepathconstruct.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
\pgf@path@lastx=\dimen190
|
||||
\pgf@path@lasty=\dimen191
|
||||
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathusage.code.tex
|
||||
File: pgfcorepathusage.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
\pgf@shorten@end@additional=\dimen192
|
||||
\pgf@shorten@start@additional=\dimen193
|
||||
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorescopes.code.tex
|
||||
File: pgfcorescopes.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
\pgfpic=\box51
|
||||
\pgf@hbox=\box52
|
||||
\pgf@layerbox@main=\box53
|
||||
\pgf@picture@serial@count=\count287
|
||||
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoregraphicstate.code.tex
|
||||
File: pgfcoregraphicstate.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
\pgflinewidth=\dimen194
|
||||
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoretransformations.code.tex
|
||||
File: pgfcoretransformations.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
\pgf@pt@x=\dimen195
|
||||
\pgf@pt@y=\dimen196
|
||||
\pgf@pt@temp=\dimen197
|
||||
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorequick.code.tex
|
||||
File: pgfcorequick.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreobjects.code.tex
|
||||
File: pgfcoreobjects.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathprocessing.code.tex
|
||||
File: pgfcorepathprocessing.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorearrows.code.tex
|
||||
File: pgfcorearrows.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
\pgfarrowsep=\dimen198
|
||||
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreshade.code.tex
|
||||
File: pgfcoreshade.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
\pgf@max=\dimen199
|
||||
\pgf@sys@shading@range@num=\count288
|
||||
\pgf@shadingcount=\count289
|
||||
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreimage.code.tex
|
||||
File: pgfcoreimage.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
(/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreexternal.code.tex
|
||||
File: pgfcoreexternal.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
\pgfexternal@startupbox=\box54
|
||||
)) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorelayers.code.tex
|
||||
File: pgfcorelayers.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcoretransparency.code.tex
|
||||
File: pgfcoretransparency.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepatterns.code.tex
|
||||
File: pgfcorepatterns.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
) (/usr/share/texmf-dist/tex/generic/pgf/basiclayer/pgfcorerdf.code.tex
|
||||
File: pgfcorerdf.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
))) (/usr/share/texmf-dist/tex/generic/pgf/modules/pgfmoduleshapes.code.tex
|
||||
File: pgfmoduleshapes.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
\pgfnodeparttextbox=\box55
|
||||
) (/usr/share/texmf-dist/tex/generic/pgf/modules/pgfmoduleplot.code.tex
|
||||
File: pgfmoduleplot.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
) (/usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-0-65.sty
|
||||
Package: pgfcomp-version-0-65 2020/01/08 v3.1.5b (3.1.5b)
|
||||
\pgf@nodesepstart=\dimen256
|
||||
\pgf@nodesepend=\dimen257
|
||||
) (/usr/share/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-1-18.sty
|
||||
Package: pgfcomp-version-1-18 2020/01/08 v3.1.5b (3.1.5b)
|
||||
)) (/usr/share/texmf-dist/tex/latex/pgf/utilities/pgffor.sty (/usr/share/texmf-dist/tex/latex/pgf/utilities/pgfkeys.sty (/usr/share/texmf-dist/tex/generic/pgf/utilities/pgfkeys.code.tex)) (/usr/share/texmf-dist/tex/latex/pgf/math/pgfmath.sty (/usr/share/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex)) (/usr/share/texmf-dist/tex/generic/pgf/utilities/pgffor.code.tex
|
||||
Package: pgffor 2020/01/08 v3.1.5b (3.1.5b)
|
||||
(/usr/share/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex)
|
||||
\pgffor@iter=\dimen258
|
||||
\pgffor@skip=\dimen259
|
||||
\pgffor@stack=\toks35
|
||||
\pgffor@toks=\toks36
|
||||
)) (/usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/tikz.code.tex
|
||||
Package: tikz 2020/01/08 v3.1.5b (3.1.5b)
|
||||
(/usr/share/texmf-dist/tex/generic/pgf/libraries/pgflibraryplothandlers.code.tex
|
||||
File: pgflibraryplothandlers.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
\pgf@plot@mark@count=\count290
|
||||
\pgfplotmarksize=\dimen260
|
||||
)
|
||||
\tikz@lastx=\dimen261
|
||||
\tikz@lasty=\dimen262
|
||||
\tikz@lastxsaved=\dimen263
|
||||
\tikz@lastysaved=\dimen264
|
||||
\tikz@lastmovetox=\dimen265
|
||||
\tikz@lastmovetoy=\dimen266
|
||||
\tikzleveldistance=\dimen267
|
||||
\tikzsiblingdistance=\dimen268
|
||||
\tikz@figbox=\box56
|
||||
\tikz@figbox@bg=\box57
|
||||
\tikz@tempbox=\box58
|
||||
\tikz@tempbox@bg=\box59
|
||||
\tikztreelevel=\count291
|
||||
\tikznumberofchildren=\count292
|
||||
\tikznumberofcurrentchild=\count293
|
||||
\tikz@fig@count=\count294
|
||||
(/usr/share/texmf-dist/tex/generic/pgf/modules/pgfmodulematrix.code.tex
|
||||
File: pgfmodulematrix.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
\pgfmatrixcurrentrow=\count295
|
||||
\pgfmatrixcurrentcolumn=\count296
|
||||
\pgf@matrix@numberofcolumns=\count297
|
||||
)
|
||||
\tikz@expandcount=\count298
|
||||
(/usr/share/texmf-dist/tex/generic/pgf/frontendlayer/tikz/libraries/tikzlibrarytopaths.code.tex
|
||||
File: tikzlibrarytopaths.code.tex 2020/01/08 v3.1.5b (3.1.5b)
|
||||
))) (/usr/local/share/texmf/tex/latex/mdframed/mdframed.sty
|
||||
Package: mdframed 2013/07/01 1.9b: mdframed
|
||||
(/usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse.sty (/usr/share/texmf-dist/tex/latex/l3kernel/expl3.sty
|
||||
Package: expl3 2020-06-03 L3 programming layer (loader)
|
||||
(/usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdfmode.def
|
||||
File: l3backend-pdfmode.def 2020-06-03 L3 backend support: PDF mode
|
||||
\l__kernel_color_stack_int=\count268
|
||||
\l__pdf_internal_box=\box49
|
||||
\l__kernel_color_stack_int=\count299
|
||||
\l__pdf_internal_box=\box60
|
||||
))
|
||||
Package: xparse 2020-05-15 L3 Experimental document command parser
|
||||
(/usr/share/texmf-dist/tex/latex/l3packages/xparse/xparse-generic.tex
|
||||
\l__xparse_current_arg_int=\count300
|
||||
\g__xparse_grabber_int=\count301
|
||||
\l__xparse_m_args_int=\count302
|
||||
\l__xparse_v_nesting_int=\count303
|
||||
)) (/usr/share/texmf-dist/tex/latex/etoolbox/etoolbox.sty
|
||||
Package: etoolbox 2019/09/21 v2.5h e-TeX tools for LaTeX (JAW)
|
||||
\etb@tempcnta=\count304
|
||||
) (/usr/local/share/texmf/tex/latex/zref/zref-abspage.sty
|
||||
Package: zref-abspage 2020-05-28 v2.31 Module abspage for zref (HO)
|
||||
(/usr/local/share/texmf/tex/latex/zref/zref-base.sty
|
||||
Package: zref-base 2020-05-28 v2.31 Module base for zref (HO)
|
||||
Package zref Info: New property list: main on input line 763.
|
||||
Package zref Info: New property: default on input line 764.
|
||||
Package zref Info: New property: page on input line 765.
|
||||
)
|
||||
\c@abspage=\count305
|
||||
Package zref Info: New property: abspage on input line 66.
|
||||
) (/usr/local/share/texmf/tex/latex/needspace/needspace.sty
|
||||
Package: needspace 2010/09/12 v1.3d reserve vertical space
|
||||
)
|
||||
\mdf@templength=\skip53
|
||||
\c@mdf@globalstyle@cnt=\count306
|
||||
\mdf@skipabove@length=\skip54
|
||||
\mdf@skipbelow@length=\skip55
|
||||
\mdf@leftmargin@length=\skip56
|
||||
\mdf@rightmargin@length=\skip57
|
||||
\mdf@innerleftmargin@length=\skip58
|
||||
\mdf@innerrightmargin@length=\skip59
|
||||
\mdf@innertopmargin@length=\skip60
|
||||
\mdf@innerbottommargin@length=\skip61
|
||||
\mdf@splittopskip@length=\skip62
|
||||
\mdf@splitbottomskip@length=\skip63
|
||||
\mdf@outermargin@length=\skip64
|
||||
\mdf@innermargin@length=\skip65
|
||||
\mdf@linewidth@length=\skip66
|
||||
\mdf@innerlinewidth@length=\skip67
|
||||
\mdf@middlelinewidth@length=\skip68
|
||||
\mdf@outerlinewidth@length=\skip69
|
||||
\mdf@roundcorner@length=\skip70
|
||||
\mdf@footenotedistance@length=\skip71
|
||||
\mdf@userdefinedwidth@length=\skip72
|
||||
\mdf@needspace@length=\skip73
|
||||
\mdf@frametitleaboveskip@length=\skip74
|
||||
\mdf@frametitlebelowskip@length=\skip75
|
||||
\mdf@frametitlerulewidth@length=\skip76
|
||||
\mdf@frametitleleftmargin@length=\skip77
|
||||
\mdf@frametitlerightmargin@length=\skip78
|
||||
\mdf@shadowsize@length=\skip79
|
||||
\mdf@extratopheight@length=\skip80
|
||||
\mdf@subtitleabovelinewidth@length=\skip81
|
||||
\mdf@subtitlebelowlinewidth@length=\skip82
|
||||
\mdf@subtitleaboveskip@length=\skip83
|
||||
\mdf@subtitlebelowskip@length=\skip84
|
||||
\mdf@subtitleinneraboveskip@length=\skip85
|
||||
\mdf@subtitleinnerbelowskip@length=\skip86
|
||||
\mdf@subsubtitleabovelinewidth@length=\skip87
|
||||
\mdf@subsubtitlebelowlinewidth@length=\skip88
|
||||
\mdf@subsubtitleaboveskip@length=\skip89
|
||||
\mdf@subsubtitlebelowskip@length=\skip90
|
||||
\mdf@subsubtitleinneraboveskip@length=\skip91
|
||||
\mdf@subsubtitleinnerbelowskip@length=\skip92
|
||||
(/usr/local/share/texmf/tex/latex/mdframed/md-frame-1.mdf
|
||||
File: md-frame-1.mdf 2013/07/01\ 1.9b: md-frame-1
|
||||
)
|
||||
\mdf@frametitlebox=\box61
|
||||
\mdf@footnotebox=\box62
|
||||
\mdf@splitbox@one=\box63
|
||||
\mdf@splitbox@two=\box64
|
||||
\mdf@splitbox@save=\box65
|
||||
\mdfsplitboxwidth=\skip93
|
||||
\mdfsplitboxtotalwidth=\skip94
|
||||
\mdfsplitboxheight=\skip95
|
||||
\mdfsplitboxdepth=\skip96
|
||||
\mdfsplitboxtotalheight=\skip97
|
||||
\mdfframetitleboxwidth=\skip98
|
||||
\mdfframetitleboxtotalwidth=\skip99
|
||||
\mdfframetitleboxheight=\skip100
|
||||
\mdfframetitleboxdepth=\skip101
|
||||
\mdfframetitleboxtotalheight=\skip102
|
||||
\mdffootnoteboxwidth=\skip103
|
||||
\mdffootnoteboxtotalwidth=\skip104
|
||||
\mdffootnoteboxheight=\skip105
|
||||
\mdffootnoteboxdepth=\skip106
|
||||
\mdffootnoteboxtotalheight=\skip107
|
||||
\mdftotallinewidth=\skip108
|
||||
\mdfboundingboxwidth=\skip109
|
||||
\mdfboundingboxtotalwidth=\skip110
|
||||
\mdfboundingboxheight=\skip111
|
||||
\mdfboundingboxdepth=\skip112
|
||||
\mdfboundingboxtotalheight=\skip113
|
||||
\mdf@freevspace@length=\skip114
|
||||
\mdf@horizontalwidthofbox@length=\skip115
|
||||
\mdf@verticalmarginwhole@length=\skip116
|
||||
\mdf@horizontalspaceofbox=\skip117
|
||||
\mdfsubtitleheight=\skip118
|
||||
\mdfsubsubtitleheight=\skip119
|
||||
\c@mdfcountframes=\count307
|
||||
|
||||
****** mdframed patching \endmdf@trivlist
|
||||
|
||||
****** -- success******
|
||||
|
||||
\mdf@envdepth=\count308
|
||||
\c@mdf@env@i=\count309
|
||||
\c@mdf@env@ii=\count310
|
||||
\c@mdf@zref@counter=\count311
|
||||
Package zref Info: New property: mdf@pagevalue on input line 895.
|
||||
)) (/usr/share/texmf-dist/tex/latex/tools/enumerate.sty
|
||||
Package: enumerate 2015/07/23 v3.00 enumerate extensions (DPC)
|
||||
\@enLab=\toks37
|
||||
) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux)
|
||||
LaTeX Font Info: Checking defaults for OML/cmm/m/it on input line 35.
|
||||
LaTeX Font Info: ... okay on input line 35.
|
||||
LaTeX Font Info: Checking defaults for OMS/cmsy/m/n on input line 35.
|
||||
LaTeX Font Info: ... okay on input line 35.
|
||||
LaTeX Font Info: Checking defaults for OT1/cmr/m/n on input line 35.
|
||||
LaTeX Font Info: ... okay on input line 35.
|
||||
LaTeX Font Info: Checking defaults for T1/cmr/m/n on input line 35.
|
||||
LaTeX Font Info: ... okay on input line 35.
|
||||
LaTeX Font Info: Checking defaults for TS1/cmr/m/n on input line 35.
|
||||
LaTeX Font Info: ... okay on input line 35.
|
||||
LaTeX Font Info: Checking defaults for OMX/cmex/m/n on input line 35.
|
||||
LaTeX Font Info: ... okay on input line 35.
|
||||
LaTeX Font Info: Checking defaults for U/cmr/m/n on input line 35.
|
||||
LaTeX Font Info: ... okay on input line 35.
|
||||
LaTeX Font Info: Checking defaults for OML/cmm/m/it on input line 11.
|
||||
LaTeX Font Info: ... okay on input line 11.
|
||||
LaTeX Font Info: Checking defaults for OMS/cmsy/m/n on input line 11.
|
||||
LaTeX Font Info: ... okay on input line 11.
|
||||
LaTeX Font Info: Checking defaults for OT1/cmr/m/n on input line 11.
|
||||
LaTeX Font Info: ... okay on input line 11.
|
||||
LaTeX Font Info: Checking defaults for T1/cmr/m/n on input line 11.
|
||||
LaTeX Font Info: ... okay on input line 11.
|
||||
LaTeX Font Info: Checking defaults for TS1/cmr/m/n on input line 11.
|
||||
LaTeX Font Info: ... okay on input line 11.
|
||||
LaTeX Font Info: Checking defaults for OMX/cmex/m/n on input line 11.
|
||||
LaTeX Font Info: ... okay on input line 11.
|
||||
LaTeX Font Info: Checking defaults for U/cmr/m/n on input line 11.
|
||||
LaTeX Font Info: ... okay on input line 11.
|
||||
LaTeX Font Info: Checking defaults for PD1/pdf/m/n on input line 11.
|
||||
LaTeX Font Info: ... okay on input line 11.
|
||||
|
||||
*geometry* driver: auto-detecting
|
||||
*geometry* detected driver: pdftex
|
||||
@ -253,49 +641,70 @@ LaTeX Font Info: ... okay on input line 35.
|
||||
|
||||
(/usr/share/texmf-dist/tex/context/base/mkii/supp-pdf.mkii
|
||||
[Loading MPS to PDF converter (version 2006.09.02).]
|
||||
\scratchcounter=\count269
|
||||
\scratchdimen=\dimen159
|
||||
\scratchbox=\box50
|
||||
\nofMPsegments=\count270
|
||||
\nofMParguments=\count271
|
||||
\everyMPshowfont=\toks25
|
||||
\MPscratchCnt=\count272
|
||||
\MPscratchDim=\dimen160
|
||||
\MPnumerator=\count273
|
||||
\makeMPintoPDFobject=\count274
|
||||
\everyMPtoPDFconversion=\toks26
|
||||
\scratchcounter=\count312
|
||||
\scratchdimen=\dimen269
|
||||
\scratchbox=\box66
|
||||
\nofMPsegments=\count313
|
||||
\nofMParguments=\count314
|
||||
\everyMPshowfont=\toks38
|
||||
\MPscratchCnt=\count315
|
||||
\MPscratchDim=\dimen270
|
||||
\MPnumerator=\count316
|
||||
\makeMPintoPDFobject=\count317
|
||||
\everyMPtoPDFconversion=\toks39
|
||||
) (/usr/share/texmf-dist/tex/latex/epstopdf-pkg/epstopdf-base.sty
|
||||
Package: epstopdf-base 2020-01-24 v2.11 Base part for package epstopdf
|
||||
Package epstopdf-base Info: Redefining graphics rule for `.eps' on input line 485.
|
||||
(/usr/share/texmf-dist/tex/latex/latexconfig/epstopdf-sys.cfg
|
||||
File: epstopdf-sys.cfg 2010/07/13 v1.3 Configuration of (r)epstopdf for TeX Live
|
||||
))
|
||||
\c@lstlisting=\count275
|
||||
LaTeX Font Info: Trying to load font information for U+msa on input line 38.
|
||||
\c@lstlisting=\count318
|
||||
\AtBeginShipoutBox=\box67
|
||||
Package hyperref Info: Link coloring OFF on input line 11.
|
||||
(/usr/share/texmf-dist/tex/latex/hyperref/nameref.sty
|
||||
Package: nameref 2019/09/16 v2.46 Cross-referencing by name of section
|
||||
(/usr/share/texmf-dist/tex/latex/refcount/refcount.sty
|
||||
Package: refcount 2019/12/15 v3.6 Data extraction from label references (HO)
|
||||
) (/usr/share/texmf-dist/tex/generic/gettitlestring/gettitlestring.sty
|
||||
Package: gettitlestring 2019/12/15 v1.6 Cleanup title references (HO)
|
||||
)
|
||||
\c@section@level=\count319
|
||||
)
|
||||
LaTeX Info: Redefining \ref on input line 11.
|
||||
LaTeX Info: Redefining \pageref on input line 11.
|
||||
LaTeX Info: Redefining \nameref on input line 11.
|
||||
(/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.out)
|
||||
\@outlinefile=\write4
|
||||
ABD: EveryShipout initializing macros
|
||||
LaTeX Font Info: Trying to load font information for U+msa on input line 15.
|
||||
(/usr/share/texmf-dist/tex/latex/amsfonts/umsa.fd
|
||||
File: umsa.fd 2013/01/14 v3.01 AMS symbols A
|
||||
)
|
||||
LaTeX Font Info: Trying to load font information for U+msb on input line 38.
|
||||
LaTeX Font Info: Trying to load font information for U+msb on input line 15.
|
||||
(/usr/share/texmf-dist/tex/latex/amsfonts/umsb.fd
|
||||
File: umsb.fd 2013/01/14 v3.01 AMS symbols B
|
||||
)
|
||||
LaTeX Font Info: Trying to load font information for U+rsfs on input line 38.
|
||||
LaTeX Font Info: Trying to load font information for U+rsfs on input line 15.
|
||||
(/usr/share/texmf-dist/tex/latex/jknapltx/ursfs.fd
|
||||
File: ursfs.fd 1998/03/24 rsfs font definition file (jk)
|
||||
) [1
|
||||
|
||||
|
||||
{/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map}] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.toc [1
|
||||
{/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map}] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.tocpdfTeX warning (ext4): destination with the same identifier (name{page.1}) has been already used, duplicate ignored
|
||||
<to be read again>
|
||||
\relax
|
||||
l.55 ...Verschlüsselungsverfahren}{14}{chapter.4}
|
||||
% [1
|
||||
|
||||
]
|
||||
LaTeX Font Info: Trying to load font information for T1+cmtt on input line 99.
|
||||
LaTeX Font Info: Trying to load font information for T1+cmtt on input line 101.
|
||||
(/usr/share/texmf-dist/tex/latex/base/t1cmtt.fd
|
||||
File: t1cmtt.fd 2019/12/16 v2.5j Standard LaTeX font definitions
|
||||
) [2])
|
||||
\tf@toc=\write3
|
||||
[3] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex
|
||||
\tf@toc=\write5
|
||||
[3] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Inhalt.tex (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Substitutionsverfahren.tex
|
||||
Kapitel 1.
|
||||
<./images/Skytale.png, id=24, 614.6965pt x 351.3125pt>
|
||||
<./images/Skytale.png, id=564, 614.6965pt x 351.3125pt>
|
||||
File: ./images/Skytale.png Graphic file (type png)
|
||||
<use ./images/Skytale.png>
|
||||
Package pdftex.def Info: ./images/Skytale.png used on input line 6.
|
||||
@ -308,7 +717,7 @@ Underfull \hbox (badness 10000) in paragraph at lines 11--12
|
||||
[4
|
||||
|
||||
</home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Skytale.png>]
|
||||
<./images/Vignère-Verfahren.png, id=35, 444.41896pt x 257.5138pt>
|
||||
<./images/Vignère-Verfahren.png, id=579, 444.41896pt x 257.5138pt>
|
||||
File: ./images/Vignère-Verfahren.png Graphic file (type png)
|
||||
<use ./images/Vignère-Verfahren.png>
|
||||
Package pdftex.def Info: ./images/Vignère-Verfahren.png used on input line 50.
|
||||
@ -320,21 +729,58 @@ Underfull \hbox (badness 10000) in paragraph at lines 47--51
|
||||
|
||||
[5 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Vignère-Verfahren.png (PNG copy)>]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik.tex [6]
|
||||
Kapitel 2.
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `math shift' on input line 10.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `subscript' on input line 10.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `math shift' on input line 10.
|
||||
|
||||
[7
|
||||
|
||||
] [8]
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 108--109
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 125--126
|
||||
|
||||
[]
|
||||
|
||||
[9]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex [10]
|
||||
[9]
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `math shift' on input line 141.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `\varphi' on input line 141.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `math shift' on input line 141.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `math shift' on input line 154.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `\varphi' on input line 154.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `math shift' on input line 154.
|
||||
|
||||
) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/IT-Sicherheit.tex [10]
|
||||
Kapitel 3.
|
||||
<./images/Abhörung.png, id=63, 158.66173pt x 78.08482pt>
|
||||
<./images/Abhörung.png, id=640, 158.66173pt x 78.08482pt>
|
||||
File: ./images/Abhörung.png Graphic file (type png)
|
||||
<use ./images/Abhörung.png>
|
||||
Package pdftex.def Info: ./images/Abhörung.png used on input line 6.
|
||||
(pdftex.def) Requested size: 158.66132pt x 78.08463pt.
|
||||
<./images/Übertragungsmanipulation.png, id=64, 160.3231pt x 72.27pt>
|
||||
<./images/Übertragungsmanipulation.png, id=641, 160.3231pt x 72.27pt>
|
||||
File: ./images/Übertragungsmanipulation.png Graphic file (type png)
|
||||
<use ./images/Übertragungsmanipulation.png>
|
||||
Package pdftex.def Info: ./images/Übertragungsmanipulation.png used on input line 23.
|
||||
@ -342,17 +788,17 @@ Package pdftex.def Info: ./images/Übertragungsmanipulation.png used on input l
|
||||
[11
|
||||
|
||||
</home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Abhörung.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Übertragungsmanipulation.png (PNG copy)>]
|
||||
<./images/Authenzitätsstörung_0.png, id=69, 156.16966pt x 61.47104pt>
|
||||
<./images/Authenzitätsstörung_0.png, id=647, 156.16966pt x 61.47104pt>
|
||||
File: ./images/Authenzitätsstörung_0.png Graphic file (type png)
|
||||
<use ./images/Authenzitätsstörung_0.png>
|
||||
Package pdftex.def Info: ./images/Authenzitätsstörung_0.png used on input line 30.
|
||||
(pdftex.def) Requested size: 156.16927pt x 61.47087pt.
|
||||
<./images/Authenzitätsstörung_1.png, id=70, 147.03207pt x 62.30173pt>
|
||||
<./images/Authenzitätsstörung_1.png, id=648, 147.03207pt x 62.30173pt>
|
||||
File: ./images/Authenzitätsstörung_1.png Graphic file (type png)
|
||||
<use ./images/Authenzitätsstörung_1.png>
|
||||
Package pdftex.def Info: ./images/Authenzitätsstörung_1.png used on input line 31.
|
||||
(pdftex.def) Requested size: 147.03171pt x 62.30157pt.
|
||||
<./images/Authenzitätsstörung_2.png, id=71, 153.67758pt x 72.27pt>
|
||||
<./images/Authenzitätsstörung_2.png, id=649, 153.67758pt x 72.27pt>
|
||||
File: ./images/Authenzitätsstörung_2.png Graphic file (type png)
|
||||
<use ./images/Authenzitätsstörung_2.png>
|
||||
Package pdftex.def Info: ./images/Authenzitätsstörung_2.png used on input line 32.
|
||||
@ -382,6 +828,22 @@ Underfull \hbox (badness 10000) in paragraph at lines 50--53
|
||||
[]
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `math shift' on input line 53.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `math shift' on input line 53.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `math shift' on input line 61.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `math shift' on input line 61.
|
||||
|
||||
|
||||
Overfull \hbox (30.70032pt too wide) in paragraph at lines 69--70
|
||||
[]\T1/cmr/m/n/10.95 Es soll kei-nen An-griff auf die Klar-text-nach-richt $\OML/cmm/m/it/10.95 m$ \T1/cmr/m/n/10.95 ge-ben, der durch-schnitt-lich we-ni-ger als $[] [][]\OML/cmm/m/it/10.95 ; [][]$
|
||||
[]
|
||||
@ -393,7 +855,7 @@ Overfull \hbox (29.27113pt too wide) in paragraph at lines 8--10
|
||||
\T1/cmr/m/n/10.95 Bei man-chen Ver-fah-ren kön-nen bei der Be-rech-nung des $\OML/cmm/m/it/10.95 i$\T1/cmr/m/n/10.95 -ten Ge-heim-text-zei-chens $\OML/cmm/m/it/10.95 c[] \OT1/cmr/m/n/10.95 = \OML/cmm/m/it/10.95 E[]\OT1/cmr/m/n/10.95 (\OML/cmm/m/it/10.95 k; \OT1/cmr/m/n/10.95 (\OML/cmm/m/it/10.95 m[]; m[]; :::; m[]\OT1/cmr/m/n/10.95 ))$
|
||||
[]
|
||||
|
||||
<./images/Stromverschlüsselung.png, id=88, 472.66241pt x 229.27034pt>
|
||||
<./images/Stromverschlüsselung.png, id=682, 472.66241pt x 229.27034pt>
|
||||
File: ./images/Stromverschlüsselung.png Graphic file (type png)
|
||||
<use ./images/Stromverschlüsselung.png>
|
||||
Package pdftex.def Info: ./images/Stromverschlüsselung.png used on input line 11.
|
||||
@ -403,7 +865,7 @@ Overfull \hbox (5.96439pt too wide) in paragraph at lines 11--12
|
||||
[][]
|
||||
[]
|
||||
|
||||
<./images/synchrone Stromverschlüsselung.png, id=89, 469.33966pt x 215.97931pt>
|
||||
<./images/synchrone Stromverschlüsselung.png, id=684, 469.33966pt x 215.97931pt>
|
||||
File: ./images/synchrone Stromverschlüsselung.png Graphic file (type png)
|
||||
<use ./images/synchrone Stromverschlüsselung.png>
|
||||
Package pdftex.def Info: ./images/synchrone Stromverschlüsselung.png used on input line 21.
|
||||
@ -416,7 +878,7 @@ Overfull \hbox (2.64163pt too wide) in paragraph at lines 21--22
|
||||
[17
|
||||
|
||||
</home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/Stromverschlüsselung.png (PNG copy)>]
|
||||
<./images/zustandsabhängige Stromverschlüsselung.png, id=93, 482.63069pt x 217.64069pt>
|
||||
<./images/zustandsabhängige Stromverschlüsselung.png, id=689, 482.63069pt x 217.64069pt>
|
||||
File: ./images/zustandsabhängige Stromverschlüsselung.png Graphic file (type png)
|
||||
<use ./images/zustandsabhängige Stromverschlüsselung.png>
|
||||
Package pdftex.def Info: ./images/zustandsabhängige Stromverschlüsselung.png used on input line 38.
|
||||
@ -427,7 +889,7 @@ Overfull \hbox (15.93263pt too wide) in paragraph at lines 38--39
|
||||
[]
|
||||
|
||||
[18 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone Stromverschlüsselung.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/zustandsabhängige Stromverschlüsselung.png (PNG copy)>]
|
||||
<./images/additive zustandsabhängige Stromverschlüsselung.png, id=98, 471.00104pt x 219.30206pt>
|
||||
<./images/additive zustandsabhängige Stromverschlüsselung.png, id=696, 471.00104pt x 219.30206pt>
|
||||
File: ./images/additive zustandsabhängige Stromverschlüsselung.png Graphic file (type png)
|
||||
<use ./images/additive zustandsabhängige Stromverschlüsselung.png>
|
||||
Package pdftex.def Info: ./images/additive zustandsabhängige Stromverschlüsselung.png used on input line 46.
|
||||
@ -437,7 +899,7 @@ Overfull \hbox (4.30301pt too wide) in paragraph at lines 46--47
|
||||
[][]
|
||||
[]
|
||||
|
||||
<./images/synchrone additive Stromverschlüsselung.png, id=99, 471.83173pt x 218.47137pt>
|
||||
<./images/synchrone additive Stromverschlüsselung.png, id=697, 471.83173pt x 218.47137pt>
|
||||
File: ./images/synchrone additive Stromverschlüsselung.png Graphic file (type png)
|
||||
<use ./images/synchrone additive Stromverschlüsselung.png>
|
||||
Package pdftex.def Info: ./images/synchrone additive Stromverschlüsselung.png used on input line 54.
|
||||
@ -449,7 +911,7 @@ Overfull \hbox (5.1337pt too wide) in paragraph at lines 54--55
|
||||
|
||||
[19 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/additive zustandsabhängige Stromverschlüsselung.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/synchrone additive Stromverschlüsselung.png (PNG copy)>]
|
||||
Missing character: There is no k in font rsfs10!
|
||||
<./images/Schlüsselstromgenerator mit Nonce.png, id=103, 473.4931pt x 215.97931pt>
|
||||
<./images/Schlüsselstromgenerator mit Nonce.png, id=707, 473.4931pt x 215.97931pt>
|
||||
File: ./images/Schlüsselstromgenerator mit Nonce.png Graphic file (type png)
|
||||
<use ./images/Schlüsselstromgenerator mit Nonce.png>
|
||||
Package pdftex.def Info: ./images/Schlüsselstromgenerator mit Nonce.png used on input line 82.
|
||||
@ -474,23 +936,23 @@ Underfull \hbox (badness 10000) in paragraph at lines 4--6
|
||||
[23
|
||||
|
||||
]
|
||||
<./images/ECB.png, id=118, 466.84758pt x 215.97931pt>
|
||||
<./images/ECB.png, id=727, 466.84758pt x 215.97931pt>
|
||||
File: ./images/ECB.png Graphic file (type png)
|
||||
<use ./images/ECB.png>
|
||||
Package pdftex.def Info: ./images/ECB.png used on input line 34.
|
||||
(pdftex.def) Requested size: 466.84644pt x 215.97878pt.
|
||||
<./images/ECB_Nonce.png, id=119, 471.00104pt x 221.79414pt>
|
||||
<./images/ECB_Nonce.png, id=728, 471.00104pt x 221.79414pt>
|
||||
File: ./images/ECB_Nonce.png Graphic file (type png)
|
||||
<use ./images/ECB_Nonce.png>
|
||||
Package pdftex.def Info: ./images/ECB_Nonce.png used on input line 36.
|
||||
(pdftex.def) Requested size: 470.99988pt x 221.7936pt.
|
||||
<./images/CBC_enc.png, id=120, 474.32379pt x 219.30206pt>
|
||||
<./images/CBC_enc.png, id=729, 474.32379pt x 219.30206pt>
|
||||
File: ./images/CBC_enc.png Graphic file (type png)
|
||||
<use ./images/CBC_enc.png>
|
||||
Package pdftex.def Info: ./images/CBC_enc.png used on input line 45.
|
||||
(pdftex.def) Requested size: 474.32263pt x 219.30151pt.
|
||||
[24 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/ECB_Nonce.png (PNG copy)>]
|
||||
<./images/CBC_dec.png, id=125, 469.33966pt x 214.31793pt>
|
||||
<./images/CBC_dec.png, id=735, 469.33966pt x 214.31793pt>
|
||||
File: ./images/CBC_dec.png Graphic file (type png)
|
||||
<use ./images/CBC_dec.png>
|
||||
Package pdftex.def Info: ./images/CBC_dec.png used on input line 51.
|
||||
@ -505,7 +967,7 @@ Overfull \hbox (61.4574pt too wide) in paragraph at lines 68--70
|
||||
\T1/cmr/m/n/10.95 Wenn die Län-ge der Nach-richt $\OML/cmm/m/it/10.95 m$ \T1/cmr/m/n/10.95 ein Viel-fa-ches des Block-län-ge $\OML/cmm/m/it/10.95 l$ \T1/cmr/m/n/10.95 ist wird das nor-ma-le CBC-Verschlüsselungsverfahren
|
||||
[]
|
||||
|
||||
<./images/CTR.png, id=129, 515.02759pt x 240.0693pt>
|
||||
<./images/CTR.png, id=744, 515.02759pt x 240.0693pt>
|
||||
File: ./images/CTR.png Graphic file (type png)
|
||||
<use ./images/CTR.png>
|
||||
Package pdftex.def Info: ./images/CTR.png used on input line 85.
|
||||
@ -515,7 +977,7 @@ Overfull \hbox (31.32945pt too wide) in paragraph at lines 84--86
|
||||
[]
|
||||
[]
|
||||
|
||||
<./images/OFB.png, id=130, 516.42938pt x 235.63031pt>
|
||||
<./images/OFB.png, id=746, 516.42938pt x 235.63031pt>
|
||||
File: ./images/OFB.png Graphic file (type png)
|
||||
<use ./images/OFB.png>
|
||||
Package pdftex.def Info: ./images/OFB.png used on input line 90.
|
||||
@ -531,7 +993,7 @@ Underfull \hbox (badness 10000) in paragraph at lines 88--91
|
||||
[]
|
||||
|
||||
[26 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CTR.png (PNG copy)>]
|
||||
<./images/CFB.png, id=134, 518.6878pt x 239.39438pt>
|
||||
<./images/CFB.png, id=754, 518.6878pt x 239.39438pt>
|
||||
File: ./images/CFB.png Graphic file (type png)
|
||||
<use ./images/CFB.png>
|
||||
Package pdftex.def Info: ./images/CFB.png used on input line 101.
|
||||
@ -542,27 +1004,24 @@ Overfull \hbox (34.98967pt too wide) in paragraph at lines 98--102
|
||||
[]
|
||||
|
||||
[27 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/OFB.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/CFB.png (PNG copy)>]
|
||||
<./images/3DES.png, id=138, 274.77657pt x 331.99031pt>
|
||||
<./images/3DES.png, id=763, 274.77657pt x 331.99031pt>
|
||||
File: ./images/3DES.png Graphic file (type png)
|
||||
<use ./images/3DES.png>
|
||||
Package pdftex.def Info: ./images/3DES.png used on input line 144.
|
||||
(pdftex.def) Requested size: 219.82153pt x 265.59259pt.
|
||||
[28]
|
||||
<./images/meet-in-the-middle.png, id=143, 260.47313pt x 247.67531pt>
|
||||
<./images/meet-in-the-middle.png, id=770, 260.47313pt x 247.67531pt>
|
||||
File: ./images/meet-in-the-middle.png Graphic file (type png)
|
||||
<use ./images/meet-in-the-middle.png>
|
||||
Package pdftex.def Info: ./images/meet-in-the-middle.png used on input line 150.
|
||||
(pdftex.def) Requested size: 260.47249pt x 247.6747pt.
|
||||
[29 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/3DES.png (PNG copy)> </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/meet-in-the-middle.png (PNG copy)>]
|
||||
<./images/AES S-Box.png, id=147, 424.58624pt x 396.48125pt>
|
||||
<./images/AES S-Box.png, id=775, 424.58624pt x 396.48125pt>
|
||||
File: ./images/AES S-Box.png Graphic file (type png)
|
||||
<use ./images/AES S-Box.png>
|
||||
Package pdftex.def Info: ./images/AES S-Box.png used on input line 196.
|
||||
(pdftex.def) Requested size: 339.66945pt x 317.18542pt.
|
||||
[30 </home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/./images/AES S-Box.png (PNG copy)>]
|
||||
|
||||
LaTeX Warning: Reference `endliche Körper' on page 31 undefined on input line 222.
|
||||
|
||||
LaTeX Font Info: Font shape `T1/cmtt/bx/n' in size <10.95> not available
|
||||
(Font) Font shape `T1/cmtt/m/n' tried instead on input line 245.
|
||||
) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Hashfunktionen.tex [31]
|
||||
@ -574,26 +1033,97 @@ LaTeX Font Info: Font shape `T1/cmtt/bx/n' in size <14.4> not available
|
||||
|
||||
] [33] [34]) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/MAC-Verfahren.tex [35]
|
||||
Kapitel 8.
|
||||
) [36
|
||||
) (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/chapters/Modulare Arithmetik - Teil 2.tex [36
|
||||
|
||||
] [37] (/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux)
|
||||
] [37]
|
||||
Kapitel 9.
|
||||
|
||||
LaTeX Warning: There were undefined references.
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 21--24
|
||||
|
||||
[]
|
||||
|
||||
Package mdframed Info: Not enough space on this page on input line 37.
|
||||
[38
|
||||
|
||||
]
|
||||
Package mdframed Info: Not enough space on this page on input line 37.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `math shift' on input line 48.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `subscript' on input line 48.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `superscript' on input line 48.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `superscript' on input line 48.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `math shift' on input line 48.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `math shift' on input line 71.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `subscript' on input line 71.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `superscript' on input line 71.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `superscript' on input line 71.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `math shift' on input line 71.
|
||||
|
||||
[39]
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `math shift' on input line 127.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `subscript' on input line 127.
|
||||
|
||||
|
||||
Package hyperref Warning: Token not allowed in a PDF string (PDFDocEncoding):
|
||||
(hyperref) removing `math shift' on input line 127.
|
||||
|
||||
)) [40]
|
||||
Package atveryend Info: Empty hook `BeforeClearDocument' on input line 24.
|
||||
Package atveryend Info: Empty hook `AfterLastShipout' on input line 24.
|
||||
(/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.aux)
|
||||
Package atveryend Info: Executing hook `AtVeryEndDocument' on input line 24.
|
||||
Package atveryend Info: Executing hook `AtEndAfterFileList' on input line 24.
|
||||
Package rerunfilecheck Info: File `Zusammenfassung_DC.out' has not changed.
|
||||
(rerunfilecheck) Checksum: 705A165D003F9245E6172CC1858C04F3;8028.
|
||||
Package atveryend Info: Empty hook `AtVeryVeryEnd' on input line 24.
|
||||
)
|
||||
Here is how much of TeX's memory you used:
|
||||
6325 strings out of 480478
|
||||
88970 string characters out of 5905959
|
||||
355969 words of memory out of 5000000
|
||||
22191 multiletter control sequences out of 15000+600000
|
||||
557083 words of font info for 90 fonts, out of 8000000 for 9000
|
||||
21610 strings out of 480478
|
||||
396029 string characters out of 5905959
|
||||
677108 words of memory out of 5000000
|
||||
36918 multiletter control sequences out of 15000+600000
|
||||
558315 words of font info for 94 fonts, out of 8000000 for 9000
|
||||
1141 hyphenation exceptions out of 8191
|
||||
30i,14n,37p,377b,255s stack positions out of 5000i,500n,10000p,200000b,80000s
|
||||
{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc}{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmex10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msam10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msbm10.pfb></usr/share/texmf-dist/fonts/type1/public/rsfs/rsfs10.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1200.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1440.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2074.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2488.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1200.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1728.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfti1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sftt1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sftt1440.pfb>
|
||||
Output written on "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" (38 pages, 2637795 bytes).
|
||||
63i,14n,80p,1043b,1062s stack positions out of 5000i,500n,10000p,200000b,80000s
|
||||
{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-t1.enc}{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.enc}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmex10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi7.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy8.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msam10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/symbols/msbm10.pfb></usr/share/texmf-dist/fonts/type1/public/rsfs/rsfs10.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1200.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx1440.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2074.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfbx2488.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1200.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1728.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfti1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sftt1095.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sftt1440.pfb>
|
||||
Output written on "/home/paul/Documents/TH/Datensicherheit (DC)/Zusammenfassung/Zusammenfassung_DC.pdf" (41 pages, 2678272 bytes).
|
||||
PDF statistics:
|
||||
266 PDF objects out of 1000 (max. 8388607)
|
||||
173 compressed objects within 2 object streams
|
||||
0 named destinations out of 1000 (max. 500000)
|
||||
116 words of extra memory for PDF output out of 10000 (max. 10000000)
|
||||
1001 PDF objects out of 1200 (max. 8388607)
|
||||
897 compressed objects within 9 object streams
|
||||
211 named destinations out of 1000 (max. 500000)
|
||||
968 words of extra memory for PDF output out of 10000 (max. 10000000)
|
||||
|
||||
|
105
Zusammenfassung_DC.out
Normal file
105
Zusammenfassung_DC.out
Normal file
@ -0,0 +1,105 @@
|
||||
\BOOKMARK [0][-]{chapter.1}{Substitionsverfahren}{}% 1
|
||||
\BOOKMARK [1][-]{section.1.1}{Skytale}{chapter.1}% 2
|
||||
\BOOKMARK [1][-]{section.1.2}{Monoalphabetische Substitionsverfahren}{chapter.1}% 3
|
||||
\BOOKMARK [2][-]{subsection.1.2.1}{Caesar-Verschl\374sselung}{section.1.2}% 4
|
||||
\BOOKMARK [2][-]{subsection.1.2.2}{H\344ufigkeitsanalyse}{section.1.2}% 5
|
||||
\BOOKMARK [1][-]{section.1.3}{Polyalphabetische Substitutionsverfahren}{chapter.1}% 6
|
||||
\BOOKMARK [2][-]{subsection.1.3.1}{Vign\350re-Verfahren}{section.1.3}% 7
|
||||
\BOOKMARK [2][-]{subsection.1.3.2}{One-Time-Pad}{section.1.3}% 8
|
||||
\BOOKMARK [1][-]{section.1.4}{algebraische Substitionsverfahren}{chapter.1}% 9
|
||||
\BOOKMARK [2][-]{subsection.1.4.1}{Hill-Verfahren}{section.1.4}% 10
|
||||
\BOOKMARK [0][-]{chapter.2}{Modulare Arithmetik}{}% 11
|
||||
\BOOKMARK [1][-]{section.2.1}{Exkurs: Division mit Rest}{chapter.2}% 12
|
||||
\BOOKMARK [1][-]{section.2.2}{Der Ring Zn}{chapter.2}% 13
|
||||
\BOOKMARK [2][-]{subsection.2.2.1}{Addition und Multiplikation}{section.2.2}% 14
|
||||
\BOOKMARK [2][-]{subsection.2.2.2}{Subtraktion}{section.2.2}% 15
|
||||
\BOOKMARK [2][-]{subsection.2.2.3}{Teiler, Vielfache}{section.2.2}% 16
|
||||
\BOOKMARK [2][-]{subsection.2.2.4}{Kongruenz}{section.2.2}% 17
|
||||
\BOOKMARK [2][-]{subsection.2.2.5}{Matrizen}{section.2.2}% 18
|
||||
\BOOKMARK [2][-]{subsection.2.2.6}{Kartesisches Produkt von Ringen}{section.2.2}% 19
|
||||
\BOOKMARK [2][-]{subsection.2.2.7}{Isomorphie von Ringen}{section.2.2}% 20
|
||||
\BOOKMARK [1][-]{section.2.3}{Der erweiterte Euklid'sche Algorithmus}{chapter.2}% 21
|
||||
\BOOKMARK [2][-]{subsection.2.3.1}{Euklid'scher Algorithmus}{section.2.3}% 22
|
||||
\BOOKMARK [2][-]{subsection.2.3.2}{erweiterter Euklid'scher Algorithmus}{section.2.3}% 23
|
||||
\BOOKMARK [1][-]{section.2.4}{Euler'sche -Funktion}{chapter.2}% 24
|
||||
\BOOKMARK [2][-]{subsection.2.4.1}{-Funktion und Primzahlen}{section.2.4}% 25
|
||||
\BOOKMARK [0][-]{chapter.3}{IT-Sicherheit: Gef\344hrdungen und Ma\337nahmen}{}% 26
|
||||
\BOOKMARK [1][-]{section.3.1}{Vertraulichkeit}{chapter.3}% 27
|
||||
\BOOKMARK [2][-]{subsection.3.1.1}{Schutzma\337nahmen: Verschl\374sselungsverfahren}{section.3.1}% 28
|
||||
\BOOKMARK [1][-]{section.3.2}{Integrit\344t}{chapter.3}% 29
|
||||
\BOOKMARK [2][-]{subsection.3.2.1}{Schutzma\337nahme: Hashfunktionen, Whitelists}{section.3.2}% 30
|
||||
\BOOKMARK [1][-]{section.3.3}{Authenzit\344t der Daten}{chapter.3}% 31
|
||||
\BOOKMARK [2][-]{subsection.3.3.1}{Schutzma\337nahme: Signaturen}{section.3.3}% 32
|
||||
\BOOKMARK [2][-]{subsection.3.3.2}{Schutz vor Replay-Angriffen}{section.3.3}% 33
|
||||
\BOOKMARK [1][-]{section.3.4}{Authenzit\344t von Nutzern}{chapter.3}% 34
|
||||
\BOOKMARK [2][-]{subsection.3.4.1}{Schutzma\337nahmen}{section.3.4}% 35
|
||||
\BOOKMARK [1][-]{section.3.5}{Zugriffskontrolle}{chapter.3}% 36
|
||||
\BOOKMARK [2][-]{subsection.3.5.1}{Schutzma\337name: Zugriffskontrollsystem}{section.3.5}% 37
|
||||
\BOOKMARK [1][-]{section.3.6}{Nichtabstreitbarkeit, Verbindlichkeit}{chapter.3}% 38
|
||||
\BOOKMARK [2][-]{subsection.3.6.1}{Schutzma\337name: Signaturen und PKI}{section.3.6}% 39
|
||||
\BOOKMARK [1][-]{section.3.7}{Verf\374gbarkeit}{chapter.3}% 40
|
||||
\BOOKMARK [2][-]{subsection.3.7.1}{Schutzma\337nahmen}{section.3.7}% 41
|
||||
\BOOKMARK [1][-]{section.3.8}{Anonymit\344t}{chapter.3}% 42
|
||||
\BOOKMARK [0][-]{chapter.4}{Verschl\374sselungsverfahren}{}% 43
|
||||
\BOOKMARK [1][-]{section.4.1}{Das Kerckhoffs'sche Prinzip}{chapter.4}% 44
|
||||
\BOOKMARK [1][-]{section.4.2}{Mathematische Modelierung von Verschl\374sselungsverfahren}{chapter.4}% 45
|
||||
\BOOKMARK [1][-]{section.4.3}{Schl\374sselaustausch}{chapter.4}% 46
|
||||
\BOOKMARK [1][-]{section.4.4}{Angriffsszenarien}{chapter.4}% 47
|
||||
\BOOKMARK [2][-]{subsection.4.4.1}{Ciphertext-only Angriffe}{section.4.4}% 48
|
||||
\BOOKMARK [2][-]{subsection.4.4.2}{Known-plaintext Angriffe}{section.4.4}% 49
|
||||
\BOOKMARK [2][-]{subsection.4.4.3}{Chosen-plaintext Angriffe}{section.4.4}% 50
|
||||
\BOOKMARK [1][-]{section.4.5}{Brute-Force Angriffe}{chapter.4}% 51
|
||||
\BOOKMARK [2][-]{subsection.4.5.1}{Beispiel: Brute-Force Angriff auf k}{section.4.5}% 52
|
||||
\BOOKMARK [2][-]{subsection.4.5.2}{Beispiel: Brute-Force Angriff auf m}{section.4.5}% 53
|
||||
\BOOKMARK [2][-]{subsection.4.5.3}{Anforderungen zum Schutz vor Brute-Force}{section.4.5}% 54
|
||||
\BOOKMARK [1][-]{section.4.6}{W\366rterbuchangriffe}{chapter.4}% 55
|
||||
\BOOKMARK [2][-]{subsection.4.6.1}{Schutz vor W\366rterbuchangriffen}{section.4.6}% 56
|
||||
\BOOKMARK [0][-]{chapter.5}{Stromverschl\374sselungsverfahren}{}% 57
|
||||
\BOOKMARK [1][-]{section.5.1}{Synchrone Stromverschl\374sselungsverfahren}{chapter.5}% 58
|
||||
\BOOKMARK [1][-]{section.5.2}{Zustandsabh\344ngige Stromverschl\374sselungsverfahren}{chapter.5}% 59
|
||||
\BOOKMARK [2][-]{subsection.5.2.1}{Additive zustandsabh\344ngige Stromverschl\374sselungsverfahren}{section.5.2}% 60
|
||||
\BOOKMARK [1][-]{section.5.3}{Schl\374sselstrom vs. One-Time-Pad}{chapter.5}% 61
|
||||
\BOOKMARK [1][-]{section.5.4}{Nonces zur Initialisierung eines Schl\374sselstromgenerators}{chapter.5}% 62
|
||||
\BOOKMARK [1][-]{section.5.5}{ChaCha20}{chapter.5}% 63
|
||||
\BOOKMARK [1][-]{section.5.6}{Cipher-Instanzen: Verschl\374sselungsalgorithmen in Java-Laufzeitumgebungen}{chapter.5}% 64
|
||||
\BOOKMARK [0][-]{chapter.6}{Blockverschl\374sselungsverfahren}{}% 65
|
||||
\BOOKMARK [1][-]{section.6.1}{Padding-Verfahren}{chapter.6}% 66
|
||||
\BOOKMARK [1][-]{section.6.2}{Betriebsmodi}{chapter.6}% 67
|
||||
\BOOKMARK [2][-]{subsection.6.2.1}{ECB \(Electronic Code Book\)}{section.6.2}% 68
|
||||
\BOOKMARK [2][-]{subsection.6.2.2}{CBC \(Cipher Block Chaining\)}{section.6.2}% 69
|
||||
\BOOKMARK [2][-]{subsection.6.2.3}{CBC-CS \(Chiphertext Stealing for CBC Mode\)}{section.6.2}% 70
|
||||
\BOOKMARK [2][-]{subsection.6.2.4}{CTR \(Counter\)}{section.6.2}% 71
|
||||
\BOOKMARK [2][-]{subsection.6.2.5}{OFB \(Output Feedback\)}{section.6.2}% 72
|
||||
\BOOKMARK [2][-]{subsection.6.2.6}{CFB \(Cipher-Feedback\)}{section.6.2}% 73
|
||||
\BOOKMARK [1][-]{section.6.3}{Konstruktionsprinzipien von Blockverschl\374sselungsverfahren}{chapter.6}% 74
|
||||
\BOOKMARK [1][-]{section.6.4}{DES}{chapter.6}% 75
|
||||
\BOOKMARK [2][-]{subsection.6.4.1}{Triple-DES \(3DES\)}{section.6.4}% 76
|
||||
\BOOKMARK [1][-]{section.6.5}{Meet-in-the-Middle-Angriff}{chapter.6}% 77
|
||||
\BOOKMARK [1][-]{section.6.6}{AES \(Advanced Encryption Standard\)}{chapter.6}% 78
|
||||
\BOOKMARK [2][-]{subsection.6.6.1}{AES-128}{section.6.6}% 79
|
||||
\BOOKMARK [0][-]{chapter.7}{Hashfunktionen}{}% 80
|
||||
\BOOKMARK [1][-]{section.7.1}{schwache Kollisionsfreiheit}{chapter.7}% 81
|
||||
\BOOKMARK [1][-]{section.7.2}{MessageDigest-Instanzen: Hashfunktionen in Java}{chapter.7}% 82
|
||||
\BOOKMARK [1][-]{section.7.3}{Anwendungsbeispiele}{chapter.7}% 83
|
||||
\BOOKMARK [2][-]{subsection.7.3.1}{Anwendungsbeispiel: Passwortdatei}{section.7.3}% 84
|
||||
\BOOKMARK [2][-]{subsection.7.3.2}{Anwendungsbeispiel: Integrit\344tsschutz von Dateien}{section.7.3}% 85
|
||||
\BOOKMARK [2][-]{subsection.7.3.3}{Anwendungsbeispiel: Integrit\344tsschutz bei einem Dateidownload}{section.7.3}% 86
|
||||
\BOOKMARK [1][-]{section.7.4}{Brute-Force-Angriffe auf Hashfunktionen}{chapter.7}% 87
|
||||
\BOOKMARK [2][-]{subsection.7.4.1}{Brute-Force-Urbildsuche}{section.7.4}% 88
|
||||
\BOOKMARK [2][-]{subsection.7.4.2}{Brute-Force-Kollisionssuche}{section.7.4}% 89
|
||||
\BOOKMARK [1][-]{section.7.5}{Konstruktionsverfahren von Hashfunktionen}{chapter.7}% 90
|
||||
\BOOKMARK [0][-]{chapter.8}{MAC-Verfahren}{}% 91
|
||||
\BOOKMARK [1][-]{section.8.1}{HMAC}{chapter.8}% 92
|
||||
\BOOKMARK [1][-]{section.8.2}{CMAC, CBC-MAC}{chapter.8}% 93
|
||||
\BOOKMARK [2][-]{subsection.8.2.1}{CMAC}{section.8.2}% 94
|
||||
\BOOKMARK [2][-]{subsection.8.2.2}{CBC-MAC}{section.8.2}% 95
|
||||
\BOOKMARK [0][-]{chapter.9}{Modulare Arithmetik - Teil 2}{}% 96
|
||||
\BOOKMARK [1][-]{section.9.1}{Potenzen}{chapter.9}% 97
|
||||
\BOOKMARK [2][-]{subsection.9.1.1}{Erzeugnis und Ordnung eines invertierbaren Elements}{section.9.1}% 98
|
||||
\BOOKMARK [2][-]{subsection.9.1.2}{Faktorenzerlegung}{section.9.1}% 99
|
||||
\BOOKMARK [2][-]{subsection.9.1.3}{Kleiner Satz von Fermat}{section.9.1}% 100
|
||||
\BOOKMARK [1][-]{section.9.2}{Exkurs: Einheitengruppe Zpe*}{chapter.9}% 101
|
||||
\BOOKMARK [2][-]{subsection.9.2.1}{Z2e*}{section.9.2}% 102
|
||||
\BOOKMARK [1][-]{section.9.3}{Der chinesische Restsatz}{chapter.9}% 103
|
||||
\BOOKMARK [2][-]{subsection.9.3.1}{Beispiel}{section.9.3}% 104
|
||||
\BOOKMARK [1][-]{section.9.4}{Elemente gerader und ungerader Ordnung in Zn**}{chapter.9}% 105
|
Binary file not shown.
Binary file not shown.
@ -1,32 +1,8 @@
|
||||
\documentclass[a4paper,11pt,oneside]{report}
|
||||
%numbering depth
|
||||
\setcounter{secnumdepth}{5}
|
||||
%page setup
|
||||
\usepackage[a4paper, margin=2cm]{geometry}
|
||||
%encoding
|
||||
\usepackage[utf8]{inputenc}
|
||||
\usepackage[T1]{fontenc}
|
||||
%language
|
||||
\usepackage[ngerman]{babel}
|
||||
%images
|
||||
\usepackage{graphicx}
|
||||
\graphicspath{ {./images/} }
|
||||
%mathsymbols
|
||||
\usepackage{amsmath}
|
||||
\usepackage{amssymb}
|
||||
\usepackage{amsfonts}
|
||||
\usepackage{mathrsfs}
|
||||
%for code highlighting
|
||||
\usepackage{xcolor}
|
||||
\usepackage{listings}
|
||||
%quotation
|
||||
\usepackage[%
|
||||
left = \glqq,%
|
||||
right = \grqq,%
|
||||
leftsub = \glq,%
|
||||
rightsub = \grq%
|
||||
]{dirtytalk}
|
||||
|
||||
%load packages
|
||||
\input{Packages.tex}
|
||||
|
||||
%opening
|
||||
\title{Zusammenfassung DC}
|
||||
\author{Paul Lödige \\ Matrikel: 15405036}
|
||||
@ -42,20 +18,7 @@ rightsub = \grq%
|
||||
\tableofcontents
|
||||
\pagebreak
|
||||
|
||||
\input{chapters/Substitutionsverfahren.tex}
|
||||
|
||||
\input{chapters/Modulare Arithmetik.tex}
|
||||
|
||||
\input{chapters/IT-Sicherheit.tex}
|
||||
|
||||
\input{chapters/Verschlüsselungsverfahren.tex}
|
||||
|
||||
\input{chapters/Stromverschlüsselungsverfahren.tex}
|
||||
|
||||
\input{chapters/Blockverschlüsselungsverfahren.tex}
|
||||
|
||||
\input{chapters/Hashfunktionen.tex}
|
||||
|
||||
\input{chapters/MAC-Verfahren.tex}
|
||||
%load content
|
||||
\input{Inhalt.tex}
|
||||
|
||||
\end{document}
|
||||
|
@ -1,113 +1,125 @@
|
||||
\babel@toc {ngerman}{}
|
||||
\contentsline {chapter}{\numberline {1}Substitionsverfahren}{4}%
|
||||
\contentsline {section}{\numberline {1.1}Skytale}{4}%
|
||||
\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{4}%
|
||||
\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{5}%
|
||||
\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{5}%
|
||||
\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{5}%
|
||||
\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{5}%
|
||||
\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{5}%
|
||||
\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{6}%
|
||||
\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{6}%
|
||||
\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{6}%
|
||||
\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{6}%
|
||||
\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{6}%
|
||||
\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{6}%
|
||||
\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{6}%
|
||||
\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{7}%
|
||||
\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{7}%
|
||||
\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{7}%
|
||||
\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{7}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{7}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{7}%
|
||||
\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{8}%
|
||||
\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{8}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{8}%
|
||||
\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{8}%
|
||||
\contentsline {subsection}{\numberline {2.2.5}Matrizen}{8}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{8}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{8}%
|
||||
\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{8}%
|
||||
\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{9}%
|
||||
\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{9}%
|
||||
\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{9}%
|
||||
\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{10}%
|
||||
\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{10}%
|
||||
\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{11}%
|
||||
\contentsline {section}{\numberline {3.1}Vertraulichkeit}{11}%
|
||||
\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{11}%
|
||||
\contentsline {section}{\numberline {3.2}Integrität}{11}%
|
||||
\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{12}%
|
||||
\contentsline {section}{\numberline {3.3}Authenzität der Daten}{12}%
|
||||
\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{12}%
|
||||
\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{12}%
|
||||
\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{12}%
|
||||
\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{12}%
|
||||
\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{12}%
|
||||
\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{13}%
|
||||
\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{13}%
|
||||
\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{13}%
|
||||
\contentsline {section}{\numberline {3.7}Verfügbarkeit}{13}%
|
||||
\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{13}%
|
||||
\contentsline {section}{\numberline {3.8}Anonymität}{13}%
|
||||
\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{14}%
|
||||
\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{14}%
|
||||
\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{14}%
|
||||
\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{14}%
|
||||
\contentsline {section}{\numberline {4.4}Angriffsszenarien}{15}%
|
||||
\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{15}%
|
||||
\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{15}%
|
||||
\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{15}%
|
||||
\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{15}%
|
||||
\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{15}%
|
||||
\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{15}%
|
||||
\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{15}%
|
||||
\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{16}%
|
||||
\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{16}%
|
||||
\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{16}%
|
||||
\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{17}%
|
||||
\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{17}%
|
||||
\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{18}%
|
||||
\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{19}%
|
||||
\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{19}%
|
||||
\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{20}%
|
||||
\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{20}%
|
||||
\contentsline {section}{\numberline {5.5}ChaCha20}{21}%
|
||||
\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{22}%
|
||||
\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{23}%
|
||||
\contentsline {section}{\numberline {6.1}Padding-Verfahren}{23}%
|
||||
\contentsline {section}{\numberline {6.2}Betriebsmodi}{23}%
|
||||
\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{23}%
|
||||
\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{24}%
|
||||
\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{25}%
|
||||
\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{25}%
|
||||
\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{26}%
|
||||
\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{26}%
|
||||
\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{26}%
|
||||
\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{26}%
|
||||
\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{27}%
|
||||
\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{27}%
|
||||
\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{27}%
|
||||
\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{28}%
|
||||
\contentsline {section}{\numberline {6.4}DES}{28}%
|
||||
\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{28}%
|
||||
\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{29}%
|
||||
\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{30}%
|
||||
\contentsline {subsection}{\numberline {6.6.1}AES-128}{30}%
|
||||
\contentsline {chapter}{\numberline {7}Hashfunktionen}{32}%
|
||||
\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{32}%
|
||||
\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{32}%
|
||||
\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{33}%
|
||||
\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{33}%
|
||||
\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{33}%
|
||||
\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{33}%
|
||||
\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{33}%
|
||||
\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{33}%
|
||||
\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{33}%
|
||||
\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{34}%
|
||||
\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{34}%
|
||||
\contentsline {chapter}{\numberline {8}MAC-Verfahren}{36}%
|
||||
\contentsline {section}{\numberline {8.1}HMAC}{36}%
|
||||
\contentsline {section}{\numberline {8.2}CMAC, CBC-MAC}{36}%
|
||||
\contentsline {subsection}{\numberline {8.2.1}CMAC}{36}%
|
||||
\contentsline {subsection}{\numberline {8.2.2}CBC-MAC}{37}%
|
||||
\contentsline {chapter}{\numberline {1}Substitionsverfahren}{4}{chapter.1}%
|
||||
\contentsline {section}{\numberline {1.1}Skytale}{4}{section.1.1}%
|
||||
\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{4}{section.1.2}%
|
||||
\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{5}{subsection.1.2.1}%
|
||||
\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{5}{subsection.1.2.2}%
|
||||
\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{5}{section.1.3}%
|
||||
\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{5}{subsection.1.3.1}%
|
||||
\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{5}{subsubsection.1.3.1.1}%
|
||||
\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{6}{subsection.1.3.2}%
|
||||
\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{6}{subsubsection.1.3.2.1}%
|
||||
\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{6}{subsubsection.1.3.2.2}%
|
||||
\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{6}{section.1.4}%
|
||||
\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{6}{subsection.1.4.1}%
|
||||
\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{6}{subsubsection.1.4.1.1}%
|
||||
\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{6}{subsubsection.1.4.1.2}%
|
||||
\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{7}{chapter.2}%
|
||||
\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{7}{section.2.1}%
|
||||
\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{7}{section.2.2}%
|
||||
\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{7}{subsection.2.2.1}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{7}{subsubsection.2.2.1.1}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{7}{subsubsection.2.2.1.2}%
|
||||
\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{8}{subsection.2.2.2}%
|
||||
\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{8}{subsection.2.2.3}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{8}{subsubsection.2.2.3.1}%
|
||||
\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{8}{subsection.2.2.4}%
|
||||
\contentsline {subsection}{\numberline {2.2.5}Matrizen}{8}{subsection.2.2.5}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{8}{subsubsection.2.2.5.1}%
|
||||
\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{8}{subsubsection.2.2.5.2}%
|
||||
\contentsline {subsection}{\numberline {2.2.6}Kartesisches Produkt von Ringen}{8}{subsection.2.2.6}%
|
||||
\contentsline {subsection}{\numberline {2.2.7}Isomorphie von Ringen}{9}{subsection.2.2.7}%
|
||||
\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{9}{section.2.3}%
|
||||
\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{9}{subsection.2.3.1}%
|
||||
\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{9}{subsection.2.3.2}%
|
||||
\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{9}{subsubsection.2.3.2.1}%
|
||||
\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{10}{section.2.4}%
|
||||
\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{10}{subsection.2.4.1}%
|
||||
\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{11}{chapter.3}%
|
||||
\contentsline {section}{\numberline {3.1}Vertraulichkeit}{11}{section.3.1}%
|
||||
\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{11}{subsection.3.1.1}%
|
||||
\contentsline {section}{\numberline {3.2}Integrität}{11}{section.3.2}%
|
||||
\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{12}{subsection.3.2.1}%
|
||||
\contentsline {section}{\numberline {3.3}Authenzität der Daten}{12}{section.3.3}%
|
||||
\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{12}{subsection.3.3.1}%
|
||||
\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{12}{subsection.3.3.2}%
|
||||
\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{12}{section.3.4}%
|
||||
\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{12}{subsection.3.4.1}%
|
||||
\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{12}{section.3.5}%
|
||||
\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{13}{subsection.3.5.1}%
|
||||
\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{13}{section.3.6}%
|
||||
\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{13}{subsection.3.6.1}%
|
||||
\contentsline {section}{\numberline {3.7}Verfügbarkeit}{13}{section.3.7}%
|
||||
\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{13}{subsection.3.7.1}%
|
||||
\contentsline {section}{\numberline {3.8}Anonymität}{13}{section.3.8}%
|
||||
\contentsline {chapter}{\numberline {4}Verschlüsselungsverfahren}{14}{chapter.4}%
|
||||
\contentsline {section}{\numberline {4.1}Das Kerckhoffs'sche Prinzip}{14}{section.4.1}%
|
||||
\contentsline {section}{\numberline {4.2}Mathematische Modelierung von Verschlüsselungsverfahren}{14}{section.4.2}%
|
||||
\contentsline {section}{\numberline {4.3}Schlüsselaustausch}{14}{section.4.3}%
|
||||
\contentsline {section}{\numberline {4.4}Angriffsszenarien}{15}{section.4.4}%
|
||||
\contentsline {subsection}{\numberline {4.4.1}Ciphertext-only Angriffe}{15}{subsection.4.4.1}%
|
||||
\contentsline {subsection}{\numberline {4.4.2}Known-plaintext Angriffe}{15}{subsection.4.4.2}%
|
||||
\contentsline {subsection}{\numberline {4.4.3}Chosen-plaintext Angriffe}{15}{subsection.4.4.3}%
|
||||
\contentsline {section}{\numberline {4.5}Brute-Force Angriffe}{15}{section.4.5}%
|
||||
\contentsline {subsection}{\numberline {4.5.1}Beispiel: Brute-Force Angriff auf $k$}{15}{subsection.4.5.1}%
|
||||
\contentsline {subsection}{\numberline {4.5.2}Beispiel: Brute-Force Angriff auf $m$}{15}{subsection.4.5.2}%
|
||||
\contentsline {subsection}{\numberline {4.5.3}Anforderungen zum Schutz vor Brute-Force}{15}{subsection.4.5.3}%
|
||||
\contentsline {section}{\numberline {4.6}Wörterbuchangriffe}{16}{section.4.6}%
|
||||
\contentsline {subsection}{\numberline {4.6.1}Schutz vor Wörterbuchangriffen}{16}{subsection.4.6.1}%
|
||||
\contentsline {subsubsection}{\numberline {4.6.1.1}Nonce-Verschlüsselung}{16}{subsubsection.4.6.1.1}%
|
||||
\contentsline {chapter}{\numberline {5}Stromverschlüsselungsverfahren}{17}{chapter.5}%
|
||||
\contentsline {section}{\numberline {5.1}Synchrone Stromverschlüsselungsverfahren}{17}{section.5.1}%
|
||||
\contentsline {section}{\numberline {5.2}Zustandsabhängige Stromverschlüsselungsverfahren}{18}{section.5.2}%
|
||||
\contentsline {subsection}{\numberline {5.2.1}Additive zustandsabhängige Stromverschlüsselungsverfahren}{19}{subsection.5.2.1}%
|
||||
\contentsline {subsubsection}{\numberline {5.2.1.1}Synchrone additive Stromverschlüsselungsverfahren}{19}{subsubsection.5.2.1.1}%
|
||||
\contentsline {section}{\numberline {5.3}Schlüsselstrom vs. One-Time-Pad}{20}{section.5.3}%
|
||||
\contentsline {section}{\numberline {5.4}Nonces zur Initialisierung eines Schlüsselstromgenerators}{20}{section.5.4}%
|
||||
\contentsline {section}{\numberline {5.5}ChaCha20}{21}{section.5.5}%
|
||||
\contentsline {section}{\numberline {5.6}Cipher-Instanzen: Verschlüsselungsalgorithmen in Java-Laufzeitumgebungen}{22}{section.5.6}%
|
||||
\contentsline {chapter}{\numberline {6}Blockverschlüsselungsverfahren}{23}{chapter.6}%
|
||||
\contentsline {section}{\numberline {6.1}Padding-Verfahren}{23}{section.6.1}%
|
||||
\contentsline {section}{\numberline {6.2}Betriebsmodi}{23}{section.6.2}%
|
||||
\contentsline {subsection}{\numberline {6.2.1}ECB (Electronic Code Book)}{23}{subsection.6.2.1}%
|
||||
\contentsline {subsection}{\numberline {6.2.2}CBC (Cipher Block Chaining)}{24}{subsection.6.2.2}%
|
||||
\contentsline {subsection}{\numberline {6.2.3}CBC-CS (Chiphertext Stealing for CBC Mode)}{25}{subsection.6.2.3}%
|
||||
\contentsline {subsubsection}{\numberline {6.2.3.1}CBC-CS1}{25}{subsubsection.6.2.3.1}%
|
||||
\contentsline {subsubsection}{\numberline {6.2.3.2}CBC-CS2}{26}{subsubsection.6.2.3.2}%
|
||||
\contentsline {subsubsection}{\numberline {6.2.3.3}CBC-CS3}{26}{subsubsection.6.2.3.3}%
|
||||
\contentsline {subsection}{\numberline {6.2.4}CTR (Counter)}{26}{subsection.6.2.4}%
|
||||
\contentsline {subsection}{\numberline {6.2.5}OFB (Output Feedback)}{26}{subsection.6.2.5}%
|
||||
\contentsline {subsubsection}{\numberline {6.2.5.1}OFB-8$n$}{27}{subsubsection.6.2.5.1}%
|
||||
\contentsline {subsection}{\numberline {6.2.6}CFB (Cipher-Feedback)}{27}{subsection.6.2.6}%
|
||||
\contentsline {subsubsection}{\numberline {6.2.6.1}CFB-8$n$}{27}{subsubsection.6.2.6.1}%
|
||||
\contentsline {section}{\numberline {6.3}Konstruktionsprinzipien von Blockverschlüsselungsverfahren}{28}{section.6.3}%
|
||||
\contentsline {section}{\numberline {6.4}DES}{28}{section.6.4}%
|
||||
\contentsline {subsection}{\numberline {6.4.1}Triple-DES (3DES)}{28}{subsection.6.4.1}%
|
||||
\contentsline {section}{\numberline {6.5}Meet-in-the-Middle-Angriff}{29}{section.6.5}%
|
||||
\contentsline {section}{\numberline {6.6}AES (Advanced Encryption Standard)}{30}{section.6.6}%
|
||||
\contentsline {subsection}{\numberline {6.6.1}AES-128}{30}{subsection.6.6.1}%
|
||||
\contentsline {chapter}{\numberline {7}Hashfunktionen}{32}{chapter.7}%
|
||||
\contentsline {section}{\numberline {7.1}schwache Kollisionsfreiheit}{32}{section.7.1}%
|
||||
\contentsline {section}{\numberline {7.2}\texttt {MessageDigest}-Instanzen: Hashfunktionen in Java}{32}{section.7.2}%
|
||||
\contentsline {section}{\numberline {7.3}Anwendungsbeispiele}{33}{section.7.3}%
|
||||
\contentsline {subsection}{\numberline {7.3.1}Anwendungsbeispiel: Passwortdatei}{33}{subsection.7.3.1}%
|
||||
\contentsline {subsubsection}{\numberline {7.3.1.1}Anwendungsbeispiel: Passwortdatei mit Salt und Iteration Count}{33}{subsubsection.7.3.1.1}%
|
||||
\contentsline {subsection}{\numberline {7.3.2}Anwendungsbeispiel: Integritätsschutz von Dateien}{33}{subsection.7.3.2}%
|
||||
\contentsline {subsection}{\numberline {7.3.3}Anwendungsbeispiel: Integritätsschutz bei einem Dateidownload}{33}{subsection.7.3.3}%
|
||||
\contentsline {section}{\numberline {7.4}Brute-Force-Angriffe auf Hashfunktionen}{33}{section.7.4}%
|
||||
\contentsline {subsection}{\numberline {7.4.1}Brute-Force-Urbildsuche}{33}{subsection.7.4.1}%
|
||||
\contentsline {subsection}{\numberline {7.4.2}Brute-Force-Kollisionssuche}{34}{subsection.7.4.2}%
|
||||
\contentsline {section}{\numberline {7.5}Konstruktionsverfahren von Hashfunktionen}{34}{section.7.5}%
|
||||
\contentsline {chapter}{\numberline {8}MAC-Verfahren}{36}{chapter.8}%
|
||||
\contentsline {section}{\numberline {8.1}HMAC}{36}{section.8.1}%
|
||||
\contentsline {section}{\numberline {8.2}CMAC, CBC-MAC}{36}{section.8.2}%
|
||||
\contentsline {subsection}{\numberline {8.2.1}CMAC}{36}{subsection.8.2.1}%
|
||||
\contentsline {subsection}{\numberline {8.2.2}CBC-MAC}{37}{subsection.8.2.2}%
|
||||
\contentsline {chapter}{\numberline {9}Modulare Arithmetik - Teil 2}{38}{chapter.9}%
|
||||
\contentsline {section}{\numberline {9.1}Potenzen}{38}{section.9.1}%
|
||||
\contentsline {subsection}{\numberline {9.1.1}Erzeugnis und Ordnung eines invertierbaren Elements}{38}{subsection.9.1.1}%
|
||||
\contentsline {subsection}{\numberline {9.1.2}Faktorenzerlegung}{39}{subsection.9.1.2}%
|
||||
\contentsline {subsection}{\numberline {9.1.3}Kleiner Satz von Fermat}{39}{subsection.9.1.3}%
|
||||
\contentsline {section}{\numberline {9.2}Exkurs: Einheitengruppe $\mathbb {Z}_{p^e}^*$}{39}{section.9.2}%
|
||||
\contentsline {subsection}{\numberline {9.2.1}$\mathbb {Z}_{2^e}^*$}{39}{subsection.9.2.1}%
|
||||
\contentsline {section}{\numberline {9.3}Der chinesische Restsatz}{39}{section.9.3}%
|
||||
\contentsline {subsection}{\numberline {9.3.1}Beispiel}{40}{subsection.9.3.1}%
|
||||
\contentsline {section}{\numberline {9.4}Elemente gerader und ungerader Ordnung in $\mathbb {Z}_n$**}{40}{section.9.4}%
|
||||
|
@ -219,7 +219,7 @@
|
||||
03 & 02 & 01 & 02 \\
|
||||
\end{pmatrix}$$
|
||||
Hierbei ist wichtig anzumerken, dass die Multiplikation nicht in $\mathbf{Z}_{256}$ berechnet wird.
|
||||
Stattdessen sind die Elemente als Elemente des Körpers $\mathbf{F}_{256}$ aufzufassen (siehe \ref{endliche Körper}),
|
||||
Stattdessen sind die Elemente als Elemente des Körpers $\mathbf{F}_{256}$ aufzufassen,
|
||||
der bezüglich des irreduziblen Polynoms $m(x)=x^8+x^4+x^3+x+1\in\mathbb{F}_2[x]$ definiert ist.
|
||||
\item AddRoundKey()\\
|
||||
Es wird eine XOR-Operation der Einträge des S-Arrays mit den entsprechenden Einträgen aus \textbf{K} durchgeführt.
|
||||
|
@ -1,4 +1,4 @@
|
||||
\chapter{Endliche Körper $\mathbb{F}_{p^n}$} \label{endliche Körper}
|
||||
\chapter{Endliche Körper $\mathbb{F}_{p^n}$}\label{endliche Körper}
|
||||
$\mathbb{F}_p:=\mathbb{Z}_p$ ($p$ ist eine Primzahl) ist ein Körper.
|
||||
Zudem können Körper auch für beliebige Primzahlpotenzen $p^n$ mit $n\in\mathbb{N},n>0$ mithilfe der Polynome aus $\mathbb{F}_p$ vom Grad $<n$ konstruiert werden:
|
||||
$$\begin{aligned}
|
||||
|
128
chapters/Modulare Arithmetik - Teil 2.tex
Normal file
128
chapters/Modulare Arithmetik - Teil 2.tex
Normal file
@ -0,0 +1,128 @@
|
||||
\chapter{Modulare Arithmetik - Teil 2}
|
||||
\section{Potenzen}
|
||||
Potenzen sind für beliebige Zahlen $a\in\mathbb{Z}_n$ für natürliche Exponenten $i\in\mathbb{N}$ wie üblich definiert:
|
||||
$$a^i:=\underbrace{a\cdot a\cdots a}_i$$
|
||||
Ist $a$ invertierbar ($a\in\mathbb{Z}_n^*$) so sind die Potenzen für alle ganzzahligen Exponenten $i\in\mathbb{Z}$ definiert,
|
||||
indem $a^0 = 1$ und $a^{-i}:=(a^{-1})^i$ definiert werden.
|
||||
Folglich gelten die Folgenden Regeln:
|
||||
\begin{mybox}
|
||||
für $a,b\in\mathbb{Z}_n$ und $i,j\in \mathbb{N}$ oder für $a,b\in\mathbb{Z}_n^*$ und $i,j\in\mathbb{Z}$ gilt:
|
||||
$$\begin{aligned}
|
||||
a^i\cdot a^j &= a^{i+j}\\
|
||||
(a^i)^j &= a^{ij}\\
|
||||
a^i\cdot b^i &= (ab)^i\\
|
||||
\end{aligned}$$
|
||||
\end{mybox}
|
||||
|
||||
\subsection{Erzeugnis und Ordnung eines invertierbaren Elements}
|
||||
Die zyklische Untergruppe, die aus den Potenzen eines Elementes $a\in\mathbb{Z}_n^*$ entsteht wird als Erzeugnis von $a$ in $\mathbb{Z}_n^*$ bezeichnet.
|
||||
$$<a>:=\{a^i\mid i\in\mathbb{Z}\}$$
|
||||
Die Anzahl der verschiedenen Potenzen von $a$ wird als Ordnung von $a$ in $\mathbb{Z}_n^*$ bezeichnet:
|
||||
$$o_n(a):=|<a>|$$
|
||||
Hierbei ergibt sich $a^{o(a)}=1$ und $<a>=\{1,a,a^2,a^3,...,a^{o(a)-1}\}$.\\
|
||||
\begin{mybox}
|
||||
für $n\in\mathbb{N}(n\ge 2);a,b\in \mathbb{Z}_n^*$ und $i\in\mathbb{Z}$ gilt:
|
||||
\begin{enumerate}[(i)]
|
||||
\item $a^i=1 \Longrightarrow o(a)|i$
|
||||
\item $o(a^i)|o(a)$
|
||||
\item $i|o(a) \Longrightarrow o(a^i)=\frac{o(a)}{|i|}$
|
||||
\item $\text{ggT}(o(a),i)=1 \Longrightarrow o(a^i)=o(a)$
|
||||
\item $o(ab)|o(a)\cdot o(b)$
|
||||
\item $\text{ggT}(o(a),o(b))=1\Longrightarrow o(a\cdot b)=o(a)\cdot o(b)$
|
||||
\end{enumerate}
|
||||
\end{mybox}
|
||||
\begin{mybox}
|
||||
Wenn $\mu_n$ für $n\in\mathbb{N},n\ge2$ die maximale Ordnung eines Elementes aus $\mathbb{Z}_n^*$ ($\mu_n:=\max\{o(a)\mid a\in\mathbb{Z}_n^*\}$),
|
||||
ist jede Ordnung von $a$ ein Teiler von $\mu_n$
|
||||
\end{mybox}
|
||||
|
||||
\subsection{Faktorenzerlegung}
|
||||
Falls es für ein Polynom $p(x) \in \mathbb{Z}_n[x]$ ($n\in\mathbb{N}$) vom Grad $k$ eine Nullstelle $a\in\mathbb{Z}_n$ gibt,
|
||||
muss es ein Polynom $q(x) \in \mathbb{Z}_n[x]$ vom Grad $k-1$ geben, für das gilt:
|
||||
$$p(x)=(x-a)\cdot q(x)$$
|
||||
|
||||
\subsection{Kleiner Satz von Fermat}
|
||||
Für eine Primzahl $p$ gilt für alle $a\in\mathbb{Z}$ mit $\text{ggT}(a,p)=1$:
|
||||
$$a^{p-1}\equiv 1 \hspace{10mm}(\mod p)$$
|
||||
|
||||
\section{Exkurs: Einheitengruppe $\mathbb{Z}_{p^e}^*$}
|
||||
Für eine Primzahl $p$ gibt es ein Element $g\in\mathbb{Z}_p^*$ mit $o(g)=p-1$ ($\mathbb{Z}_p^*=<g>=\{1,g,g^2,...,g^{p-2}\}$).
|
||||
Diese Elemente $g$ werden als \textbf{primitive Elemente} bezeichnet.\\
|
||||
Mithilfe der Potenzen der primitiven Elemente lassen sich alle Elemente von $\mathbb{Z}_p^*$ generieren:
|
||||
$$<g>=\mathbb{Z}_p^*$$
|
||||
Diese Elemente werden daher auch als \textbf{Generatoren} von $\mathbb{Z}_p^*$ bezeichnet.
|
||||
Auch für Einheitengruppen $\mathbb{Z}_{p^e}$ für Primzahlpotenzen mit $e>1$ gibt es solche zyklische Generatoren:
|
||||
\begin{mybox}
|
||||
für eine Primzahl $p\ne2$ und $e\in\mathbb{N}$ gibt es ein $g\in\mathbb{Z}_{p^e}^*$ für das gilt:
|
||||
$$\begin{aligned}
|
||||
o(g)=p^{e-1}(p-1) &= \varphi(p^e)=|\mathbb{Z}_{p^e}^*\\
|
||||
\Leftrightarrow\hspace{10mm}<g>&=\mathbb{Z}_{p^e}^*
|
||||
\end{aligned}$$
|
||||
\end{mybox}
|
||||
Hierbei gilt:
|
||||
\begin{mybox}
|
||||
Für ein primitives Element $g\in\mathbb{Z}_p^*$ gilt mit $a:=g^{\frac{o_{p^e}(g)}{p-1}}$:
|
||||
$$\begin{aligned}
|
||||
\mathbb{Z}_{p^e}^*&=<a>\cdot <1+p>\\
|
||||
:&=\{a^i\cdot (1+p)^j\mid i=0,1,...,p-2; j=0,1,...p^{e-1}-1\}
|
||||
\end{aligned}$$
|
||||
\end{mybox}
|
||||
|
||||
\subsection{$\mathbb{Z}_{2^e}^*$}
|
||||
Die Primzahl 2 stellt eine besonderheit dar, da $\mathbb{Z}_{2^e}^*$ für $e\ge3$ nicht zyklisch ist.
|
||||
So gilt $o(5)=2^{e-2}$ und allgemein:
|
||||
$$\begin{aligned}
|
||||
\mathbb{Z}_{2^e}^*&=<2^e-1>\cdot <5>\\
|
||||
&= \{(2^e-1)^i\cdot 5^j\mid i=0,1;j=0,1,...,2^{e-2}-1\}
|
||||
\end{aligned}$$
|
||||
|
||||
\section{Der chinesische Restsatz}
|
||||
Für eine Menge teilerfremder Zahlen $\{(n_1,...,n_r)\mid n_i\in\mathbb{N}\}$ bildet einen Menge $\{(a_1,...,a_r)\mid a_i\in\mathbb{Z}\}$ ein System aus Kongruenzen:
|
||||
$$\begin{aligned}
|
||||
x\equiv&a_1\hspace{10mm} &(\textbf{mod }n_1)\\
|
||||
x\equiv&a_2 &(\textbf{mod } n_2)\\
|
||||
\vdots\\
|
||||
x\equiv&a_r &(\textbf{mod } n_r)\\
|
||||
\end{aligned}$$
|
||||
Die Menge der ganzzahligen Lösungen ist gegeben durch:
|
||||
$$\mathbb{L}=\{a+v\cdot n_1n_2\cdots n_r\mid v\in\mathbb{Z}\}$$
|
||||
Hierbei ist $0\le a < n_1n_2\cdots n_r$ eindeutig.
|
||||
$a$ wird im folgenden Beispiel mithilfe des erweiterten Euklid'schen Algorithmus (siehe \ref{erweiterter Euklid}) berechnet.
|
||||
Aus dem Restsatz leitet sich folgender Satz ab:
|
||||
\begin{mybox}
|
||||
Sind $n_1,n_2,...,n_r$ paarweise teilerfremde Zahlen gibt es die folgende Isomorphie (\ref{Isomorphie}):
|
||||
$$\mathbb{Z}_{n_1n_2\cdots n_r}\cong \mathbb{Z}_{n_1}\times \mathbb{Z}_{n_2}\times\cdots\times\mathbb{Z}_{n_r}$$
|
||||
\end{mybox}
|
||||
|
||||
\subsection{Beispiel}
|
||||
folgende Kongruenzen sind gegeben:
|
||||
$$\begin{aligned}
|
||||
x\equiv&2\hspace{10mm}&(\textbf{mod }5)\\
|
||||
x\equiv&7 &(\textbf{mod }2)\\
|
||||
x\equiv&2 &(\textbf{mod }5)\\
|
||||
\end{aligned}$$
|
||||
\begin{itemize}
|
||||
\item \textbf{Bestimmung von} $e_1$\\
|
||||
für $n_1=5$ und $m_1=21\cdot 11=231$ liefert der erweiterte Euklid'sche Algorithmus (\ref{erweiterter Euklid}):
|
||||
$$(-46)\cdot 5+1\cdot 231 = 1$$
|
||||
Daher ist $e_1 = 1\cdot 231$
|
||||
\item \textbf{Bestimmung von} $e_2$\\
|
||||
für $n_2=21$ und $m_2=5\cdot 11=55$ liefert der erweiterte Euklid'sche Algorithmus (\ref{erweiterter Euklid}):
|
||||
$$(-21)\cdot 21+(-8)\cdot 55 = 1$$
|
||||
Daher ist $e_2 = (-8)\cdot 55=-440$
|
||||
\item \textbf{Bestimmung von} $e_3$\\
|
||||
für $n_3=11$ und $m_3=5\cdot 21=105$ liefert der erweiterte Euklid'sche Algorithmus (\ref{erweiterter Euklid}):
|
||||
$$(-19)\cdot 11+2\cdot 105 = 1$$
|
||||
Daher ist $e_3 = 2\cdot 105=210$
|
||||
\item \textbf{Berechnung der Lösung}\\
|
||||
$n=5\cdot 21\cdot 11=1155$:
|
||||
$$\begin{aligned}
|
||||
a=&(2\cdot e_1+7\cdot e_2+6\cdot e_3)\mod 1155\\
|
||||
=&(2\cdot 231-7\cdot 440+6\cdot 210)\mod 1155\\
|
||||
=&-1358\mod 1155\\
|
||||
=952
|
||||
\end{aligned}$$
|
||||
\end{itemize}
|
||||
|
||||
\section{Elemente gerader und ungerader Ordnung in $\mathbb{Z}_n$**}
|
||||
siehe Skript 3 Kapitel 1.4 auf Seite 17(23).
|
@ -72,6 +72,23 @@
|
||||
Die Inverse einer quadratischen Matrix $A$ über $\mathbb{Z}_n$ lässt sich mithilfe der Adjunkten berechnen:
|
||||
$$A^{-1} = (\det(A))^{-1} \cdot adj(A)$$
|
||||
Die Adjunkte lässt sich über $\mathbb{Z}_n$ berechnen, da lediglich Summen und Differenzen von Produkten berechnet werden müssen.
|
||||
|
||||
\subsection{Kartesisches Produkt von Ringen}
|
||||
Sind $R_1,R_2,...,R_r$ Ringe, so bildet das kartesische Produkt ($R_1\times R_2\times\cdots\times R_r$)ebenfalls einen Ring mit den folgenden Verknüpfungen:
|
||||
$$\begin{aligned}
|
||||
(a_1,...,a_r)+(b_1,...,b_r)&=(a_1+b_1,...,a_r+b_r)\\
|
||||
(a_1,...,a_r)\cdot(b_1,...,b_r)&=(a_1\cdot b_1,...,a_r\cdot b_r)\\
|
||||
\end{aligned}$$
|
||||
Auch das kartesische Produkt der Einheitengruppen bildet einen Ring:
|
||||
$$R^*=R_1^*\times\cdots\times R_r^*$$
|
||||
|
||||
\subsection{Isomorphie von Ringen}\label{Isomorphie}
|
||||
Eine bijektive Abbildung $f:R_1\rightarrow R_2$ wird Isomorphismus genannt, falls für alle $a,b\in R_1$ gilt:
|
||||
$$\begin{aligned}
|
||||
f(a+b)&=f(a)+f(b)\\
|
||||
f(a\cdot b)&=f(a)\cdot f(b)\\
|
||||
\end{aligned}$$
|
||||
Zwei isomorphe Ringe werden als $R_1\cong R_2$ geschrieben.
|
||||
|
||||
\section{Der erweiterte Euklid'sche Algorithmus}
|
||||
Der Euklid'sche Algorithmus ist ein sehr effizienter Weg den ggT zweier Zahlen zu ermitteln.
|
||||
|
Loading…
x
Reference in New Issue
Block a user