\relax \@nameuse{bbl@beforestart} \catcode `"\active \babel@aux{ngerman}{} \@writefile{toc}{\contentsline {chapter}{\numberline {1}Substitionsverfahren}{2}\protected@file@percent } \@writefile{lof}{\addvspace {10\p@ }} \@writefile{lot}{\addvspace {10\p@ }} \@writefile{toc}{\contentsline {section}{\numberline {1.1}Skytale}{2}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {1.2}Monoalphabetische Substitionsverfahren}{2}\protected@file@percent } \newlabel{monoalphabet}{{1.2}{2}} \@writefile{toc}{\contentsline {subsection}{\numberline {1.2.1}Caesar-Verschlüsselung}{3}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {1.2.2}Häufigkeitsanalyse}{3}\protected@file@percent } \newlabel{häufigkeit}{{1.2.2}{3}} \@writefile{toc}{\contentsline {section}{\numberline {1.3}Polyalphabetische Substitutionsverfahren}{3}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {1.3.1}Vignère-Verfahren}{3}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.1.1}Verschlüsselung}{3}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {1.3.2}One-Time-Pad}{4}\protected@file@percent } \newlabel{otp}{{1.3.2}{4}} \@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.1}Verschlüsselung}{4}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{\numberline {1.3.2.2}Perfekte Sicherheit}{4}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {1.4}algebraische Substitionsverfahren}{4}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {1.4.1}Hill-Verfahren}{4}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.1}Verschlüsselung}{4}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{\numberline {1.4.1.2}Entschlüsselung}{4}\protected@file@percent } \@writefile{toc}{\contentsline {chapter}{\numberline {2}Modulare Arithmetik}{5}\protected@file@percent } \@writefile{lof}{\addvspace {10\p@ }} \@writefile{lot}{\addvspace {10\p@ }} \@writefile{toc}{\contentsline {section}{\numberline {2.1}Exkurs: Division mit Rest}{5}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {2.2}Der Ring $\mathbb {Z}_n$}{5}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Addition und Multiplikation}{5}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.1}Inverse bezüglich der Addition}{5}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.2}Inverse bezüglich der Multiplikation}{5}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}Subtraktion}{6}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}Teiler, Vielfache}{6}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.1}Teilerregeln}{6}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {2.2.4}Kongruenz}{6}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {2.2.5}Matrizen}{6}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.1}Determinantenberechnung}{6}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.5.2}Inverse Matrix}{6}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {2.3}Der erweiterte Euklid'sche Algorithmus}{6}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Euklid'scher Algorithmus}{7}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}erweiterter Euklid'scher Algorithmus}{7}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.3.2.1}Beispiel}{7}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {2.4}Euler'sche $\varphi $-Funktion}{8}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}$\varphi $-Funktion und Primzahlen}{8}\protected@file@percent } \@writefile{toc}{\contentsline {chapter}{\numberline {3}IT-Sicherheit: Gefährdungen und Maßnahmen}{9}\protected@file@percent } \@writefile{lof}{\addvspace {10\p@ }} \@writefile{lot}{\addvspace {10\p@ }} \@writefile{toc}{\contentsline {section}{\numberline {3.1}Vertraulichkeit}{9}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {3.1.1}Schutzmaßnahmen: Verschlüsselungsverfahren}{9}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {3.2}Integrität}{9}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}Schutzmaßnahme: Hashfunktionen, Whitelists}{10}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {3.3}Authenzität der Daten}{10}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {3.3.1}Schutzmaßnahme: Signaturen}{10}\protected@file@percent } \newlabel{signature}{{3.3.1}{10}} \@writefile{toc}{\contentsline {subsection}{\numberline {3.3.2}Schutz vor Replay-Angriffen}{10}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {3.4}Authenzität von Nutzern}{10}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}Schutzmaßnahmen}{10}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {3.5}Zugriffskontrolle}{10}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {3.5.1}Schutzmaßname: Zugriffskontrollsystem}{11}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {3.6}Nichtabstreitbarkeit, Verbindlichkeit}{11}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {3.6.1}Schutzmaßname: Signaturen und PKI}{11}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {3.7}Verfügbarkeit}{11}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {3.7.1}Schutzmaßnahmen}{11}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {3.8}Anonymität}{11}\protected@file@percent }