%PDF-1.4 5 0 obj << /S /GoTo /D (chapter*.1) >> endobj 8 0 obj (Vorwort) endobj 9 0 obj << /S /GoTo /D (Inhaltsverzeichnis.0) >> endobj 12 0 obj (Inhaltsverzeichnis) endobj 13 0 obj << /S /GoTo /D (chapter.1) >> endobj 16 0 obj (1 Einleitung) endobj 17 0 obj << /S /GoTo /D (chapter.2) >> endobj 20 0 obj (2 Grundlagen UMTS) endobj 21 0 obj << /S /GoTo /D (section.2.1) >> endobj 24 0 obj (2.1 Systemarchitektur) endobj 25 0 obj << /S /GoTo /D (subsection.2.1.1) >> endobj 28 0 obj (2.1.1 UMTS Basisarchitektur) endobj 29 0 obj << /S /GoTo /D (subsection.2.1.2) >> endobj 32 0 obj (2.1.2 Einteilung in Dom\344nen) endobj 33 0 obj << /S /GoTo /D (section.2.2) >> endobj 36 0 obj (2.2 Komponenten der UMTS-Architektur) endobj 37 0 obj << /S /GoTo /D (subsection.2.2.1) >> endobj 40 0 obj (2.2.1 Mobile Switching Centre \(MSC\)) endobj 41 0 obj << /S /GoTo /D (subsection.2.2.2) >> endobj 44 0 obj (2.2.2 Visitor Location Register \(VLR\)) endobj 45 0 obj << /S /GoTo /D (subsection.2.2.3) >> endobj 48 0 obj (2.2.3 Home Location Register \(HLR\)) endobj 49 0 obj << /S /GoTo /D (subsection.2.2.4) >> endobj 52 0 obj (2.2.4 Transcoder Rate Adaption Unit \(TRAU\)) endobj 53 0 obj << /S /GoTo /D (subsection.2.2.5) >> endobj 56 0 obj (2.2.5 Authentication Center \(AuC\)) endobj 57 0 obj << /S /GoTo /D (subsection.2.2.6) >> endobj 60 0 obj (2.2.6 Serving GPRS Support Node \(SGSN\)) endobj 61 0 obj << /S /GoTo /D (subsection.2.2.7) >> endobj 64 0 obj (2.2.7 Gateway GPRS Support Node \(GGSN\)) endobj 65 0 obj << /S /GoTo /D (subsection.2.2.8) >> endobj 68 0 obj (2.2.8 Radio Network Controller \(RNC\)) endobj 69 0 obj << /S /GoTo /D (subsection.2.2.9) >> endobj 72 0 obj (2.2.9 Node B) endobj 73 0 obj << /S /GoTo /D (subsection.2.2.10) >> endobj 76 0 obj (2.2.10 User Equipment \(UE\)) endobj 77 0 obj << /S /GoTo /D (chapter.3) >> endobj 80 0 obj (3 UMTS Sicherheitsarchitektur) endobj 81 0 obj << /S /GoTo /D (section.3.1) >> endobj 84 0 obj (3.1 Netzzugangssicherheit) endobj 85 0 obj << /S /GoTo /D (subsection.3.1.1) >> endobj 88 0 obj (3.1.1 Schutz der Identit\344t) endobj 89 0 obj << /S /GoTo /D (subsection.3.1.2) >> endobj 92 0 obj (3.1.2 Authentifikation und Schl\374sselvereinbarung) endobj 93 0 obj << /S /GoTo /D (subsection.3.1.3) >> endobj 96 0 obj (3.1.3 Schl\374sselverwaltung) endobj 97 0 obj << /S /GoTo /D (subsection.3.1.4) >> endobj 100 0 obj (3.1.4 Integrit\344t) endobj 101 0 obj << /S /GoTo /D (subsection.3.1.5) >> endobj 104 0 obj (3.1.5 Verschl\374sselung) endobj 105 0 obj << /S /GoTo /D (section.3.2) >> endobj 108 0 obj (3.2 Netzwerksicherheit) endobj 109 0 obj << /S /GoTo /D (section.3.3) >> endobj 112 0 obj (3.3 Benutzersicherheit) endobj 113 0 obj << /S /GoTo /D (section.3.4) >> endobj 116 0 obj (3.4 Anwendungssicherheit) endobj 117 0 obj << /S /GoTo /D (section.3.5) >> endobj 120 0 obj (3.5 Sichtbarkeit und Konfigurierbarkeit der Sicherheit) endobj 121 0 obj << /S /GoTo /D (subsection.3.5.1) >> endobj 124 0 obj (3.5.1 Sichtbarkeit) endobj 125 0 obj << /S /GoTo /D (subsection.3.5.2) >> endobj 128 0 obj (3.5.2 Konfigurierbarkeit) endobj 129 0 obj << /S /GoTo /D (chapter.4) >> endobj 132 0 obj (4 KASUMI) endobj 133 0 obj << /S /GoTo /D (section.4.1) >> endobj 136 0 obj (4.1 \334bersicht) endobj 137 0 obj << /S /GoTo /D (section.4.2) >> endobj 140 0 obj (4.2 Die Rundenfunktion) endobj 141 0 obj << /S /GoTo /D (subsection.4.2.1) >> endobj 144 0 obj (4.2.1 Die Unterfunktionen FL, FO und FI) endobj 145 0 obj << /S /GoTo /D (subsection.4.2.2) >> endobj 148 0 obj (4.2.2 Die Rundenteilschl\374ssel) endobj 149 0 obj << /S /GoTo /D (section.4.3) >> endobj 152 0 obj (4.3 Sicherheit) endobj 153 0 obj << /S /GoTo /D (subsection.4.3.1) >> endobj 156 0 obj (4.3.1 Nichtlinearit\344t der S-Boxen) endobj 157 0 obj << /S /GoTo /D (subsection.4.3.2) >> endobj 160 0 obj (4.3.2 Mathematische Analyse) endobj 161 0 obj << /S /GoTo /D (subsection.4.3.3) >> endobj 164 0 obj (4.3.3 Pragmatische Sicherheit) endobj 165 0 obj << /S /GoTo /D (subsection.4.3.4) >> endobj 168 0 obj (4.3.4 Seiteneffekte) endobj 169 0 obj << /S /GoTo /D (section.4.4) >> endobj 172 0 obj (4.4 Komplexit\344t) endobj 173 0 obj << /S /GoTo /D (chapter.5) >> endobj 176 0 obj (5 Implementierung in webMathematica ) endobj 177 0 obj << /S /GoTo /D (section.5.1) >> endobj 180 0 obj (5.1 Mathematica und webMathematica ) endobj 181 0 obj << /S /GoTo /D (section.5.2) >> endobj 184 0 obj (5.2 KASUMI in Mathematica ) endobj 185 0 obj << /S /GoTo /D (subsection.5.2.1) >> endobj 188 0 obj (5.2.1 Kasumi[in\137, K\137]) endobj 189 0 obj << /S /GoTo /D (subsection.5.2.2) >> endobj 192 0 obj (5.2.2 Kasumi[in\137, K\137, roundout\137]) endobj 193 0 obj << /S /GoTo /D (subsection.5.2.3) >> endobj 196 0 obj (5.2.3 FL[in\137, round\137]) endobj 197 0 obj << /S /GoTo /D (subsection.5.2.4) >> endobj 200 0 obj (5.2.4 FO[in\137, round\137]) endobj 201 0 obj << /S /GoTo /D (subsection.5.2.5) >> endobj 204 0 obj (5.2.5 FI[in\137, round\137, roundFO\137]) endobj 205 0 obj << /S /GoTo /D (subsection.5.2.6) >> endobj 208 0 obj (5.2.6 KeySchedule[K\137]) endobj 209 0 obj << /S /GoTo /D (subsection.5.2.7) >> endobj 212 0 obj (5.2.7 S7[xlist\137]) endobj 213 0 obj << /S /GoTo /D (subsection.5.2.8) >> endobj 216 0 obj (5.2.8 S9[xlist\137]) endobj 217 0 obj << /S /GoTo /D (subsection.5.2.9) >> endobj 220 0 obj (5.2.9 f8[plain\137, CK\137]) endobj 221 0 obj << /S /GoTo /D (subsection.5.2.10) >> endobj 224 0 obj (5.2.10 f9[msg\137, IK\137]) endobj 225 0 obj << /S /GoTo /D (subsection.5.2.11) >> endobj 228 0 obj (5.2.11 Das Crypto Paket) endobj 229 0 obj << /S /GoTo /D (subsection.5.2.12) >> endobj 232 0 obj (5.2.12 Analyse-Berechnungen) endobj 233 0 obj << /S /GoTo /D (section.5.3) >> endobj 236 0 obj (5.3 Erstellung der webMathematica Seiten) endobj 237 0 obj << /S /GoTo /D (subsection.5.3.1) >> endobj 240 0 obj (5.3.1 index.msp) endobj 241 0 obj << /S /GoTo /D (subsection.5.3.2) >> endobj 244 0 obj (5.3.2 kasumi\137index.msp, f8\137index.msp, f9\137index.msp, des\137index.msp) endobj 245 0 obj << /S /GoTo /D (subsection.5.3.3) >> endobj 248 0 obj (5.3.3 kasumiv1.msp, kasumiv1\1371.msp ) endobj 249 0 obj << /S /GoTo /D (subsection.5.3.4) >> endobj 252 0 obj (5.3.4 kasumiv2.msp, kasumiv2\1371.msp ) endobj 253 0 obj << /S /GoTo /D (subsection.5.3.5) >> endobj 256 0 obj (5.3.5 kasumiv3.msp, kasumiv3\1371.msp ) endobj 257 0 obj << /S /GoTo /D (subsection.5.3.6) >> endobj 260 0 obj (5.3.6 f8v1.msp, f8v1\1371.msp ) endobj 261 0 obj << /S /GoTo /D (subsection.5.3.7) >> endobj 264 0 obj (5.3.7 f8v2.msp, f8v2\1371.msp ) endobj 265 0 obj << /S /GoTo /D (subsection.5.3.8) >> endobj 268 0 obj (5.3.8 f8v3.msp, f8v3\1371.msp ) endobj 269 0 obj << /S /GoTo /D (subsection.5.3.9) >> endobj 272 0 obj (5.3.9 f9vX.msp, f9vX\137Y.msp ) endobj 273 0 obj << /S /GoTo /D (chapter.6) >> endobj 276 0 obj (6 Zusammenfassung und Ausblick) endobj 277 0 obj << /S /GoTo /D (appendix.A) >> endobj 280 0 obj (A Abk\374rzungen, Symbole) endobj 281 0 obj << /S /GoTo /D (section.A.1) >> endobj 284 0 obj (A.1 Abk\374rzungsverzeichnis) endobj 285 0 obj << /S /GoTo /D (section.A.2) >> endobj 288 0 obj (A.2 Symbole) endobj 289 0 obj << /S /GoTo /D (appendix.B) >> endobj 292 0 obj (B KASUMIs S-Boxen) endobj 293 0 obj << /S /GoTo /D (section.B.1) >> endobj 296 0 obj (B.1 S7) endobj 297 0 obj << /S /GoTo /D (section.B.2) >> endobj 300 0 obj (B.2 S9) endobj 301 0 obj << /S /GoTo /D (appendix.C) >> endobj 304 0 obj (C Tabellen) endobj 305 0 obj << /S /GoTo /D (appendix.D) >> endobj 308 0 obj (D Mathematica Quellcode) endobj 309 0 obj << /S /GoTo /D (section.D.1) >> endobj 312 0 obj (D.1 kasumi\137pack.m) endobj 313 0 obj << /S /GoTo /D (section.D.2) >> endobj 316 0 obj (D.2 kasumi\137use.m) endobj 317 0 obj << /S /GoTo /D (section.D.3) >> endobj 320 0 obj (D.3 crypto.m) endobj 321 0 obj << /S /GoTo /D (section.D.4) >> endobj 324 0 obj (D.4 des\137pack.m) endobj 325 0 obj << /S /GoTo /D (section.D.5) >> endobj 328 0 obj (D.5 des\137use.m) endobj 329 0 obj << /S /GoTo /D (section.D.5) >> endobj 331 0 obj (Literatur) endobj 332 0 obj << /S /GoTo /D [333 0 R /Fit ] >> endobj 337 0 obj << /Length 920 /Filter /FlateDecode >> stream xVr9W}hw}$Tf$$j+hQS~} HVR9jʦ<<%i[RqB ),xG;QHV76mywV?"w5Ctq1V eX/&B) d|VE]N+UU:qBcSK;XqjG?G÷AǶ88Uyiuar]\M`2X .$&/ѧF DyY1ީcfj,Dw'](B[1$3D E.K^$W׳<9)Mt#GH+j@9ΛeݥL2]UV^6mJ>ay|zΏ9.8>C.>EB $/'7d4XA1l5 'I\2p*Mjn3^+ 7)vƆڱN<=/TSrva竣J<FkXk\*Ėv{Wpԛ)aP`{Ӆ]:>~QSH4)Aw]rh XdPŇ7#fĚGR`Pqa2HuT%>=Q5o{$UtU"fE,? Cp8,ZCc*1`DPEۙo)ㆮ:'^d+ԣCl`AxՉrU/1@c%)?|tw~?ٯ(N9r- üì8kMliuƵyG)4MKAJ4Ѭ&!)Q]s;/ց}_ݞ`-Y? ?1endstream endobj 333 0 obj << /Type /Page /Contents 337 0 R /Resources 336 0 R /MediaBox [0 0 595.913 842.74] /Parent 346 0 R >> endobj 335 0 obj << /Type /XObject /Subtype /Form /BBox [0 0 611.998 791.998] /FormType 1 /Matrix [1 0 0 1 0 0] /Resources 347 0 R /Length 29 /Filter /FlateDecode >> stream x+2T0 B˥k JGendstream endobj 334 0 obj << /Type /XObject /Subtype /Form /FormType 1 /PTEX.FileName (bilder/fh-schrift-logo.pdf) /PTEX.PageNumber 1 /PTEX.InfoDict 348 0 R /Matrix [1 0 0 1 0 0] /BBox [0 0 612 792] /Resources << /ProcSet [ /PDF /ImageC ] /ExtGState << /R9 349 0 R >>/XObject << /R10 350 0 R >>>> /Length 351 0 R /Filter /FlateDecode >> stream x+T034R0 A#9K?R!PL,ab``g`n03W046 +24Pp C mendstream endobj 348 0 obj << /Producer (AFPL Ghostscript 8.0) /CreationDate (D:20030318111808) /ModDate (D:20030318111808) >> endobj 349 0 obj << /Type /ExtGState /Name /R9 /TR /Identity /BG 352 0 R /UCR 353 0 R >> endobj 350 0 obj << /Subtype /Image /ColorSpace /DeviceRGB /Width 55 /Height 60 /BitsPerComponent 8 /Filter /FlateDecode /DecodeParms << /Predictor 15 /Columns 55 /Colors 3 >> /Length 1569 >> stream xY=L#GF@48 ](NDB૮Dtu"Wp@Zׄ+qbLx MhHRy3we"r:}fr{{Ksss;;;8D-Qx~GP"___)[z{{_xZu↖\.V [[[X}G; (\2jq)k((}SB/pHBpJϥQ"?Z/aS(^3d@(fpg{&Bh P^/ @S2Y2@zT\~l6MeS ay6Jx%P1Hs%ϧ 2stjUe8.rP^BiQ"4dIl`Ɓ*("߁ˆD]ゕ'|UdeSep+[tsuMe/b5xrdrɲXSu9d<8\*(o/va