\relax 
\@writefile{toc}{\contentsline {chapter}{\numberline {2}Theoretical Principles}{8}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{lol}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {2.1}Solving multiple user problem}{8}}
\citation{beweisRSA}
\@writefile{lof}{\contentsline {figure}{\numberline {2.1}{\ignorespaces Sequence diagram of saving a password\relax }}{9}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.2}{\ignorespaces Decrypting a password with a private key\relax }}{9}}
\citation{angwKryptographie}
\@writefile{toc}{\contentsline {section}{\numberline {2.2}RSA in theory}{10}}
\@writefile{toc}{\contentsline {section}{\numberline {2.3}Theoretical solution of the trust problem}{10}}
\citation{shannon}
\@writefile{lof}{\contentsline {figure}{\numberline {2.3}{\ignorespaces Diagram of encrypted Channel communication\relax }}{11}}
\providecommand*\caption@xref[2]{\@setref\relax\@undefined{#1}}
\newlabel{websocketAblauf}{{\caption@xref {websocketAblauf}{ on input line 69}}{11}{Theoretical solution of the trust problem\relax }{}{}}
\citation{qr}
\citation{qrWikiGraph}
\citation{qrWikiGraph}
\@writefile{lof}{\contentsline {figure}{\numberline {2.4}{\ignorespaces Infected workstation - catching decrypted password\relax }}{12}}
\newlabel{websocketAblauf}{{\caption@xref {websocketAblauf}{ on input line 78}}{12}{Theoretical solution of the trust problem\relax }{}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.5}{\ignorespaces Infected workstation - prohibiting password stealing with qr code\relax }}{12}}
\newlabel{websocketAblauf}{{\caption@xref {websocketAblauf}{ on input line 86}}{12}{Theoretical solution of the trust problem\relax }{}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Technical notes about QR-Codes}{12}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.6}{\ignorespaces QR Code structure - taken from wikipedia \cite  {qrWikiGraph}\relax }}{13}}
\@writefile{toc}{\contentsline {section}{\numberline {2.4}Attack vectors against the system}{13}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}Private key has been stolen}{14}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.2}Username and password are stolen}{14}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.3}Smartphone is stolen}{14}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.4}Programming errors - direct access to the database}{14}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.5}Hijacked Terminal}{15}}
\@setckpt{TheoreticalPrinciples}{
\setcounter{page}{16}
\setcounter{equation}{0}
\setcounter{enumi}{5}
\setcounter{enumii}{0}
\setcounter{enumiii}{0}
\setcounter{enumiv}{0}
\setcounter{footnote}{0}
\setcounter{mpfootnote}{0}
\setcounter{part}{0}
\setcounter{chapter}{2}
\setcounter{section}{4}
\setcounter{subsection}{5}
\setcounter{subsubsection}{0}
\setcounter{paragraph}{0}
\setcounter{subparagraph}{0}
\setcounter{figure}{6}
\setcounter{table}{0}
\setcounter{lstnumber}{1}
\setcounter{parentequation}{0}
\setcounter{float@type}{8}
\setcounter{AM@survey}{0}
\setcounter{section@level}{2}
\setcounter{vrcnt}{0}
\setcounter{subfigure}{0}
\setcounter{lofdepth}{1}
\setcounter{subtable}{0}
\setcounter{lotdepth}{1}
\setcounter{ContinuedFloat}{0}
\setcounter{lstlisting}{0}
}
