{"id":1591,"date":"2018-01-23T10:33:49","date_gmt":"2018-01-23T09:33:49","guid":{"rendered":"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1591"},"modified":"2019-03-13T07:44:30","modified_gmt":"2019-03-13T06:44:30","slug":"crypto-hacking","status":"publish","type":"post","link":"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1591","title":{"rendered":"Crypto-Hacking"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-overflow:visible;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-1 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Allgemeine Informationen<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-1\"><p>Vorlesungsnummer: 57803<br \/>\nUmfang: 4 SWS<br \/>\nAufwand: 5 CP<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-2 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Termine<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-2\"><p>Die Vorlesung findet statt am:<\/p>\n<ul>\n<li>Dienstag, 9:45 Uhr bis 11:15 Uhr, Raum G2 1.31<\/li>\n<li>Donnerstag,\u00a0 11:30 Uhr bis 13:00, Raum G2 1.44<\/li>\n<\/ul>\n<p>Die Vorlesung <em><strong>entf\u00e4llt<\/strong><\/em> an folgenden Terminen:<\/p>\n<ul>\n<li>Donnerstag, 5.10.2017 (Vollversammlung)<\/li>\n<li>Donnerstag, 12.10.2017<\/li>\n<li>Dienstag, 17.10.2017<\/li>\n<li>Donnerstag, 19.10.2017<\/li>\n<li>Donnerstag, 11.1.2018<\/li>\n<\/ul>\n<p>Die <strong><em>Ersatztermine<\/em><\/strong> sind:<\/p>\n<ul>\n<li>Dienstag, 7.11.2017, 8:00 Uhr Raum G2 1.44<\/li>\n<li>Dienstag, 5.12, 8:00 Uhr Raum G2 1.44 (Besprechungstermin Projekt 2)<\/li>\n<li>Dienstag, ?, 8:00 Uhr Raum G2 1.44(Besprechungstermin Projekt 3)<\/li>\n<li>Dienstag, ?, 8:00 Uhr Raum G2 1.44(Besprechungstermin Projekt 4)<\/li>\n<li><\/li>\n<\/ul>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-3 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Unterlagen<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:16px;--awb-icon-alignment:left;--awb-hover-color:#f9f9f9;--awb-border-color:#cccccc;--awb-background-color:#ffffff;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:#ffffff;--awb-title-color:#333333;--awb-content-color:#747474;--awb-icon-box-color:#333333;--awb-toggle-hover-accent-color:#67b7e1;--awb-title-font-family:&quot;PT Sans Caption&quot;;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:14px;--awb-title-letter-spacing:0px;--awb-title-line-height:1.54;--awb-content-font-family:&quot;PT Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-boxed\" id=\"accordion-1591-1\"><div class=\"fusion-panel panel-default panel-256f24d7c2e0d0019 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_256f24d7c2e0d0019\"><a aria-expanded=\"false\" aria-controls=\"256f24d7c2e0d0019\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-1591-1\" data-target=\"#256f24d7c2e0d0019\" href=\"#256f24d7c2e0d0019\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Beschreibung der Lehrveranstaltung<\/span><\/a><\/h4><\/div><div id=\"256f24d7c2e0d0019\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_256f24d7c2e0d0019\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/MH\/lv-57803-crypto-hacking.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download<\/span><\/a><\/div>\n<p>Stand: 7.4.2016<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-bff897c8521d0f550 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_bff897c8521d0f550\"><a aria-expanded=\"false\" aria-controls=\"bff897c8521d0f550\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-1591-1\" data-target=\"#bff897c8521d0f550\" href=\"#bff897c8521d0f550\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Regularien<\/span><\/a><\/h4><\/div><div id=\"bff897c8521d0f550\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_bff897c8521d0f550\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-2 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/CH\/crypto-hacking-regularien.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download<\/span><\/a><\/div>\n<p>Stand: 24.10.2017<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-f4b609f1b469ec6d3 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_f4b609f1b469ec6d3\"><a aria-expanded=\"false\" aria-controls=\"f4b609f1b469ec6d3\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-1591-1\" data-target=\"#f4b609f1b469ec6d3\" href=\"#f4b609f1b469ec6d3\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Projekt 1: Kryptoanalyse von Substitutionschiffren<\/span><\/a><\/h4><\/div><div id=\"f4b609f1b469ec6d3\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_f4b609f1b469ec6d3\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-3 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/CH\/projekt-substitutionschiffre.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Aufgabenstellung<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-4 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/CH\/alice-in-wonderland.txt\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Alice in Wonderland<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-5 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/CH\/enigma-plaintext.txt\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Klartext<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-6 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/CH\/enigma-sc-ciphertext.txt\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Geheimtext<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-7 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/CH\/zeitplan-projekt-1.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Zeitplan Pr\u00e4sentationen<\/span><\/a><\/div>\n<ul>\n<li>Termin Pr\u00e4sentationen: 7.11.2017<\/li>\n<li>Abgabe Projekt: 26.11.2017 (<a href=\"https:\/\/nextcloud.kargulus.de\/index.php\/s\/3S5OzMeDkbX9o2R\">Upload<\/a>)<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-02e39aa98e7a7a210 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_02e39aa98e7a7a210\"><a aria-expanded=\"false\" aria-controls=\"02e39aa98e7a7a210\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-1591-1\" data-target=\"#02e39aa98e7a7a210\" href=\"#02e39aa98e7a7a210\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Projekt 2: Suche von Kollisionen bei MD4<\/span><\/a><\/h4><\/div><div id=\"02e39aa98e7a7a210\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_02e39aa98e7a7a210\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-8 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/CH\/projekt-md4-kollisionen.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Aufgabenstellung<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-9 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/CH\/zeitplan-projekt-2.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Zeitplan Pr\u00e4sentationen<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-10 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/CH\/md4-search-output.txt\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Beispiel Ausgabe<\/span><\/a><\/div>\n<ul>\n<li>Termin Pr\u00e4sentationen: 5.12.2017<\/li>\n<li>Abgabe Projekt: 16.2.2018 (<a href=\"https:\/\/nextcloud.kargulus.de\/index.php\/s\/pvljdpgwoeE76cT\" target=\"_blank\" rel=\"noopener noreferrer\">Upload<\/a>)<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-4 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Vorlesungen in diesem Semester<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-recent-posts fusion-recent-posts-1 avada-container layout-default layout-columns-4\"><section class=\"fusion-columns columns fusion-columns-4 columns-4\"><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=336\" aria-label=\"Kryptographische Protokolle\" class=\"hover-type-none\"><img decoding=\"async\" width=\"660\" height=\"405\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2013\/03\/kryptografie-660x405.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2013\/03\/kryptografie-660x405.jpg 660w, https:&#47;\/&#x69;t&#x73;&#46;&#x69;&#110;&#x66;&#111;r&#x6d;a&#x74;&#105;&#x6b;&#46;&#x68;&#116;&#x77;&#45;a&#x61;l&#x65;&#110;&#x2e;&#100;&#x65;&#47;w&#x70;\/&#x77;&#112;&#x2d;&#99;&#x6f;&#110;&#x74;&#101;n&#x74;\/&#x75;&#112;&#x6c;&#111;&#x61;&#100;s&#x2f;2&#x30;&#49;&#x33;&#47;&#x30;&#51;&#x2f;&#107;r&#x79;p&#x74;&#111;&#x67;&#114;&#x61;&#102;i&#x65;-&#x36;&#54;&#x30;&#120;&#x34;&#48;&#x35;&#64;2&#x78;&#46;&#x6a;&#112;&#x67; 1320w\" sizes=\"(max-width: 660px) 100vw, 660px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-05-12T08:48:14+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=336\">Kryptographische Protokolle<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-05-12T08:48:14+02:00<\/span><span>12. May  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Kryptographische Protokolle<\/span><\/span><\/span><\/p><\/div><\/article><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1833\" aria-label=\"Sicherheit von Webanwendungen\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2018\/10\/sichere-webanwendungen-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2018\/10\/sichere-webanwendungen-320x202.jpg 320w, https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2018\/10\/sichere-webanwendungen-700x441.jpg 700w, https:\/\/i&#116;&#115;&#46;&#x69;&#x6e;&#x66;&#x6f;&#x72;&#x6d;ati&#107;&#46;&#104;&#116;&#x77;&#x2d;&#x61;&#x61;&#x6c;&#x65;n&#46;d&#101;&#47;&#119;&#x70;&#x2f;&#x77;&#x70;&#x2d;&#x63;ont&#101;&#110;&#116;&#47;&#x75;&#x70;&#x6c;&#x6f;&#x61;&#x64;s\/2&#48;&#49;&#56;&#x2f;&#x31;&#x30;&#x2f;&#x73;&#x69;che&#114;&#101;&#45;&#119;&#x65;&#x62;&#x61;&#x6e;&#x77;&#x65;ndu&#110;&#103;&#101;&#x6e;&#x2d;&#x33;&#x32;&#x30;&#x78;202&#64;&#50;&#120;&#46;&#x6a;&#x70;&#x67; 640w, https:&#x2f;&#47;&#x69;&#x74;&#115;&#x2e;&#105;n&#x66;&#111;r&#x6d;&#97;t&#x69;&#107;&#46;&#x68;&#116;&#x77;&#x2d;&#97;&#x61;&#x6c;&#101;&#x6e;&#46;d&#x65;&#47;w&#x70;&#47;w&#x70;&#45;c&#x6f;&#110;&#x74;&#x65;&#110;&#x74;&#x2f;&#117;&#x70;&#108;o&#x61;&#100;s&#x2f;&#50;0&#x31;&#56;\/&#x31;&#48;&#x2f;&#x73;&#105;&#x63;&#x68;&#101;&#x72;&#101;-&#x77;&#101;b&#x61;&#110;w&#x65;&#110;d&#x75;&#110;&#x67;&#x65;&#110;&#x2d;&#x37;&#48;&#x30;&#120;4&#x34;&#49;&#64;&#x32;&#120;&#46;&#x6a;&#112;g 1400w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-30T08:26:01+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1833\">Sicherheit von Webanwendungen<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-30T08:26:01+02:00<\/span><span>30. April  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Sicherheit von Webanwendungen<\/span><\/span><\/span><\/p><\/div><\/article><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1240\" aria-label=\"Wahrscheinlichkeitstheorie und Statistik\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/04\/wahrscheinlichkeit-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/04\/wahrscheinlichkeit-320x202.jpg 320w, https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/04\/wahrscheinlichkeit-700x441.jpg 700w, https:&#47;&#x2f;&#105;&#x74;s&#x2e;i&#110;&#x66;&#111;&#x72;&#109;&#x61;t&#x69;k&#46;&#x68;&#116;&#x77;-&#x61;a&#x6c;&#x65;&#110;&#x2e;&#100;&#x65;\/&#x77;p&#47;&#x77;&#112;&#x2d;&#99;&#x6f;n&#x74;e&#110;&#x74;&#47;&#x75;p&#x6c;o&#x61;&#x64;&#115;&#x2f;&#50;&#x30;1&#x36;\/&#48;&#x34;&#47;&#x77;&#97;&#x68;r&#x73;c&#104;&#x65;&#105;&#x6e;l&#x69;c&#x68;&#x6b;&#101;&#x69;&#116;&#x2d;3&#x32;0&#120;&#x32;&#48;&#x32;&#64;&#x32;x&#x2e;j&#112;&#x67; 640w, https:\/\/its&#46;inform&#97;&#116;&#105;&#107;&#46;&#104;&#116;&#119;&#45;&#97;&#97;&#108;&#101;&#110;&#46;&#x64;&#x65;&#x2f;&#x77;&#x70;&#x2f;&#x77;&#x70;&#x2d;&#x63;&#x6f;&#x6e;&#x74;&#x65;&#x6e;&#x74;&#x2f;&#x75;&#x70;&#x6c;&#x6f;&#x61;&#x64;s\/2016\/04\/wa&#104;&#114;&#115;&#99;&#104;&#101;&#105;&#110;&#108;&#105;&#99;&#104;&#107;&#101;&#105;&#x74;&#x2d;&#x37;&#x30;&#x30;&#x78;&#x34;&#x34;&#x31;&#x40;&#x32;&#x78;&#x2e;&#x6a;&#x70;&#x67; 1400w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-22T20:26:06+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1240\">Wahrscheinlichkeitstheorie und Statistik<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-22T20:26:06+02:00<\/span><span>22. April  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Wahrscheinlichkeitstheorie und Statistik<\/span><\/span><\/span><\/p><\/div><\/article><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1336\" aria-label=\"Sichere Programmierung\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/10\/sichere-programmierung-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/10\/sichere-programmierung-320x202.jpg 320w, https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/10\/sichere-programmierung-700x441.jpg 700w, https:\/&#47;&#x69;&#x74;s&#46;&#x69;&#x6e;f&#111;&#114;&#x6d;&#x61;t&#105;&#x6b;&#x2e;h&#116;&#x77;&#x2d;a&#97;&#108;&#x65;&#x6e;&#46;&#100;&#x65;&#x2f;w&#112;&#x2f;&#x77;p&#45;&#99;&#x6f;&#x6e;t&#101;&#x6e;&#x74;\/&#117;&#x70;&#x6c;o&#97;&#100;&#x73;&#x2f;2&#48;&#x31;&#x36;\/&#49;&#x30;&#x2f;s&#105;&#99;&#x68;&#x65;r&#101;&#x2d;&#x70;r&#111;&#x67;&#x72;a&#109;&#109;&#x69;&#x65;r&#117;&#x6e;&#x67;-&#51;&#50;&#x30;x2&#48;&#x32;&#x40;2&#120;&#x2e;&#x6a;p&#103; 640w, https:\/\/&#105;&#116;&#115;&#46;&#x69;&#x6e;&#x66;&#x6f;&#x72;ma&#116;&#105;&#107;&#46;&#x68;&#x74;&#x77;&#x2d;&#x61;al&#101;&#110;&#46;&#100;&#x65;&#x2f;&#x77;&#x70;&#x2f;wp-&#99;&#111;&#110;&#x74;&#x65;&#x6e;&#x74;&#x2f;upl&#111;&#97;&#100;&#x73;&#x2f;&#x32;&#x30;&#x31;6\/1&#48;&#47;&#115;&#x69;&#x63;&#x68;&#x65;&#x72;e-p&#114;&#111;&#103;&#x72;&#x61;&#x6d;&#x6d;&#x69;eru&#110;&#103;&#45;&#x37;&#x30;&#x30;&#x78;&#x34;41&#64;&#50;&#120;&#46;&#106;&#x70;&#x67; 1400w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-20T09:39:04+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1336\">Sichere Programmierung<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-20T09:39:04+02:00<\/span><span>20. April  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Sichere Programmierung<\/span><\/span><\/span><\/p><\/div><\/article><\/section><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":1598,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,4],"tags":[9,11,15],"class_list":["post-1591","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vorlesung_archiv","category-vorlesung","tag-it-sicherheit","tag-kryptographie","tag-vorlesung"],"_links":{"self":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts\/1591","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1591"}],"version-history":[{"count":20,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts\/1591\/revisions"}],"predecessor-version":[{"id":1914,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts\/1591\/revisions\/1914"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/media\/1598"}],"wp:attachment":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}