%PDF-1.4 5 0 obj << /S /GoTo /D (section.1) >> endobj 8 0 obj (Kryptografia klasyczna --- wstep) endobj 9 0 obj << /S /GoTo /D (subsection.1.1) >> endobj 12 0 obj (Literatura) endobj 13 0 obj << /S /GoTo /D (subsection.1.2) >> endobj 16 0 obj (Terminologia) endobj 17 0 obj << /S /GoTo /D (subsection.1.3) >> endobj 20 0 obj (Gl\363wne postacie) endobj 21 0 obj << /S /GoTo /D (subsection.1.4) >> endobj 24 0 obj (Kanal lacznosci) endobj 25 0 obj << /S /GoTo /D (section.2) >> endobj 28 0 obj (Proste szyfry) endobj 29 0 obj << /S /GoTo /D (subsection.2.1) >> endobj 32 0 obj (Szyfr Cezara szyfr podstawieniowy monoalfabetyczny) endobj 33 0 obj << /S /GoTo /D (subsection.2.2) >> endobj 36 0 obj ( Szyfr Vigen\350re'a) endobj 37 0 obj << /S /GoTo /D (subsection.2.3) >> endobj 40 0 obj (Szyfr Vernama \(one-time pad\)) endobj 41 0 obj << /S /GoTo /D (section.3) >> endobj 44 0 obj (Wsp\363lczesne kryptosystemy) endobj 45 0 obj << /S /GoTo /D (subsection.3.1) >> endobj 48 0 obj (Systemy z kluczem tajnym) endobj 49 0 obj << /S /GoTo /D (subsection.3.2) >> endobj 52 0 obj (Systemy z kluczem publicznym) endobj 53 0 obj << /S /GoTo /D (section.4) >> endobj 56 0 obj (Kryptografia bardziej formalnie) endobj 57 0 obj << /S /GoTo /D (subsection.4.1) >> endobj 60 0 obj (Szyfrowanie i deszyfrowanie) endobj 61 0 obj << /S /GoTo /D (subsection.4.2) >> endobj 64 0 obj (Algorytmy) endobj 65 0 obj << /S /GoTo /D (subsection.4.3) >> endobj 68 0 obj (Przyklad kryptogramu) endobj 69 0 obj << /S /GoTo /D (subsection.4.4) >> endobj 72 0 obj (Podstawowe zastosowania) endobj 73 0 obj << /S /GoTo /D (subsection.4.5) >> endobj 76 0 obj (Jak to dziala: algorytm symetryczny) endobj 77 0 obj << /S /GoTo /D (subsection.4.6) >> endobj 80 0 obj (Jak to dziala: algorytm asymetryczny) endobj 81 0 obj << /S /GoTo /D (subsection.4.7) >> endobj 84 0 obj (Kryptosystem hybrydowy) endobj 85 0 obj << /S /GoTo /D (subsection.4.8) >> endobj 88 0 obj (Podpis cyfrowy: kryptosystem z kluczem publicznym) endobj 89 0 obj << /S /GoTo /D (subsection.4.9) >> endobj 92 0 obj (Jednokierunkowe funkcje hashujace \(skr\363tu\)) endobj 93 0 obj << /S /GoTo /D (subsection.4.10) >> endobj 96 0 obj (Elektroniczny notariusz) endobj 97 0 obj << /S /GoTo /D (subsection.4.11) >> endobj 100 0 obj (Operacja xor i szyfr Vernama) endobj 101 0 obj << /S /GoTo /D [102 0 R /Fit ] >> endobj 104 0 obj << /Length 487 /Filter /FlateDecode >> stream xڵM0>&L=c?8"Jpārhvv6+N مj%Phl@;'d}YϾ/v7pq%ZAڀ IZq->0?Hi]%Sc.[o&`0@(? J-ăVD,*'(k_Rk(Fl{Ϙ9P6&Vx]o`EQ_wJcQ>wmٕR*ݔw7~F.!Q) h_,]03v{$ <3EQ9EJ[f5MqWb