diff options
author | Philipp Gesang <gesang@stud.uni-heidelberg.de> | 2012-06-17 14:49:05 +0200 |
---|---|---|
committer | Philipp Gesang <gesang@stud.uni-heidelberg.de> | 2012-06-17 14:49:05 +0200 |
commit | 12fb8d5bd65dccf4f8473a9eeb134589f17cad60 (patch) | |
tree | cfce207ff6e8f1745836682f6af121fa39b07bf6 /doc/context/third/enigma/examples/enigma-example-latex.tex | |
parent | bdc2513f4f7d1df90f11266530aa29a8f2c64d5c (diff) | |
download | enigma-12fb8d5bd65dccf4f8473a9eeb134589f17cad60.tar.gz |
[all] reflow files to 71 chars per line limit
Diffstat (limited to 'doc/context/third/enigma/examples/enigma-example-latex.tex')
-rw-r--r-- | doc/context/third/enigma/examples/enigma-example-latex.tex | 34 |
1 files changed, 18 insertions, 16 deletions
diff --git a/doc/context/third/enigma/examples/enigma-example-latex.tex b/doc/context/third/enigma/examples/enigma-example-latex.tex index 66d84d1..f2113c1 100644 --- a/doc/context/third/enigma/examples/enigma-example-latex.tex +++ b/doc/context/third/enigma/examples/enigma-example-latex.tex @@ -1,41 +1,42 @@ \documentclass[a5paper]{scrartcl} \parindent0pt -%······································································% +%%····································································% \usepackage {enigma} -%%·····································································% +%%····································································% %% The first machine will be used for encryption of our plain text. \defineenigma {encryption} \setupenigma {encryption} { - other_chars = yes, - day_key = B V III II 12 03 01 GI JV KZ WM PU QY AD CN ET FL, + other_chars = yes, + day_key = B V III II 12 03 01 GI JV KZ WM PU QY AD CN ET FL, rotor_setting = ben, - spacing = yes, - verbose = 3, + spacing = yes, + verbose = 2, } -%%·····································································% +%%····································································% %% This second machine below will be used to decrypt the string. It is %% initialized with exactly the same settings as the first one. The -%% reason for this is that we can’t reuse the “encryption” machine as it -%% will already have progressed to some later state after the +%% reason for this is that we can’t reuse the “encryption” machine as +%% it will already have progressed to some later state after the %% encryption. Applying it on the ciphertext would yield a totally %% different string. Hence the need for another machine. \defineenigma{decryption} \setupenigma{decryption}{ - other_chars = yes, - day_key = B V III II 12 03 01 GI JV KZ WM PU QY AD CN ET FL, + other_chars = yes, + day_key = B V III II 12 03 01 GI JV KZ WM PU QY AD CN ET FL, rotor_setting = ben, } -%%·····································································% +%%····································································% \begin{document} -%%·····································································% +%%····································································% %% Ciphertext in the PDF. Rely on the addressee to decrypt the document %% externally. \startencryption - Never underestimate the amount of money, time, and effort someone will expend to thwart a security system. + Never underestimate the amount of money, time, and effort someone + will expend to thwart a security system. \stopencryption -%%·····································································% +%%····································································% %% Input string generated with: %% mtxrun --script t-enigma \ %% --setup="day_key=B V III II 12 03 01 GI JV KZ WM PU QY AD CN ET FL,\ @@ -47,5 +48,6 @@ \startdecryption aqsnwyxgqarpuzrdktscbslaqmdhyonywxkwhcdgphvuqsspfjwhlszahygjbzmfpcpbniahvfcuradntepxsfchnn \stopdecryption -%%·····································································% +%%····································································% \end{document} +% vim:ft=tex:tw=71:expandtab:ts=2:sw=2 |