summaryrefslogtreecommitdiff
path: root/doc/context/third/enigma/examples/enigma-example-plain.tex
diff options
context:
space:
mode:
authorPhilipp Gesang <gesang@stud.uni-heidelberg.de>2012-06-17 14:49:05 +0200
committerPhilipp Gesang <gesang@stud.uni-heidelberg.de>2012-06-17 14:49:05 +0200
commit12fb8d5bd65dccf4f8473a9eeb134589f17cad60 (patch)
treecfce207ff6e8f1745836682f6af121fa39b07bf6 /doc/context/third/enigma/examples/enigma-example-plain.tex
parentbdc2513f4f7d1df90f11266530aa29a8f2c64d5c (diff)
downloadenigma-12fb8d5bd65dccf4f8473a9eeb134589f17cad60.tar.gz
[all] reflow files to 71 chars per line limit
Diffstat (limited to 'doc/context/third/enigma/examples/enigma-example-plain.tex')
-rw-r--r--doc/context/third/enigma/examples/enigma-example-plain.tex31
1 files changed, 17 insertions, 14 deletions
diff --git a/doc/context/third/enigma/examples/enigma-example-plain.tex b/doc/context/third/enigma/examples/enigma-example-plain.tex
index 87ce9b1..ba2157d 100644
--- a/doc/context/third/enigma/examples/enigma-example-plain.tex
+++ b/doc/context/third/enigma/examples/enigma-example-plain.tex
@@ -1,37 +1,40 @@
\parindent0pt
-%%·····································································%
+%%····································································%
\input {enigma}
-%%·····································································%
+%%····································································%
%% The first machine will be used for encryption of our plain text.
\defineenigma {encryption}
\setupenigma {encryption} {
- other_chars = yes,
- day_key = B V III II 12 03 01 GI JV KZ WM PU QY AD CN ET FL,
+ other_chars = yes,
+ day_key = B V III II 12 03 01 GI JV KZ WM PU QY AD CN ET FL,
rotor_setting = ben,
+ spacing = yes,
+ verbose = 1,
}
-%%·····································································%
+%%····································································%
%% This second machine below will be used to decrypt the string.
\defineenigma{decryption}
\setupenigma{decryption}{
- other_chars = yes,
- day_key = B V III II 12 03 01 GI JV KZ WM PU QY AD CN ET FL,
+ other_chars = yes,
+ day_key = B V III II 12 03 01 GI JV KZ WM PU QY AD CN ET FL,
rotor_setting = ben,
}
-%%·····································································%
+%%····································································%
%% main
-%%·····································································%
+%%····································································%
%% Ciphertext in the PDF. Rely on the addressee to decrypt the document
%% externally.
-%%·····································································%
+%%····································································%
%% encryption of plain text
-%%·····································································%
+%%····································································%
\startencryption
- Never underestimate the amount of money, time, and effort someone will expend to thwart a security system.
+ Never underestimate the amount of money, time, and effort someone
+ will expend to thwart a security system.
\stopencryption
-%%·····································································%
+%%····································································%
%% decryption of ciphertext
-%%·····································································%
+%%····································································%
%% Input string generated with:
%% mtxrun --script t-enigma \
%% --setup="day_key=B V III II 12 03 01 GI JV KZ WM PU QY AD CN ET FL,\