Bonn-Aachen International Center
for Information Technology

Imprint

cosec

students

science

city life
cosec >students >Teaching >Winter 2010/2011 

Advanced Cryptography: quantum cryptography

Corresponding entry in Aachen Campus, Bonn Basis (Lecture, Tutorial).

Responsible

Prof. Dr. Joachim von zur Gathen

Lecture

Michael Nüsken.

Tutorial

Daniel Loebenberger.

Time & Place

First meeting: Tuesday, 26 October 2010, 1330, b-it Rheinsaal.

All times subject to agreement in class. (Before 12 November instead of Monday the course took place on Wednesday.)

Notes

The screen notes (PDF) contain all handwritten stuff (last updated 01 February 2011, 16:01).

Exercises

Prerequisites

Basic knowledge in cryptography is required.

Contents

Cryptography is affected two-fold by quantum theoretical ideas: quantum channels and quantum computers.

Quantum effects may be used to transmit secrets securely through a so-called quantum channel. Any tampering can be detected by the conversation parties with high probability. Based on these absolutely secure cryptography is possible. Well, unless the physics has not been understood correctly...

There is a theoretical model of quantum computers.  On these theoretical quantum Turing machines factoring can be solved in polynomial time. However, physical realization of quantum computers is tricky: All efforts during the last two decades have only led to quantum computers with up to 12 qubits which is just enough to factor the integer 15.  Nevertheless this shows that factoring and also discrete logarithm based cryptosystems may be attackable in the near future.  Because of this and to enlarge the basis of cryptographic security new cryptographic systems based on other primitives are needed.  The pitfall and challenge is that most systems constructed so far have been shown too weak.

The course intends to show the quantum theory needed and the computational model(s) of quantum computers, use them to break factoring and discrete logarithm problems, and have a look at candidates for systems that (hopefully) cannot be attacked by quantum computers as well.

Literature

Allocation

4+2 SWS, 8 credits. Optionally, 3+2 SWS, 6 credits.

Successful completion of the course yields 8 credit points. For students who only want 6 credit points, a breakpoint at about 3/4 of the teaching time will be defined, and only the course material up to that point will be relevant for their exams and grades.

Mailinglist

We will put each member on the mailing list

[Sorry, you need to enable Javascript to see this.]
. You can also subscribe yourself. The list is intented for all participants of the course as a platform for discussions around the topic. Furthermore, announcements regarding the course are made here.

Imprint, webmaster & more