Summer 2011
Note that the courses require knowledge in Cryptography, see our programme. This is for example provided by the course Cryptography in the past winter.
- Monday, 1300-1430, b-it bitmax.
- Thursday, 1300-1430, b-it bitmax.
- Tutorial: Monday, 1445-1615, b-it bitmax.
First tutorial: Monday, 18 April 2011 at 1445, b-it bitmax.
The art of cryptography: algorithmic cryptanalysis
(4+2 SWS, 8 credits. Optionally, 3+2 SWS, 6 credits.
)
Daniel Loebenberger and Konstantin ZieglerTutorial: Daniel Loebenberger and Konstantin Ziegler
The analysis of cryptographic algorithms requires algorithmic techniques from many areas:
While for symmetric algorithms probabilistic methods like linear and differential cryptanalysis are employed, one uses properties of certain algebraic structures like number fields, lattices or elliptic curves for the analysis of asymmetric algorithms.
In the lecture we will focus on both: symmetric and asymmetric cryptanalysis. After describing the basic tools that we are going to work with, we will delve into the various methods of breaking cryptographic algorithms.
While for symmetric algorithms probabilistic methods like linear and differential cryptanalysis are employed, one uses properties of certain algebraic structures like number fields, lattices or elliptic curves for the analysis of asymmetric algorithms.
In the lecture we will focus on both: symmetric and asymmetric cryptanalysis. After describing the basic tools that we are going to work with, we will delve into the various methods of breaking cryptographic algorithms.
- Tuesday, 1330-1500, b-it Rheinsaal.
- Wednesday, 1330-1500, b-it Rheinsaal.
- Tutorial: Tuesday, 1515-1645, b-it Rheinsaal.
Esecurity: secure internet & e-passports (4+2 SWS, 8 credits. Optionally, 3+2 SWS, 6 credits. )
Michael NüskenTutorial: Raoul Blankertz
This course is about various aspects of security in the internet. In the first part we deal with secure connections, whereas the second part considers electronic voting schemes involving further tasks.
- Who can read my email?
- How do I know that eBay is eBay, or amazon is amazon?
- What is the public key of Angela Merkel? Where do I get it and how do I verify that ...
- Monday, 1630-1800, b-it 2.1.
Seminar block cipher cryptanalysis
(2 SWS, 4 credits
)
Prof. Dr. Joachim von zur Gathen, Yona Raekow- Tuesday 1700 - 1900, b-it 1.25.
Seminar Advanced Topics in Crytography (2 SWS, 4 credits. )
Michael Nüsken
The topic is not yet determined. Previous instantiations dealt with Fuzzy Coding Theory, Zero-Knowledge, PCP, Ellitpic Curve Theory, ... In any case the topic will try to dig deeper than what you expect in a standard course or seminar.
This semester we essentially continue last semester's topic:
Mobile Security.
- Thursday 1500-1715, b-it 1.25.
Oberseminar Computer Security, Summer 2011
Prof. Dr. Joachim von zur Gathen
The seminar discusses subjects of current interest in computer security. Some of the lectures will be given by invited guests.