Bonn-Aachen International Center
for Information Technology

Imprint

cosec

students

science

city life
cosec >students >Teaching >Winter 2011/2012 

Advanced Cryptography: light-weight cryptography

Corresponding entry in Aachen Campus, Bonn Basis.

Responsible

Prof. Dr. Joachim von zur Gathen

Lecture

Michael Nüsken

Tutorial

Daniel Loebenberger

Time & Place

First meeting: Tuesday, 25 October 2011.

All times subject to agreement in class.

Exam

Pre-exam meeting: tba.

Exam: Thursday, 01 March 2012, 1100-1400, b-it-max.

Post-exam meeting: tba.

Second exam (repetitions only): Friday, 27 April 2012, 1000-1300, b-it-max.

Post-exam meeting 2: tba.

Notes

The screen notes (PDF) contain all handwritten stuff (last updated 02 February 2012, 14:59).

Exercises

Sources

Here you find some useful code examples:

Prerequisites

Basic knowledge in cryptography is required.

Contents

Many small devices spread in the world: mobile phones, processors in cars, RFID tags on articles, sensor arrays. Their designers want them to communicate with each other. This is easy as long as there is no adversary. But that is real fiction. So we have to deal with the protection of communication and computation. Well, there's plenty of cryptography to do that: primitives, schemes and protocols. In cryptography we mostly deal with symmetric ciphers designed to have a very high throughput under very strong security demands and with asymmetric schemes and protocols designed for high security. However, all this either runs on specialized hardware or on fast and powerful computers. However, leight-weight cryptography is directed to weak devices and shall still grant a suitable security level. The problem is that these devices have only low power and few energy, their size is very limited, the communication bandwidth may be comparatively small, their lifetime is usually short and they are much easier to capture. Typical processors range from 8 bit, 4 Mhz variants to 64 bit, 80 Mhz processors, this is a wide range but definitely much weaker than a PC. One has to walk a thin line between good crypto and fast and energy efficient mechanisms.

Literature

Allocation

4+2 SWS, 8 credits. Optionally, 3+2 SWS, 6 credits.

Successful completion of the course yields 8 credit points. For students who only want 6 credit points, a breakpoint at about 3/4 of the teaching time will be defined, and only the course material up to that point will be relevant for their exams and grades.

Mailinglist

We will put each member on the mailing list

[Sorry, you need to enable Javascript to see this.]
. You can also subscribe yourself. The list is intented for all participants of the course as a platform for discussions around the topic. Furthermore, announcements regarding the course are made here.

Imprint, webmaster & more