Bonn-Aachen International Center
for Information Technology





city life
cosec >students >Teaching >Winter 2013/2014 


This course is listed in Aachen Campus as Cryptography, in Bonn Basis as MA-INF1103_Cryptography.


Prof. Dr. Joachim von zur Gathen


Dr. Daniel Loebenberger

Time & Place

First meeting: 28 October 2013.

Final Exam

1st exam: 12 March 2014, 1300 - 1500, b-it bitmax.

2nd exam: 11 April 2014, 1300 - 1500, b-it bitmax.

Exam hints

Verify whether your exam exercise sheets are complete: It should contain Exercise 1 to Exercise ??. Insert your name and matrikel (student number) on each sheet. Approaches, solutions and all side calculations must be written to the given paper. Please use also the back sides. If you need extra paper ask the supervisor. Do not remove the staple!
Do write with blue or black ink!
Do not use a pencil or any other erasable pen.
The exam must be handled independently. Permitted auxiliary means are: writing materials, a pocket calculator (non-programmable, without division with remainder, without linear algebra software), and a sheet with your own notes (a two-sided DIN A4 sheet with only your own handwriting, no photocopy). Any other utilities, even own paper, are not permitted.
An attempt at deception leads to failure for this exam and possibly other measures - even if the attempt is only detected later.

The exam will carry the hints displayed on the right.

Important advice

Master students in Computer Science at University of Bonn have to register this course with POS (aka BASIS).


4+2 SWS, 8 ECTS credits. Optionally, 3+2 SWS, 6 ECTS credits.


Cryptography deals with methods for secure data transfer. In earlier times this was the domain of military and intelligence agencies, but today modern cryptography has grown into a key technology, enabling e-commerce and secure internet communications. Its many applications range from credit and debit cards, mobile phones, tv decoders, and electronic money to unforgeable electronic signatures under orders and contracts in the internet. In the course, we first discuss two of the current standard tools, namely AES and RSA. Further topics are key exchange, including group cryptography and discrete logarithm, digital signatures and identification, and cryptographic hash functions.



The lecture's mailing list

Students are encouraged to ask and answer any questions related to the course on the mailinglist:

[Sorry, you need to enable Javascript to see this.]

You can subscribe to and unsubscribe from the mailing list using the information given on the list's Info page.


Additional files


Imprint, webmaster & more