Bonn-Aachen International Center
for Information Technology





city life
cosec >students >Teaching >Winter 2014/2015 

Topics in Applied Cryptography/Advanced cryptography: symmetric primitives

This course is listed in Aachen Campus as Advanced cryptography: symmetric primitives, in Bonn Basis as MA-INF 3311 - Topics in Applied Cryptography: symmetric primitives.


Prof. Dr. Joachim von zur Gathen


Michael Nüsken


Michael Nüsken

Time & Place

First meeting: Tuesday, 21 October 2013.


The most prominent cryptography in the last decades dealt with public key cryptography. However, also many new symmetric ciphers and other primitives were created. They are at the center of this course:

Which symmetric primitives are used? And what can we say about their security?

Most of you have probably heard of the AES or the SHA3. They are important cornerstones of modern systems but there are many further systems at various scales. Encryption schemes for blocks or streams, hash functions, message authentication codes, pseudorandom functions. Each of them has its own enemies, like differential and linear cryptanalysis, and security notions, like one-wayness and IND-CCA security.

How are they used? And what do we need to know about their security?

Moreover, these primitives are part of a variety of higher protocols, like IPsec, TLS or SSH. Recently, some of them have been proved secure in an appropriate security notion and, of course, based on the security of the used primitives.


Pre-exam meeting: 17 March 2015, 1100, b-it 1.25.
20 March 2015, between 1300 and 1600, b-it Rheinsaal.
Post-exam mee
ting: 25 March 2015, 1400-1500, b-it 1.25.
exam (repetitions only): according to prior agreement (possibly 13 April 2015, between 1400 and 1700).
Post-exam meeting 2: according to prior agreement (possibly 29 April 2015, 1230-1300).


The screen notes (PDF) contain all handwritten stuff (last updated 28 January 2015, 15:59).




Basic knowledge in cryptography is required.


4+2 SWS.


We will put each member on the mailing list

[Sorry, you need to enable Javascript to see this.]
. You can also subscribe yourself. The list is intented for all participants of the course as a platform for discussions around the topic. Furthermore, announcements regarding the course are made here.

Imprint, webmaster & more