Bonn-Aachen International Center
for Information Technology

Imprint

cosec

students

science

city life
cosec >students >Teaching >Winter 2014/2015 

Topics in Applied Cryptography/Advanced cryptography: symmetric primitives

This course is listed in Aachen Campus as Advanced cryptography: symmetric primitives, in Bonn Basis as MA-INF 3311 - Topics in Applied Cryptography: symmetric primitives.

Responsible

Prof. Dr. Joachim von zur Gathen

Lecture

Michael Nüsken

Tutorial

Michael Nüsken

Time & Place

First meeting: Tuesday, 21 October 2013.

Contents

The most prominent cryptography in the last decades dealt with public key cryptography. However, also many new symmetric ciphers and other primitives were created. They are at the center of this course:

Which symmetric primitives are used? And what can we say about their security?

Most of you have probably heard of the AES or the SHA3. They are important cornerstones of modern systems but there are many further systems at various scales. Encryption schemes for blocks or streams, hash functions, message authentication codes, pseudorandom functions. Each of them has its own enemies, like differential and linear cryptanalysis, and security notions, like one-wayness and IND-CCA security.

How are they used? And what do we need to know about their security?

Moreover, these primitives are part of a variety of higher protocols, like IPsec, TLS or SSH. Recently, some of them have been proved secure in an appropriate security notion and, of course, based on the security of the used primitives.

Exam

Pre-exam meeting: 17 March 2015, 1100, b-it 1.25.
Exam:
20 March 2015, between 1300 and 1600, b-it Rheinsaal.
Post-exam mee
ting: 25 March 2015, 1400-1500, b-it 1.25.
Second
exam (repetitions only): according to prior agreement (possibly 13 April 2015, between 1400 and 1700).
Post-exam meeting 2: according to prior agreement (possibly 29 April 2015, 1230-1300).

Notes

The screen notes (PDF) contain all handwritten stuff (last updated 28 January 2015, 15:59).

Exercises

Literature

Prerequisites

Basic knowledge in cryptography is required.

Allocation

4+2 SWS.

Mailinglist

We will put each member on the mailing list

[Sorry, you need to enable Javascript to see this.]
. You can also subscribe yourself. The list is intented for all participants of the course as a platform for discussions around the topic. Furthermore, announcements regarding the course are made here.

Imprint, webmaster & more