Cryptography
This course is listed in Aachen Campus as Cryptography, in Bonn Basis as MA-INF1103 Cryptography.
Exam hints
Verify whether your exam exercise sheets are complete: It should contain Exercise 1 to Exercise ??. Insert your name and matrikel (student number) on each sheet. Approaches, solutions and all side calculations must be written to the given paper. Please use also the back sides. If you need extra paper ask the supervisor. Do not remove the staple!Do not use a pencil or any other erasable pen.
The exam must be handled independently. Permitted auxiliary means are: writing materials, a pocket calculator (non-programmable, without division with remainder, without linear algebra software), and a sheet with your own notes (a two-sided DIN A4 sheet with only your own handwriting, no photocopy). Any other utilities, even own paper, are not permitted.
The exam will carry the hints displayed on the right.
Lecture
Priv.-Doz. Dr. Adrian Spalka
Tutorial
Time & Place
- Monday, 1300-1430, B-IT Rheinsaal.
- Thursday, 1000-1200, B-IT bitmax.
- Tutorial: Monday 1445-1615, B-IT Rheinsaal.
First meeting: 23 October 2014.
Final Exam
1st exam: 11 February 2015, 1300 - 1500, B-IT bitmax.
2nd exam: 25 March 2015, 1300 - 1500, B-IT Rheinsaal.
Contents
Cryptography deals with methods for secure data transfer. In earlier times this was the domain of military and intelligence agencies, but today modern cryptography has grown into a key technology, enabling e-commerce and secure internet communications. Its many applications range from credit and debit cards, mobile phones, tv decoders, and electronic money to unforgeable electronic signatures under orders and contracts in the internet. In the course, we focus on secure cloud-based information systems. There, we consider the administrator of the cloud as compromised and perform client-side security measures only. Still, the cloud provider needs to be able to give performant access to the stored data while maintaining specific access restrictions for the users.
Lecture notes
The slides for the lectures can be found here (pdf).
Additional Slides
- Introduction (PDF, last updated 29 October 2014, 11:46).
- Diffie-Hellman key exchange (PDF, last updated 29 October 2014, 11:49).
- Passwords (PDF, last updated 03 November 2014, 19:29).
- Hash functions (PDF, last updated 20 November 2014, 10:29).
- Identification and authentication (PDF, last updated 04 December 2014, 10:46).
- The Advanced Encryption Standard (PDF, last updated 10 December 2014, 12:49).
- Modes of operation (PDF, last updated 07 January 2015, 16:47).
- ElGamal encryption and RSA (PDF, last updated 15 January 2015, 12:19).
- Primality testing (PDF, last updated 22 January 2015, 10:48).
- Signatures (PDF, last updated 09 February 2015, 13:57).
- Elliptic curves (PDF, last updated 06 February 2015, 15:15).
Exercises
- Sheet 1 (PDF, last updated 30 October 2014, 10:21).
- Sheet 2 (PDF, last updated 03 November 2014, 19:31).
- Sheet 3 (PDF, last updated 13 November 2014, 09:58).
- Sheet 4 (PDF, last updated 24 November 2014, 08:59).
- Sheet 5 (PDF, last updated 27 November 2014, 16:04).
- Sheet 6 (PDF, last updated 10 December 2014, 12:49).
- Sheet 7 (PDF, last updated 11 December 2014, 10:22).
- Sheet 8 (PDF, last updated 18 December 2014, 10:48).
- Sheet 9 (PDF, last updated 08 January 2015, 11:23).
- Sheet 10 (PDF, last updated 22 January 2015, 10:50).
- Sheet 11 (PDF, last updated 22 January 2015, 11:21).
- Sheet 12 (PDF, last updated 30 January 2015, 16:25).
Additional files
- NIST special publication 800-63-2 (pdf)
- Diceware word list (txt)
- Denning, Dorothy Elizabeth Robling (1982). "Cryptography and Data Security". Addison-Wesley. ISBN 0-201-10150-5.
- A 1024bit prime (txt)
- The cryptanalytic challenge (txt)
The lecture's mailing list
Students are encouraged to ask and answer any questions related to the course on the mailinglist:
You can subscribe to and unsubscribe from the mailing list using the information given on the list's Info page.
Allocation
4+2 SWS.
- Master in Media Informatics: Computer and Communication Technology, 8 ECTS credits.
- Master in Computer Science at University of Bonn: MA-INF 1103, 9 CP.
Students have to register this course with POS/BASIS.
Prerequisites
None.