Bonn-Aachen International Center
for Information Technology

Imprint

cosec

students

science

city life
cosec >students >Teaching >Winter 2014/2015 

Cryptography

This course is listed in Aachen Campus as Cryptography, in Bonn Basis as MA-INF1103 Cryptography.

Exam hints

Verify whether your exam exercise sheets are complete: It should contain Exercise 1 to Exercise ??. Insert your name and matrikel (student number) on each sheet. Approaches, solutions and all side calculations must be written to the given paper. Please use also the back sides. If you need extra paper ask the supervisor. Do not remove the staple!
 
Do write with blue or black ink!
Do not use a pencil or any other erasable pen.
 
The exam must be handled independently. Permitted auxiliary means are: writing materials, a pocket calculator (non-programmable, without division with remainder, without linear algebra software), and a sheet with your own notes (a two-sided DIN A4 sheet with only your own handwriting, no photocopy). Any other utilities, even own paper, are not permitted.
 
An attempt at deception leads to failure for this exam and possibly other measures - even if the attempt is only detected later.
 

The exam will carry the hints displayed on the right.

Lecture

Priv.-Doz. Dr. Adrian Spalka

Tutorial

Dr. Daniel Loebenberger

Time & Place

First meeting: 23 October 2014.

Final Exam

1st exam: 11 February 2015, 1300 - 1500, B-IT bitmax.

2nd exam: 25 March 2015, 1300 - 1500, B-IT Rheinsaal.

Contents

Cryptography deals with methods for secure data transfer. In earlier times this was the domain of military and intelligence agencies, but today modern cryptography has grown into a key technology, enabling e-commerce and secure internet communications. Its many applications range from credit and debit cards, mobile phones, tv decoders, and electronic money to unforgeable electronic signatures under orders and contracts in the internet. In the course, we focus on secure cloud-based information systems. There, we consider the administrator of the cloud as compromised and perform client-side security measures only. Still, the cloud provider needs to be able to give performant access to the stored data while maintaining specific access restrictions for the users.

Lecture notes

The slides for the lectures can be found here (pdf).

Additional Slides

Exercises

Additional files

The lecture's mailing list

Students are encouraged to ask and answer any questions related to the course on the mailinglist:

[Sorry, you need to enable Javascript to see this.]

You can subscribe to and unsubscribe from the mailing list using the information given on the list's Info page.

Allocation

4+2 SWS.

Prerequisites

None.

Imprint, webmaster & more