Cryptography
This course is listed in Aachen Campus as Cryptography, in Bonn Basis as MA-INF1103 Cryptography.
Lecture
Tutorial
Time & Place
- Monday, 1245-1415, b-it bitmax.
- Thursday, 1215-1345, b-it bitmax.
- Tutorial: Monday 1430-1600, b-it bitmax.
First meeting: 2 November 2015, 1245.
Extra meeting: Wednesday, 3 February 2016, 1300, b-it 2.1.
Exam
Pre-exam meeting: Tuesday, 8 March 2016, 1000, b-it Rheinsaal.
Exam: Tuesday, 15 March 2016, 1000, b-it bitmax.
Post-exam meeting: Tuesday, 29 March 2016, 1000, b-it bitmax.
Exam2 (repetitions only): Friday, 29 April 2016, 1100, b-it bitmax.
Post-exam2 meeting: Tuesday, 24 May 2016, 1100, b-it 1.25.
Contents
Cryptography deals with methods for secure data transfer. In earlier times this was the domain of military and intelligence agencies, but today modern cryptography has grown into a key technology, enabling e-commerce and secure internet communications. Its many applications range from credit and debit cards, mobile phones, tv decoders, and electronic money to unforgeable electronic signatures under orders and contracts in the internet. In the course, we first discuss two of the current standard tools, namely AES and RSA. Further topics are key exchange, including group cryptography and discrete logarithm, digital signatures and identification, and cryptographic hash functions.
Notes
The screen notes (Part1: PDF, Part2: PDF 5.7MB) contain all presented stuff (last updated 10 March 2016, 17:11).
Exercises
- Sheet 1 (PDF, last updated 02 November 2015, 18:05).
- File 01-2.txt, last updated 02 November 2015, 18:04.
- Sheet 2 (PDF, last updated 09 November 2015, 16:12).
- File 02-1.txt, last updated 09 November 2015, 16:12.
- Sheet 3 (PDF, last updated 16 November 2015, 17:26).
- Sheet 4 (PDF, last updated 26 November 2015, 16:14).
- Sheet 5 (PDF, last updated 30 November 2015, 18:10).
- Sheet 6 (PDF, last updated 08 December 2015, 10:12).
- Sheet 7 (PDF, last updated 14 December 2015, 17:05).
- Sheet 8 (PDF, last updated 21 December 2015, 17:58).
- Sheet 9 (PDF, last updated 11 January 2016, 18:03).
- Sheet 10 (PDF, last updated 18 January 2016, 18:18).
- Sheet 11 (PDF, last updated 25 January 2016, 17:34).
Literature
- Jonathan Katz & Yehuda Lindell (2008). Introduction to Modern Cryptography, CRC Press.
- Mihir Bellare & Shafi Goldwasser (2001). Lecture Notes on Cryptography. PDF.
- Johannes A. Buchmann (2004). Introduction to Cryptography. Birkhäuser Verlag, 2nd edition. ISBN 0-387-21156-X (hardcover), 0-387-20756-2.
- Douglas R. Stinson (2005). Cryptography - Theory and Practice. Discrete Mathematics and its Applications. Chapman & Hall / CRC Press, Boca Raton FL, 3rd edition. ISBN 1584885084, 600pp. Book's page including errata. Parts of this text can be found online with GoogleBooks.
- Nigel Smart (2002), Cryptography: An Introduction. McGraw-Hill. ISBN 0-077-09987-7. This first edition is out of print, but a new edition is available online.
Literature on IPsec
- IETF (2005-2010). IPsec incl. IKEv2:
- RFC4301 Security Architecture for the Internet Protocol,
- RFC4302 IP Authentication Header,
- RFC4303 IP Encapsulating Security Payload (ESP),
- RFC4304 Extended Sequence Number (ESN) Addendum to IPsec Domain of Interpretation (DOI) for Internet Security Association and Key Management Protocol (ISAKMP),
- RFC7321 Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH),
- RFC7296 Internet Key Exchange Protocol Version 2 (IKEv2),
- RFC4307 Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2),
- RFC4308 Cryptographic Suites for IPsec,
- RFC4309 Using Advanced Encryption Standard (AES) CCM Mode with IPsec Encapsulating Security Payload (ESP).
- Internet Key Exchange (IKE) Attributes.
- Internet Key Exchange Version 2 (IKEv2) Parameters.
- "Magic Numbers" for ISAKMP Protocol.
Prerequisites
None.
Allocation
4+2 SWS.
- Master in Media Informatics: Computer and Communication Technology, 8 ECTS credits.
- Master in Computer Science at University of Bonn: MA-INF 1103, 9 CP.
Students have to register this course with POS/BASIS.
The lecture's mailing list
Students are encouraged to ask and answer any questions related to the course on the mailinglist:
You can subscribe to and unsubscribe from the mailing list using the information given on the list's Info page.