Organization
News: |
The lecture is organized via Olat. |
Lecture: |
Videos of the lecture will be uploaded in the Olat. |
Exercises: |
Exercise-sheets will be uploaded in the Olat. |
Exam: |
TBA |
Contact: |
Prof. Dr.-Ing. Jens Schmitt |
Course Overview
This course gives an introduction to secure communication in computer networks. Topics covered in this lecture include:
- history of secure communication
- symmetric cryptography: DES, 3DES, AES
- asymmetric cryptography: RSA, Diffie-Hellman, El Gamal
- hash functions: MD5, SHA1, SHA2, SHA3
- cryptographic protocols: Secret Sharing, Needham-Schroeder, Kerberos, X.509
- other security relevant topics: random number generation, birthday problem
Material/Literature
- The nice and comprehensive Handbook of Applied Cryptography by Menezes, van Oorschot and Vanstone is available online for free and can be found here.
- An extra course about cryptography can be found here.
- A illustrative video about the discrete logarithm problem.
- ECC Visualization (java)
- An example of differential Cryptanalysis can be found here.
- An example of a MD5-collistion with two images can be found here.