Organization
Exam: |
The final results of the exam can be downloaded here. The preliminary results of the 2nd exam can be downloaded here. The review will take place next Tuesday (August 15) at 11am in our seminar room (36-438). |
Lecture: |
On Tuesdays at 10:00 - 11:30 in 13-222 |
Exercises: |
See below |
Contact: |
Prof. Dr.-Ing. Jens Schmitt |
Course Overview
This course gives an introduction to secure communication in computer networks. Topics covered in this lecture include:
- history of secure communication
- symmetric cryptography: DES, 3DES, AES
- asymmetric cryptography: RSA, Diffie-Hellman, El Gamal
- hash functions: SHA1, MD5
- cryptographic protocols: Secret Sharing, Needham-Schroeder, Kerberos, X.509
- other security relevant topics: random number generation, birthday problem
Slides
The slides are accessible only from within the university network (131.246.*). Please use SSH or VPN for remote access.
Chapter | Title | Slides |
---|---|---|
0 | Organization | |
1 | Introduction | |
2 | Symmetric Cryptography | PDFa PDFb |
3 | Asymmetric Cryptography | PDFa PDFb |
4 | Modification Detection Codes | |
5 | Cryptographic Protocols | PDFa PDFb PDFc PDFd |
Material/Literature
- The nice and comprehensive Handbook of Applied Cryptography by Menezes, van Oorschot and Vanstone is available online for free and can be found here.
- An extra course about cryptography can be found here.
- A illustrative video about the discrete logarithm problem.
- ECC Visualization (java)
Exercises
Mode: | Every two weeks |
Start: | 16.-18. November |
Place: | 36-438 |
Registration: | is closed |
The exercise sheets are accessible only from within the university network (131.246.*). Please use SSH or VPN for remote access.
Published | Covered Topics | Download |
---|---|---|
11.11.2016 | Introduction, Symmetric Cryptography | |
25.11.2016 | DES, Differential Cryptanalysis, Modes of Operation | PDF Supplement |
12.12.2016 | Chinese Remainder Theorem, RSA, Diffie-Helman | |
09.01.2017 | ElGamal, Elliptic Curve Cryptography, Cryptographic Hash Functions | |
27.01.2017 | Criptographic Protocols for Entity Authentication, Secret Sharing, Bit Commitment, Fair Coin Tossing |