Organization

Exam:

The final results of the exam can be downloaded here.

The preliminary results of the 2nd exam can be downloaded here. The review will take place next Tuesday (August 15) at 11am in our seminar room (36-438).

Lecture:

On Tuesdays at 10:00 - 11:30 in 13-222

Exercises:

See below

Contact:

Prof. Dr.-Ing. Jens Schmitt
M.Sc. Carolina Nogueira
M.Sc. Matthias Schäfer
M.Sc. Paul Nikolaus
or follow us on Twitter

Course Overview

This course gives an introduction to secure communication in computer networks. Topics covered in this lecture include:

  • history of secure communication
  • symmetric cryptography: DES, 3DES, AES
  • asymmetric cryptography: RSA, Diffie-Hellman, El Gamal
  • hash functions: SHA1, MD5
  • cryptographic protocols: Secret Sharing, Needham-Schroeder, Kerberos, X.509
  • other security relevant topics: random number generation, birthday problem

Slides

The slides are accessible only from within the university network (131.246.*). Please use SSH or VPN for remote access.

Chapter Title Slides
0 Organization PDF
1 Introduction PDF
2 Symmetric Cryptography PDFa      PDFb
3 Asymmetric Cryptography PDFa      PDFb
4 Modification Detection Codes PDF
5 Cryptographic Protocols PDFa      PDFb      PDFc     PDFd

Material/Literature

  • The nice and comprehensive Handbook of Applied Cryptography by Menezes, van Oorschot and Vanstone is available online for free and can be found here.
  • An extra course about cryptography can be found here.
  • A illustrative video about the discrete logarithm problem.
  • ECC Visualization (java)

 

Exercises

Mode: Every two weeks
Start: 16.-18. November
Place: 36-438
Registration:          is closed

The exercise sheets are accessible only from within the university network (131.246.*). Please use SSH or VPN for remote access.

Published Covered Topics Download
11.11.2016 Introduction, Symmetric Cryptography PDF
25.11.2016 DES, Differential Cryptanalysis, Modes of Operation PDF Supplement
12.12.2016 Chinese Remainder Theorem, RSA, Diffie-Helman PDF
09.01.2017 ElGamal, Elliptic Curve Cryptography, Cryptographic Hash Functions PDF
27.01.2017 Criptographic Protocols for Entity Authentication, Secret Sharing, Bit Commitment, Fair Coin Tossing PDF

 

 

 

University of Kaiserslautern

Write your thesis with a disco advisor

We offer a variety of bachelor and master theses at any point in the academic year. Also check out some of our completed theses. Read more...

Go to top