Organization
News: |
The last lecture takes place on Tuesday 11th February 2020. The exercise on Thursday 13th February will be a question and answer session. |
Lecture: |
Tuesdays, 10:00-11:30, in room 13-222 |
Exercises: |
Thursday, 15:30 - 17:00, in room 36-438 |
Exam: |
Oral exams are conducted on February 20, April 21 & June 8-10, July 3rd and August 4th. In order to register for them, please contact our secretary Mrs. Gerber (This email address is being protected from spambots. You need JavaScript enabled to view it., room 36-430) |
Contact: |
Prof. Dr.-Ing. Jens Schmitt |
Course Overview
This course gives an introduction to secure communication in computer networks. Topics covered in this lecture include:
- history of secure communication
- symmetric cryptography: DES, 3DES, AES
- asymmetric cryptography: RSA, Diffie-Hellman, El Gamal
- hash functions: MD5, SHA1, SHA2, SHA3
- cryptographic protocols: Secret Sharing, Needham-Schroeder, Kerberos, X.509
- other security relevant topics: random number generation, birthday problem
Slides
The slides are accessible only from within the university network (131.246.*). Please use SSH or VPN for remote access.
Chapter | Title | Slides | Last Updated |
---|---|---|---|
0 | Organization | 29.08.2019 | |
1 | Introduction | 29.08.2019 | |
2 | Symmetric Crypto | PDFa, PDFb, PDFc | 19.11.2019 |
3 | Asymmetric Crypto | 26.11.2019 | |
4 | Modification Check Values | PDFa, PDFb | 16.12.2019 |
5 | Cryptographic Protocols | 03.01.2020 | |
6 | Post Quantum Cryptography | 11.02.2020 | |
7 | Real World Protocols | 11.02.2020 |
Material/Literature
- The nice and comprehensive Handbook of Applied Cryptography by Menezes, van Oorschot and Vanstone is available online for free and can be found here.
- An extra course about cryptography can be found here.
- A illustrative video about the discrete logarithm problem.
- ECC Visualization (java)
- An example of differential Cryptanalysis can be found here.
- An example of a MD5-collistion with two images can be found here.
Exercises
The exercise sheets are accessible only from within the university network (131.246.*). Please use SSH or VPN for remote access.
Published | Covered Topics | Exercise date | Download | ||
---|---|---|---|---|---|
04.11.2019 | Basics, Feistel Network, Monoalphabetic Cipher | 14.11.2019 | exercise1 | solution1 | 14.11.2019 |
19.11.2019 | DES, differential cryptanalysis, modes of operation | 28.11.2019 | exercise2 | solution2 | 19.11.2019 |
09.12.2019 | Chinese Remainder Theorem, RSA, Diffie-Hellmann | 19.12.2019 | exercise3 | solution3 | 09.12.2019 |
03.01.2020 | ElGamal, Elliptic Curve Crypto, Hash Functions | 16.01.2020 | exercise4 | solution4 | 22.01.2020 |
21.01.2020 | Enitity Authentication, Secret Sharing, Fair Coin Tossing | 30.01.2020 | exercise5 | solution5 | 21.01.2020 |