Bonn-Aachen International Center
for Information Technology





crypto >Students >Teaching >Winter 2018/19 


This course is listed in Aachen carpediem as Cryptography, in Bonn Basis as MA-INF 1103 - Cryptography.


Michael Nüsken

Time & Place

First meeting: Monday, 22 October 2018.


Notice: As soon as you open the exam, you agree to stay the full examination time. This is necessary to allow one person at a time visiting the restroom.

Exam hints

Verify whether your exam exercise sheets are complete: It should contain Exercise 1 to Exercise ??. Insert your name and matrikel (student number) on each sheet. Approaches, solutions and all side calculations must be written to the given paper. Please use also the back sides. If you need extra paper ask the supervisor. Do not remove the staple!
Do write with blue or black ink!
Do not use a pencil or any other erasable pen.  
The exam must be handled independently. Permitted auxiliary means are: writing materials, a pocket calculator (non-programmable, without division with remainder, without linear algebra software), and a cheat sheet, DIN A4, two-sided, written only with your own handwriting. Any other utilities, even own paper, are not permitted.
An attempt at deception leads to failure for this exam and possibly other measures - even if the attempt is only detected later.  

The exam will carry the hints displayed on the right.

Pre-exam meeting: Thursday, 7 February 2019, 1415, room b-it 2.122.

Exam: Monday, 11 February 2019, 1500-1800, room b-it bit-max (0.109).

Post-exam meeting: Wednesday, 6 March 2019, 1400, room b-it 2.122.

Exam2 (repetitions only): Wednesday, 20 March 2019, 1200-1500, room b-it 0.107.

Post-exam2: tba.

Notes & Exercises

You find notes and exercises at sciebo until September 2019.

Remark: As a student of the University of Bonn or RWTH Aachen you can register an account and install a synchronization tool with sciebo, a university internal ownCloud.


Cryptography deals with methods for secure data transfer. In earlier times this was the domain of military and intelligence agencies, but today modern cryptography has grown into a key technology, enabling e-commerce and secure internet communications. Its many applications range from credit and debit cards, mobile phones, tv decoders, and electronic money to unforgeable electronic signatures under orders and contracts in the internet.

In the course, we discuss two of the current standard tools, namely AES and RSA. Further topics are key exchange, including group cryptography and discrete logarithm, digital signatures and identification, and cryptographic hash functions. We will consider these primitives in the modern light of reducible security (or provable security).


There is a long list of free online books about cryptography.

Further topics:




4+2 SWS.

The lecture's mailing list

Students are encouraged to ask and answer any questions related to the course on the mailinglist:

You can subscribe to and unsubscribe from the mailing list using the information given on the list's Info page.

Impressum, webmaster & mehr


Geben Sie Ihren Benutzernamen und Ihr Passwort ein, um sich an der Website anzumelden:

Passwort vergessen?
Neues Profil