Bonn-Aachen International Center
for Information Technology

Michael

Students

crypt@b-it

SKy

VisKy
crypto >Students >Teaching >Winter 2020/21 
bitkey

Cryptography

This course is listed

Lecture

Michael Nüsken

Time & Place

First meeting:

You must be enroled in the moodle to enter the lecture or tutorial room.
* Until 1 December, this was 1215 c.t.-1400.

Digital teaching

The digital teaching setup is detailed on a separate page. It explains how we integrate moodle, lectures, exercise cycle, tutorial, mailing list, chat, free room and sciebo.

Hotlinks

Checklist

  • Read the digital teaching setup?
  • Considered speed grouping?
  • Enroled in moodle?
  • Used to BigBlueButton?
  • Connected to sciebo folder?
  • Sign up to mailing list?
  • (Joined on eCampus? [direct sign up])

Exam

Needed tools for the exam:

Detailed information is collected here.


Technical setup test: Wednesday, 10 February 2021, 1400-1500, online.

Pre-exam meeting: Thursday, 11 February after the lecture.

Exam: Wednesday, 17 February 2021, 1400-1700, online.*

Exam review: tba.

You must be part of the group 'Exam participants' within the eCampus course to get access. If you are registered for the exam but you do not have access, contact me now!

Exam2 (repetitions): Thursday, 25 March 2021, 1000-1300, online.

Exam2 review: tba.

Contents

Cryptography deals with methods for secure data transfer. In earlier times this was the domain of military and intelligence agencies, but today modern cryptography has grown into a key technology, enabling e-commerce and secure internet communications. Its many applications range from credit and debit cards, mobile phones, tv decoders, and electronic money to unforgeable electronic signatures under orders and contracts in the internet.

In the course, we discuss two of the current standard tools, namely AES and RSA. Further topics are key exchange, including group cryptography and discrete logarithm, digital signatures and identification, and cryptographic hash functions. We will consider these primitives in the modern light of reducible security (or provable security).

Literature

There is a long list of free online books about cryptography.

Further topics:

Prerequisites

None.

Allocation

4+2 SWS.

The lecture's mailing list

Students are encouraged to ask and answer any questions related to the course on the mailinglist:

20ws-crypto-at-lists.bit.uni-bonn.de

You can subscribe to and unsubscribe from the mailing list using the information given on the list's Info page.

Impressum, webmaster & mehr

User login

Enter your username and password here in order to log in on the website

Login

Hier einloggen
Neues Profil