Cryptography
This course is listed
- in Aachen RWTHonline as Cryptography,
- in Bonn Basis as MA-INF 1103 - Cryptography.
Lecture
Time & Place
- Monday, 1215 c.t.-1400, Lecture room in moodle.
- Thursday, 1145 c.t.-1330, Lecture room in moodle.*
- Tutorial: Monday 1400 c.t.-1545, Tutorial room in moodle.
First meeting:
- Monday, 26 October 2020, 1215 c.t.-1400, Lecture room in moodle. (Yes, that is one week before most computer science courses!)
- Monday, 26 October 2020, 1400-1414, Tutorial room in moodle.
- Monday, 26 October 2020, 1415-1600, Speed grouping (see below, you need to sign up for the room info).
You must be enroled in the moodle to enter the lecture or tutorial room.
* Until 1 December, this was 1215 c.t.-1400.
Digital teaching
The digital teaching setup is detailed on a separate page. It explains how we integrate moodle, lectures, exercise cycle, tutorial, mailing list, chat, free room and sciebo.
Hotlinks | Checklist
|
Exam
Needed tools for the exam:
- Working camera and connection to BigBlueButton.
- Access to eCampus.
- Show or print a PDF.
- Digitize several pages into a PDF and upload PDF to eCampus. (Scanner or camera...)
- Paper, pens, ...
Detailed information is collected here.
Technical setup test: Wednesday, 10 February 2021, 1400-1500, online.
Pre-exam meeting: Thursday, 11 February after the lecture.
Exam: Wednesday, 17 February 2021, 1400-1700, online.*
Exam review: tba.
You must be part of the group 'Exam participants' within the eCampus course to get access. If you are registered for the exam but you do not have access, contact me now!
Exam2 (repetitions): Thursday, 25 March 2021, 1000-1300, online.
Exam2 review: tba.
Contents
Cryptography deals with methods for secure data transfer. In earlier times this was the domain of military and intelligence agencies, but today modern cryptography has grown into a key technology, enabling e-commerce and secure internet communications. Its many applications range from credit and debit cards, mobile phones, tv decoders, and electronic money to unforgeable electronic signatures under orders and contracts in the internet.
In the course, we discuss two of the current standard tools, namely AES and RSA. Further topics are key exchange, including group cryptography and discrete logarithm, digital signatures and identification, and cryptographic hash functions. We will consider these primitives in the modern light of reducible security (or provable security).
Literature
- Jonathan Katz & Yehuda Lindell (2015/2008). Introduction to Modern Cryptography, CRC Press. Webpage.
- Mike Rosulek (2017+). The Joy of Cryptography. Webpage including PDF.
- Mihir Bellare & Shafi Goldwasser (2001). Lecture Notes on Cryptography. PDF.
- Dan Boneh & Victor Shoup (2017). A Graduate Course in Applied Cryptography.
- Johannes A. Buchmann (2004). Introduction to Cryptography. Birkhäuser Verlag, 2nd edition. ISBN 0-387-21156-X (hardcover), 0-387-20756-2.
- Joachim von zur Gathen (2015). CryptoSchool. Springer. ISBN 978-3-662-48425-8.
- Nigel Smart (2002), Cryptography: An Introduction. McGraw-Hill. ISBN 0-077-09987-7. This first edition is out of print, but a new edition is available online.
- Douglas R. Stinson (2005). Cryptography - Theory and Practice. Discrete Mathematics and its Applications. Chapman & Hall / CRC Press, Boca Raton FL, 3rd edition. ISBN 1584885084, 600pp. Book's page including errata. Parts of this text can be found online with GoogleBooks.
There is a long list of free online books about cryptography.
Further topics:
- James S. Kraft & Lawrence C. Washington (2014). An introduction to Number Theory with Cryptography.
- Steven Galbraith (2018). Mathematics of Public Key Cryptography. Webpage including PDF.
Prerequisites
None.
Allocation
4+2 SWS.
- Master in Media Informatics: Computer and Communication Technology, 8 ECTS credits.
- Master in Computer Science at University of Bonn: MA-INF 1103, 9 CP.
The lecture's mailing list
Students are encouraged to ask and answer any questions related to the course on the mailinglist:
20ws-crypto-at-lists.bit.uni-bonn.de
You can subscribe to and unsubscribe from the mailing list using the information given on the list's Info page.