Advanced Methods of Cryptography (V2/Ü1)
All information is available in L2P as well. Every participant should sign up for L2P.L2P - Lehr- und Lernportal der RWTH Aachen
The lecture by Professor Mathar is currently recorded and can be viewed at https://videoag.fsmpi.rwth-aachen.de/?course=12ws-amocrypto.
Dates
Lecture Dates (Campus)
Exercise Dates (Campus)
Exam Dates (Campus)
Contents
A few aspects of classical cryptosystems, cryptanalysis of classical systems, perfect secrecy, fast block ciphers (AES), number-theoretic reference problems, cryptosystems based on discrete logarithm, public-key cryptography, cryptographic hash functions, signature schemes, elliptic curves
Prerequisites
Basic knowledge in stochastics and number theory.
Literature
- Lecture notes as pdf-file. Note that the lecture comprises a subset of these notes. The table of contents indicates the covered sections in this semester.
- The bibliography.
- The "Handbook of Applied Cryptography" by Menezes, van Oorschot and Vanstone (Download from the web pages of the University of Waterloo (Canada)).
- Lecture notes of the lecture "Stochastik für Informatiker" (in German)
- The Book "Informationstheorie" by R. Mathar.
- Addendum to lecture notes about Security of ElGamal signature."
News
The first lecture will take place on Friday, 12.10.2012, in the lecture hall II, Templergraben 55, Hauptgebäude.
The first exercise will take place on Tuesday, 16.10.2012, in the lecture hall kl. Phys., Schinkelstr. 2.
There will be no exercise on Tuesday, 09.10.2012.
Usually, new exercise-sheets are available one week before the corresponding solutions are presented.
Students have the opportunity to hand in their solved problems of the current exercise before it is presented, using the L2P-website of this course. Corrections and comments are provided one week later.
There is no lecture on Friday 14.12.2012 due to Dies.
Exam
Please register for the exam by sending an email entitled "AMC exam" to Henning Maier.This is NOT the official registration to the ZPA, this is only for organizational purposes.
Please include the corresponding information, which is highlighted in bold letters here, in your email:
- Cryptography: The exam refers to chapters 1 to 8. Duration 1.5h.
- Advanced Methods of Cryptography (current): The exam refers to the material from this semester. Duration 1.5h.
- Advanced Methods of Cryptography (retry): The exam refers to chapters 9 to 14. Duration 1.5h.
- Cryptography and Advanced Methods of Cryptography (retry): The exam refers to chapters 1 to 14. Duration 3h. This exam can only be taken by diploma students.
- Scheinklausur (additionally to one of the options above): In this case, no ZPA registration is required.
- Furthermore, please indicate if you wish a German or an English version of the examination.
During the exam you may use a non-graphical, non-programmable calculator from this list as well as the help-sheet (Hilfsblatt) of cryptography, which will be distributed by us at the same time as the exam problems. Bringing your own material is forbidden.
The review exercise (Zusatzübung) for Cryptography I will be presented on Friday 22.02.13 at 09:00h in WSH, 4th floor, seminar room 24A407, and for Advanced Methods of Cryptography at 11:00h in the same room. Note that students writing the exam of the current semester should visit both review exercises. The documents are provided at the end of the exercises.
We provide an extra consultation hour (Fragestunde) before the exam on Friday 01.03.13 at 10:00h in WSH, 4th floor, seminar room 24A407.
The examination will take place on Friday, 08.03.2013, in Grüner Hörsaal AM (Gr), Wüllnerstraße 9. The exam will begin at 14:00h for all versions.
The results are now online. The passwort was distributed during the exam with your information sheet. If your key is lost or does not match, please contact Michael or Henning with your official RWTH-email-address and ID.
On March 22nd, 2013 at 10h, we provide an exam review in the seminar room of TI (WSH 24A407).
Exercises
Download of exercise sheets:- Exercises 1 (16.10.2012): Download pdf, Solution to last exercise.
- Exercises 2 (23.10.2012): Download pdf, Ciphertext from Exercise 6 as txt-File.
- Exercises 3 (30.10.2012): Download pdf, Solution to last two exercises.
- Exercises 4 (06.11.2012): Download pdf
- Exercises 5 (13.11.2012): Download pdf
- Exercises 6 (20.11.2012): Download pdf, Solution to Exercise 16
- Exercises 7 (27.11.2012): Download pdf, Solution to Exercise 20
- Exercises 8 (04.12.2012): Download pdf
- Exercises 9 (11.12.2012): Download pdf, Solution to Exercise 27
- Exercises 10 (18.12.2012): Download pdf, Solution to Exercise 31 b)
- Exercises 11 (08.01.2013): Download pdf
- Exercises 12 (15.01.2013): Download pdf, Solution to Exercise 37
- Exercises 13 (22.01.2013): Download pdf
- Exercises 14 (29.01.2013): Download pdf
- Review (22.02.2013): Cryptography I, Advanced Methods of Cryptography
Consultation hour
Prof. Dr. R. Mathar upon agreement
Dr. Michael Reyer Wednesday from 09:00 - 10:00
Dipl.-Ing. Henning Maier upon agreement