Advanced Methods of Cryptography (V2/Ü1)
The information on this website is also available in the Lehr- und Lernportal der RWTH Aachen. Every participant should sign up there.
Links to Campus Office
Lecture
Exercise
Exam (start at 13:30)
Reexamination Cryptography
Contents
- Recapitulation of "Cryptography" (watch the video from the Video AG)
- Public key cryptography
- Cryptographic hash functions
- Signature schemes
- Identification and entity authentication
- Elliptic curves
- Quantum cryptography
Prerequisites
Basic knowledge in stochastic and number theory. The knowledge of our lecture Cryptography is beneficial but not strictly required.
Literature
- Our lecture notes for Cryptography & Advanced Methods of Cryptography.
- Slides on Ellipctic Curve Cryptography
- Handbook of Applied Cryptography by Menezes, van Oorschot and Vanstone.
- Lecture notes of the lecture Stochastik für Informatiker by Rudolf Mathar.
- The book Informationstheorie by Rudolf Mathar.
- Complete list of the bibliography.
- Video recordings of the lecture in WS2015/16 by Video AG.
- Video recordings of the lecture in WS2012/13 by Video AG.
Help-sheet
- Help-sheet for Cryptography (english version)
- Hilfsblatt zur Kryptographie (german version)
Pocket Calculator
While taking the written exam, you are allowed to use a pocket calculator from this list.Tutorials
- Tutorial 1 – Solution
- Tutorial 2 – Solution
- Tutorial 3 – Solution
- Tutorial 4 – Solution
- Tutorial 5 – Solution
- Tutorial 6 – Solution
- Tutorial 7 – Solution
- Tutorial 8 – Solution
- Tutorial 9 – Solution
- Tutorial 10 – Solution
- Tutorial 11 – Solution
- Tutorial 12 – Solution
- Tutorial 13 – Solution
- Review exercise – Solution
Consultation hour
Univ.-Prof. Dr. Rudolf Mathar upon agreement
Dipl.-Ing. Markus Rothe upon agreement
M.Sc. Jose Angel Leon Calvo upon agreement