Cryptographic Protocols (SS 2007)
This site is still under construction!
- Module III.2.5: Codes und Kryptographie (codes and cryptography)
- V2 + Ü1 SWS (contact time)
- 4 ECTS credits (workload)
- Prerequisite: Introduction to Cryptography or an equivalent course
- This course will be held in English.
For further information see the corresponding section in the module handbook (in german only).
- Authentication protocols
- Key exchange and key distribution protocols
- Identification protocols
- Zero-knowledge protocols
Please note the new regulations regarding the registration! In order to participate in the examination you have to register:
Students of any course program (including the old Bachelor/Diplom Computer Science course program, aka DPO4) have to register at their Prüfungsekretariat (office of examination affairs) at least three weeks before the examination date. Note that any regulations of your own course program apply.Students, who are only interested in a Leistungsnachweis (graded certificate of proficiency) may participate without prior registration.
Additionally, we advise you to send an email to naestef[at]uni-paderborn.de containing the following information:
Note: The tutorials will not start before April 12th, 2007.
Nr Day Week Time Room Tutor Language 01 Thu each 13--14 F1.110 Julia Borghoff English
This course will make use of the literature given below. Beside this there will be no lecture notes.
At some point, the slides from the lectures will be published here.
|Message Authentication Codes (MACs) [update 21.5.2007]|
Here we will publish the home exercises. Eventually, solutions to the exercises will be posted here. The tutorial exercises will be handed out during the tutorials.
Nr Submission Exercises 01 26.04.07 02 17.05.07 03 31.05.07 04 21.06.07 05 05.07.07 05 12.07.07 ...
We encourage you to work on the exercises in small groups of 2 to 4 persons. This will greatly enhance your learning success (and your fun during this process). You may submit your exercise in such groups, but submission for more than 4 students will be assessed with 0 points!
There will be no bonus system. However, your effort in the tutorials und exercises will be considered in the oral examination.
Bellare, Rogaway: Lecture Notes on "Introduction to Modern Cryptography", University of California, San Diego, 2004--2005. Lecture notes available online!
Goldreich: "Foundations of Cryptography: Basic Tools", Cambridge University Press, 2001. ISBN: 0-521-79172-3. Early draft version available online!
Goldwasser, Bellare: Lecture Notes on "Cryptography", MIT, 1996--2001. Lecture notes available online!
Lindell: Lecture Notes on "Introduction to Cryptography", Bar-Ilan University, 2005. Lecture notes available online!
Menezes, van Oorschot, Vanstone: "Handbook of Applied Cryptography", CRC Press, 1996. ISBN: 0-8493-8523-7. Complete book available online!
Shoup: "A Computational Introduction to Number Theory and Algebra", Cambridge University Press, 2005. ISBN: 0-521-85154-8. Complete book available online!
Stinson: "Cryptography: Theory and Practice", 2nd edition, Chapman & Hall / CRC Press, 2001. ISBN: 1-5848-8206-9.
Trappe, Washington: "Introduction to Cryptography with Coding Theory", 2nd edition, Pearson Prentice Hall, 2005. ISBN: 0-13-198199-4.