course: Introduction to Cryptography 2
- teaching methods:
- lecture with tutorials
- Videoübertragung, internet, Moodle
- responsible person:
- Prof. Dr.-Ing. Christof Paar
- Prof. Dr.-Ing. Christof Paar (ETIT), M. Sc. Julian Speith (ETIT), M. Sc. Paul Staat (ETIT), M. Sc. Johannes Tobisch (ETIT)
- offered in:
- summer term
dates in summer term
- start: Wednesday the 14.04.2021
- lecture Wednesdays: from 16:15 to 17.45 o'clock
- tutorial Fridays: from 12:15 to 13.45 o'clock
- tutorial (alternativ) Thursdays: from 10:00 to 11.00 o'clock
- tutorial (alternativ) Thursdays: from 14:00 to 15.00 o'clock
|Form of exam:||written|
|Registration for exam:||FlexNow|
|Room :||wird vom Lehrstuhl bekannt gegeben.|
After successful completion of the course, students will have knowledge of the basic applications of asymmetric and hybrid methods. They are able to decide under which conditions certain methods are used in practice and how the security parameters should be selected. They are familiar with the basics of abstract thinking in IT security engineering. On the other hand, the students achieve an algorithmic and technical understanding for practical application by describing selected algorithms of practical relevance, such as the Diffie-Hellmann key exchange or ECC-based schemes. The students get an overview of the solutions used in companies. They will be able to defend a certain solution with arguments. The lectures are also offered as videos in German and English. The bilingual eLearning offer therefore enables students to acquire language skills in the English language.
The course offers a general introduction to the functionality of modern cryptography and data security. Basic terms and mathematical/technical methods of cryptography and data security are explained. Relevant asymmetric methods and algorithms are introduced and explained with practical examples. The lecture can be divided into two parts: The first part starts with an introduction to asymmetric methods and their most important substitutes (Diffie-Hellman, elliptic curves). The focus is on the algorithmic introduction of asymmetric procedures, which include both encryption algorithms and digital signatures. This part is completed by hash functions, which play an important role for digital signatures and Message Authentication Codes (MACs or cryptographic checksums). The second part of the lecture discusses the basics of security solutions based on the concepts of symmetric and asymmetric cryptography. Especially the solutions used in companies (PKI, digital certificates etc.) will be discussed.
Contents of the lecture "Introduction to Cryptography I"
- Paar, Christof, Pelzl, Jan "Kryptografie verständlich: Ein Lehrbuch für Studierende und Anwender", Springer, 2016
- Paar, Christof, Pelzl, Jan "Understanding Cryptography: A Textbook for Students and Practitioners", Springer, 2009
Im Sommersemester 2021 wird der Kurs wahrscheinlich ausschließlich digital angeboten. Alle benötigten Informationen und Materialien werden über den Moodle-Kurs zur Verfügung gestellt. Die Einschreibung in den Moodle-Kurs sollte ausschließlich mit einer RUB-Mailadresse erfolgen (Ausnahme: UA Ruhr).