Display language
To modulepage Generate PDF

#41010 / #2

Seit SoSe 2024
(Deaktivierung beantragt zum SoSe 2024)

English

Secure Cryptography

6

Seifert, Jean-Pierre

benotet

Mündliche Prüfung

Zugehörigkeit


Fakultät IV

Institut für Softwaretechnik und Theoretische Informatik

34355100 FG S-Professur Security in Telecommunications

No information

Kontakt


TEL 16

Seidler, Henning

lehre@sect.tu-berlin.de

Learning Outcomes

Students who completed this course possess profound knowledge of cryptographic methods. They are able to correctly and securely use cryptographic protocols. They are proficient in verifying the security of One-Way-Functions and (Pseudo-)Random-Number-Generators. Furthermore, they are able to recognise and avoid typical mistakes in asymmetric encryption.

Content

a) Public Key Cryptography Knowledge of common methods in asymmetric encryption, as well as possible attacks in faulty implementations of these methods. - RSA, including signatures - attacks on small public exponent - Wiener attack - primality tests and factorisation - El-Gamal - Diffie-Hellman-Key-Exchange, - elliptic curves - attacks on the discrete logarithm - selected methods of Post-Quantum-Cryptography b) Cryptography for Security Fundamental concepts of encryption, as well as their construction and their connections - classical cryptographic problems and how to solve them - One-Way-Functions - (Pseudo-)Random-Number-Generators - Pseudo-Random-Functions

Module Components

Pflichtgruppe:

All Courses are mandatory.

Course NameTypeNumberCycleLanguageSWSVZ
Cryptography for SecurityVL0434 L 964SoSeGerman2
Public Key CryptographyVL3435 L 10653SoSeEnglish2

Workload and Credit Points

Cryptography for Security (VL):

Workload descriptionMultiplierHoursTotal
Attendance15.02.0h30.0h
Pre/post processing15.04.0h60.0h
90.0h(~3 LP)

Public Key Cryptography (VL):

Workload descriptionMultiplierHoursTotal
Attendance15.02.0h30.0h
Pre/post processing15.04.0h60.0h
90.0h(~3 LP)
The Workload of the module sums up to 180.0 Hours. Therefore the module contains 6 Credits.

Description of Teaching and Learning Methods

The module consists of classical lectures. This class is given in English. For Public Key Cryptography there are voluntary exercises, including programming tasks.

Requirements for participation and examination

Desirable prerequisites for participation in the courses:

Knowledge of Undergraduate classes, in particular modular arithmetic and complexity theory (P vs NP)

Mandatory requirements for the module test application:

This module has no requirements.

Module completion

Grading

graded

Type of exam

Oral exam

Language

German/English

Duration/Extent

30 minutes

Duration of the Module

The following number of semesters is estimated for taking and completing the module:
1 Semester.

This module may be commenced in the following semesters:
Sommersemester.

Maximum Number of Participants

This module is not limited to a number of students.

Registration Procedures

enroll in the Isis course

Recommended reading, Lecture notes

Lecture notes

Availability:  unavailable

 

Electronical lecture notes

Availability:  unavailable

 

Literature

Recommended literature
No recommended literature given

Assigned Degree Programs


This module is used in the following Degree Programs (new System):

Studiengang / StuPOStuPOsVerwendungenErste VerwendungLetzte Verwendung
Computer Engineering (M. Sc.)12SoSe 2024SoSe 2024
Computer Science (Informatik) (M. Sc.)14SoSe 2024SoSe 2024
Elektrotechnik (M. Sc.)12SoSe 2024SoSe 2024
Information Systems Management (Wirtschaftsinformatik) (M. Sc.)11SoSe 2024SoSe 2024
Wirtschaftsingenieurwesen (M. Sc.)11SoSe 2024SoSe 2024

Students of other degrees can participate in this module without capacity testing.

Miscellaneous

No information