HTW Berlin Medieninformatik

HTW Berlin
Fachbereich 4
Internationaler Studiengang
Internationale Medieninformatik (Bachelor)
Aktuelle Themen: Cryptography
Winter Term 2015/16

Tentative Schedule

Week
Lecture   Laboratory

Mondays
WH C 258
15.45-17.15

 

Mondays
WH C 258
17.30-19.00

  Date Topic Instructor Exercise Talk 1 Talk 2
41
5.
10.

Introduction 1
Definitions
History of Cryptography - Caesar, Enigma

Thiel   Choose your talk topic    
42
12.
10.

Introduction 2: Literature

CS: Codes & Ciphers

Weber-Wulff
0
Simple ciphers    
43
19.
10.
Math: XOR, GCD, Modulo Thiel
1

XOR & GCD

   
44
26.
10.
CS: Symmetric Cryptography Weber-Wulff
2

Morse Code

   
45
02.
11.

Math: Chinese Remainder Theorem, Groups

Thiel
3

Chinese Remainer Theorem

The Enigma (Seelow) Colossus (Hinrichs)
46
09.
11.

Math: Mathematical basis of Diffie-Hellman - Groups

Thiel
4

Getting ready for Diffie-Hellmann

Cryptanalysis of Vigènere Codes (Haase)

Mathematical proof that the one-time pad is secure (Koerber)
47
16.
11.

CS:
History of Asymmetric Cryptography - Diffie-Hellmann, Knapsack, Basic RSA

 

Weber-Wulff
5

Vigenère Cipher

The Playfair Cipher (Licea) Cryptography in Film (Yordanova)
48
23.
11.

Guest speaker:

Tomáš Foltýnek, Ph.D.

Steganography

Weber-Wulff   Steganografic games    
49
30.
11.
Math: Random Numbers, Discrete Logarithm, Mathematical Operations on Large Numbers
Thiel
6
Prime Numbers Pitfalls with Diffie-Hellman (Streckenbach)  
50
07.
12.
CS: Asymmetric Cryptography - RSA, PGP, Digital Signatures Weber-Wulff
7

Symmetric Key Programming

Wireless LAN Encryption (Materne) Sidechannel Attacks (Möller)
51 14.
12.
Math: Rabin-Miller, RSA
Thiel
8

Rabin-Miller Programming

   
52 21.
12.

CS: Hash Functions and
Message Authentication Codes

Weber-Wulff
9

Key Signing

Man-in-the-Middle attacks (Meurer)  
53 28.
12.
Christmas Vacation
 
     
1
04.
01.
Cancelled because of sickness        
2 11.
01.

CS: Cryptography in ePassports, Cryptographic Money protocols

Weber-Wulff
10

Dictionary Attack

SHA-3 (Gand) MIX-Networks (Bürger)
3
18.
01.

Math: Elliptic Curves

Thiel
11

Elliptic Curves

Quantum Cryptography: Basic notions (Ploch)

Bitmessage (Plank)

4 25.
01.
CS: Cryptographic protocols for eVoting Weber-Wulff
12
Diffie-Hellman Key Exchange What is a good password? (Dau) Meet-in-the-middle attacks using a GPU (Rustchev)
5 01.
02.
Math: Zero-Knowledge Proofs
Thiel
13
El-Gamal

Physical generation of Random Numbers (Seyfarth)

DE-Mail (Kretschmar)
6 08.
02.
The Snowden Files, the NSA & The Future of Cryptography
Thiel,
Weber-Wulff
14
Roll your own RSA TOR (Kaffee)
Quantum Cryptography: 
Algorithms of Lov Grover, Peter Shor (Piwonski)
7 15.
02.
Vorlesungsfreie Zeit          

Other topics: State-of-the-Art in factoring, Biometric Word Lists, Applications of Zero-Knowledge Proofs, Security of elliptic curves; Peter Shor; Ron Rivest's Spritz, Soloway-Strassen test of primality, Alternative Tests of Primality [AKS]


Dr. Hermann Thiel & Prof. Dr. Debora Weber-WulffCC-BY-NC-SA

This material is jointly prepared by Dr. Hermann Thiel and Prof. Dr. Debora Weber-Wulff. Some of the material may come from other sources and is denoted by the copyright notices on the individual pages.
Last Change:  2016-01-25 18:05