Cryptographic Protocols
Dr. Kumar Neeraj Verma
Prof. Dr. Helmut Seidl
(Wintersemester 2005)
Time and venue
- Lecture Tuesday 10:15 - 11:45, in MI 02.07.014, starting 18.10.2005
- Tutorial Thursday 10:15 - 11:00, in MI 02.07.014, starting 03.11.2005
Contents
Cryptographic protocols are widely used today to provide security in various
applications like online banking, remote login and secure e-mail. Cryptographic
protocols are rules for exchange of messages between participants, and
rely on cryptographic algorithms like
encryption and decryption. Experience has shown that even very simple
protocols which seem secure, may have subtle flaws, even if the underlying
cryptographic algorithms are secure. In this course we look at
cryptographic protocols for meeting various security needs, possible attacks
against cryptographic protocols, as well as techniques for ensuring their
correctness.
Literature
Prerequisites
Vordiplom
Requirements for Schein
Written examination
Slides
- 18.10.2005: PS, PDF
- 25.10.2005: PS, PDF
- 08.11.2005: PS, PDF
- 15.11.2005: PS, PDF
- 22.11.2005: PS, PDF
- 29.11.2005: PS, PDF
- 06.11.2005: PS, PDF
- 13.11.2005: PS, PDF
- 20.11.2005: PS, PDF
- Further topics: PS, PDF
Exercises