803402 VO Kryptologie (2004W)
Kryptologie
Labels
Details
Language: German
Lecturers
Classes (iCal) - next class is marked with N
Monday
04.10.
10:00 - 11:00
Seminarraum
Tuesday
05.10.
10:00 - 11:00
Seminarraum
Wednesday
06.10.
10:00 - 11:00
Seminarraum
Monday
11.10.
10:00 - 11:00
Seminarraum
Tuesday
12.10.
10:00 - 11:00
Seminarraum
Wednesday
13.10.
10:00 - 11:00
Seminarraum
Monday
18.10.
10:00 - 11:00
Seminarraum
Tuesday
19.10.
10:00 - 11:00
Seminarraum
Wednesday
20.10.
10:00 - 11:00
Seminarraum
Monday
25.10.
10:00 - 11:00
Seminarraum
Tuesday
26.10.
10:00 - 11:00
Seminarraum
Wednesday
27.10.
10:00 - 11:00
Seminarraum
Monday
01.11.
10:00 - 11:00
Seminarraum
Wednesday
03.11.
10:00 - 11:00
Seminarraum
Monday
08.11.
10:00 - 11:00
Seminarraum
Tuesday
09.11.
10:00 - 11:00
Seminarraum
Wednesday
10.11.
10:00 - 11:00
Seminarraum
Tuesday
16.11.
10:00 - 11:00
Seminarraum
Wednesday
17.11.
10:00 - 11:00
Seminarraum
Monday
22.11.
10:00 - 11:00
Seminarraum
Tuesday
23.11.
10:00 - 11:00
Seminarraum
Wednesday
24.11.
10:00 - 11:00
Seminarraum
Monday
29.11.
10:00 - 11:00
Seminarraum
Tuesday
30.11.
10:00 - 11:00
Seminarraum
Wednesday
01.12.
10:00 - 11:00
Seminarraum
Monday
06.12.
10:00 - 11:00
Seminarraum
Tuesday
07.12.
10:00 - 11:00
Seminarraum
Monday
13.12.
10:00 - 11:00
Seminarraum
Tuesday
14.12.
10:00 - 11:00
Seminarraum
Wednesday
15.12.
10:00 - 11:00
Seminarraum
Monday
10.01.
10:00 - 11:00
Seminarraum
Tuesday
11.01.
10:00 - 11:00
Seminarraum
Wednesday
12.01.
10:00 - 11:00
Seminarraum
Monday
17.01.
10:00 - 11:00
Seminarraum
Tuesday
18.01.
10:00 - 11:00
Seminarraum
Wednesday
19.01.
10:00 - 11:00
Seminarraum
Monday
24.01.
10:00 - 11:00
Seminarraum
Tuesday
25.01.
10:00 - 11:00
Seminarraum
Wednesday
26.01.
10:00 - 11:00
Seminarraum
Monday
31.01.
10:00 - 11:00
Seminarraum
Information
Aims, contents and method of the course
Assessment and permitted materials
Minimum requirements and assessment criteria
Examination topics
Reading list
Samuel S. Wagstaff: Cryptanalysis of Number Theoretic Ciphers, Verlag Chapman & Hall (2003).
Buchmann: Einfuehrung in die Kryptographie. Springer Verlag (2004).
Buchmann: Einfuehrung in die Kryptographie. Springer Verlag (2004).
Association in the course directory
Currently no association information is available.
Last modified: Mo 07.09.2020 15:50
between symmetric and asymmetric cryptosystems. A typical examples of a
symmetric encryption which was used worldwide until 1997 was the DES
encryption system. As it was broken in 1997 it has meanwhile been replaced by the AES encryption system. From a mathematical point of view the asymmetric encryption systems are more interesting; in order to understand
how they work we need some knowledge from Number Theory. Secrecy of these systems is based on the fact that it is impossible to find the prime factorisation of large numbers in a reasonable timespan. For that reason we
will also be concerned with the question how large prime numbers can be found.