50 years Univerity of Lübeck

Institute for Theoretical Computer Science

Cryptology



Type and Content

Title: Cryptology
Host: Reischuk
Classification: Master-Studiengang 2. Semester, Wahl
Diplom-Studiengang 6. / 8. Semester, Vertiefung
Conentent:

Long time before computers and global communication networks existed, people were asking, how information can be transmitted in a safe way. Based on the probability theory 50 years ago, Shannon justified the modern communication theory, which forms one of the bases for the modern coding theory and cryptology.

New results of the complexity theory on the one hand and concrete security needs in global nets on the other hand led to a stormy upward development of cryptology in the last years. By the digitization new setting of tasks were added like the digital signature. This group of topics has itself to emphasis in the activity spectrum of computer scientists and mathematicians developed with a shift from the military to the commercial range (e-Commerce).

This lecture gives an overview of the historical development and fundamental cryprographic procedures.

Literature:
  • G. Hotz: Algorithmische Informationstheorie. Teubner 1997
  • S. Roman: Introduction to Coding and Information Theory. Springer 1997
  • A. Beutelspacher: Kryptologie. Vieweg 1991
  • A. Konheim: Cryptography – a Primer. J. Wiley 1981
  • F. Bauer: Entzifferte Geheimnisse. Springer 1997
  • J. Buchmann: Einführung in die Kryptographie. Springer 1999

Lecture

Host: Reischuk
Hours: 2 SWS, 4 ECTS
Dates: Do 10:00h – 12:00h, ITCS-Seminarraum 21, 2. OG. Geb. 64
Script:

Exercise

Host: Reischuk, Hinkelmann
Hours: 1 SWS
Dates: Mo. 18:00h – 19:00h ITCS-Seminarraum 21. 2. OG. Geb. 64
Exercise: