Note: This is an archvied version of our old webpage. Some links might be broken. The current one can be found here.
I7 Logo
Chair for Foundations of Software Reliability and Theoretical Computer Science
Informatik Logo TUM Logo
Seminar Kryptographische Protokolle SS 2008

  Inhalt | Vortragsthemen | Literatur | Hinweise

Das Seminar stützt sich in Teilen auf das Buch:

[S06] William Stallings: Cryptography and Network Security - Principles and Practice
4. Auflage, 2006. Prentice Hall.

Literatur zu den einzelnen Themen:
  1. [S06] Kapitel 9: Public-Key Cryptography and RSA
    (zusätzlich Kapitel 8: Introduction to Number Theory)

  2. [S06] Kapitel 5: Advanced Encryption Standard

  3. Phil Zimmermann: The Official PGP User's Guide. MIT Press, 1995.
    [S06] Abschnitt 15.1: Pretty Good Privacy

  4. Jozef Gruska: Quantum Computing, 1999. McGraw-Hill. Kapitel 1 & 6

  5. [S06] Kapitel 13: Digital Signatures and Authentication Protocols

  6. M. Steiner, G. Tsudik and M. Waidner. Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems 11(8):769-780, 2000. PDF

  7. G. Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters, 56:131--133, 1995. PS
    G. Lowe: A Family of Attacks upon Authentication Protocols. Department of Mathematics and Computer Science, University of Leicester, 1997. PS
    G. Lowe: Some New Attacks upon Security Protocols. Proceedings of 9th IEEE Computer Security Foundations Workshop, 1996. PS
    Tzonelih Hwang, Yung-Hsiang Chen: On the security of SPLICE/AS - The authentication system in WIDE Internet. Information Processing Letters 53, 1995.

  8. Wie bei 7.

  9. D. Dolev, S. Even and R. M. Karp. On the security of ping-pong protocols. Information and Control 55:57-68, 1982. PDF

  10. P. Maggi and R. Sisto: Using SPIN to verify security properties of cryptographic protocols. SPIN workshop 2002
  11. Michael Burrows, Martin Abadi, Roger Needham: A Logic of Authentication, Digital Equipment Corporation, 1989, 1990. PDF



  12. Literatur zu den noch nicht vergebenen Themen:
  13. Bruno Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In CSFW-14, p. 82-96, IEEE, 2001. PDF

  14. M. Abadi and A. D. Gordon: A Calculus for Cryptographic Protocols: The Spi Calculus. Fourth ACM Conference on Computer and Communications Security p. 36-47, 1997, ACM Press. PS

  15. David Monniaux. Abstracting cryptographic protocols with tree automata. SAS'99. LNCS 1694, pp. 149-163. PDF