Note: This is an archvied version of our old webpage. Some links might be broken. The current one can be found here.
I7 Logo
Chair for Foundations of Software Reliability and Theoretical Computer Science
Informatik Logo TUM Logo
Kryptographische Protokolle SS 2009

  Inhalt | Termine | Literatur | Hinweise

Seminar und Proseminar stützen sich auf Forschungsberichte und auf das Buch:

[E07] Claudia Eckert:
IT-Sicherheit: Konzepte, Verfahren, Protokolle
5. überarbeitete Auflage, R. Oldenbourg-Verlag, 2007.

Noch freie Themen sind fett geschrieben.

Literatur Proseminar

  1. [E07] Abschnitt 7.6: Asymmetrische Verschlüsselung (RSA)

  2. [E07] Abschnitt 7.5: Symmetrische Verschlüsselung (DES, AES)

  3. Paul C. Kocher: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. CRYPTO 1996. PDF

  4. [E07] Abschnitt 8.2: Digitale Signaturen

  5. [E07] Abschnitt 9.3-9.3.4: Needham-Schroder Protokolle zur Authentifizierung

  6. [E07] Abschnitt 10.5.4: Kerberos

  7. Roger Needham: Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 1994. PDF

  8. [E07] Abschnitt 9.3.6: Schlüsselmanagement (Diffie-Hellman)

  9. [E07] Abschnitt 13.4: WLAN

  10. [E07] Abschnitt 13.5: Bluetooth

Literatur Seminar

  1. Jozef Gruska: Quantum Computing, 1999. McGraw-Hill. Abschnitt 1.4-1.6 & 6.2.1-6.2.3

  2. Mitsuri Matsui: Linear Cryptanalysis Method for DES Cipher. Eurocrypt 1993. PDF

  3. Johan Agat: Transforming out Timing Leaks. POPL 2000. PDF

  4. [E07] Abschnitt 8.1: Hashfunktionen.

  5. Roger Needham: Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 1994. PDF

  6. M. Steiner, G. Tsudik and M. Waidner. Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems 11(8):769-780, 2000. PDF

  7. Bruno Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In CSFW-14, p. 82-96, IEEE, 2001. PDF

  8. Michael Burrows, Martin Abadi, Roger Needham: A Logic of Authentication, Digital Equipment Corporation, 1989, 1990. PDF

  9. M. Kwiatkowska, G. Norman and J. Sproston: Probabilistic Model Checking of the IEEE 802.11 Wireless Local Area Network Protocol. PAPM/PROBMIV'02. PDF

  10. M. Duflot, M. Kwiatkowska, G. Norman and D. Parker: A Formal Analysis of Bluetooth Device Discovery. ISOLA 2004. PDF