50 years Univerity of Lübeck

Institute for Theoretical Computer Science


Art und Inhalt

Title: Cryptology
Lecturer: Jakoby
Classification: Master-Studiengang 2. Semester, Wahl
Diplom-Studiengang 6. / 8. Semester, Vertiefung

Long time before computers and global communication networks existed, people were asking, how information can be transmitted in a safe way. Based on the probability theory 50 years ago, Shannon justified the modern communication theory, which forms one of the bases for the modern coding theory and cryptology.

New results of the complexity theory on the one hand and concrete security needs in global nets on the other hand led to a stormy upward development of cryptology in the last years. By the digitization new setting of tasks were added like the digital signature. This group of topics has itself to emphasis in the activity spectrum of computer scientists and mathematicians developed with a shift from the military to the commercial range (e-Commerce).

This lecture gives an overview of the historical development and fundamental cryprographic procedures.

  • G. Hotz: Algorithmische Informationstheorie. Teubner 1997
  • S. Roman: Introduction to Coding and Information Theory. Springer 1997
  • A. Beutelspacher: Kryptologie. Vieweg 1991
  • A. Konheim: Cryptography – a Primer. J. Wiley 1981
  • F. Bauer: Entzifferte Geheimnisse. Springer 1997
  • J. Buchmann: Einführung in die Kryptographie. Springer 1999


Lecturer: Jakoby
Umfang: 2 SWS, ECTS-Credits: 4
Dates: Mo 10:00h – 12:00h, ITCS-Seminarraum 21, 2. OG. Geb. 64
Script: Vorlesungskript


[ V1 | V2 | V3 | V4 | V5 | V6 | V7 | V8 | V9 | V10 | alle ]


Lecturer: Jakoby
Umfang: 1 SWS
Dates: Mi 17:00h – 18:00h ITCS-Seminarraum 21. 2. OG. Geb. 64