Main content

CS 550 — Introduction to Cryptography and its Applications
(dt. Einführung in die Kryptographie und ihre Anwendungen)

Level, degree of commitment Advanced module, compulsory elective module
Forms of teaching and learning,
workload
Lecture (2 SWS), recitation class (2 SWS),
180 hours (60 h attendance, 120 h private study)
Credit points,
formal requirements
6 CP
Course requirement(s): Successful completion of at least 50 percent of the points from the weekly exercises.
Examination type: Oral examination (individual examination) or written examination
Language,
Grading
German,
The grading is done with 0 to 15 points according to the examination regulations for the degree program B.Sc. Computer Science.
Duration,
frequency
One semester,
each winter semester
Person in charge of the module's outline Prof. Dr. Elmar Tischhauser

Contents

Introduction to the main concepts and methods of cryptography, especially encryption, authentication, network security protocols (e.g. TLS). Followed by discussion of these methods in both established and newer applications (e.g., disk encryption, VPNs, signature methods, cloud security, blockchains).

Understanding and application of the concepts presented in the lecture will be practiced hands-on during the tutorial as well as an integrated crypto lab, especially the security evaluation of cryptographic methods and best practices for their use in various application scenarios.


Qualification Goals

Students know the main basic principles and methods of cryptography required for an evaluation of cryptographic security and its elementary application in other areas of computer science. They understand these methods and are able to select and practically implement suitable cryptographic methods for specific application examples.


Prerequisites

None. Knowledge from basic modules of computer science (programming, algorithms, networks) and mathematics (discrete mathematics, algebra) is useful. Prior knowledge of IT security is generally helpful, but not required.


Applicability

Module imported from B.Sc. Computer Science.

It can be attended at FB12 in study program(s)

  • B.Sc. Data Science
  • B.Sc. Computer Science
  • B.Sc. Mathematics
  • M.Sc. Data Science
  • M.Sc. Computer Science
  • M.Sc. Business Informatics
  • LAaG Computer Science

When studying M.Sc. Business Informatics, this module can be attended in the study area Compulsory Elective Modules in Computer Science And Mathematics.


Recommended Reading

  • Douglas R. Stinson and Maura B. Paterson: Cryptography: Theory and Practice, CRC Press 2018
  • Johannes A. Buchmann: Introduction to Cryptography, Springer 2002
  • Johannes A. Buchmann: Einführung in die Kryptographie, 6. Auflage, Springer 2016
  • Menezes, van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press 1996



Please note:

This page describes a module according to the latest valid module guide in Winter semester 2023/24. Most rules valid for a module are not covered by the examination regulations and can therefore be updated on a semesterly basis. The following versions are available in the online module guide:

  • Winter 2016/17 (no corresponding element)
  • Summer 2018 (no corresponding element)
  • Winter 2018/19 (no corresponding element)
  • Winter 2019/20 (no corresponding element)
  • Winter 2020/21 (no corresponding element)
  • Summer 2021 (no corresponding element)
  • Winter 2021/22 (no corresponding element)
  • Winter 2022/23 (no corresponding element)
  • Winter 2023/24

The module guide contains all modules, independent of the current event offer. Please compare the current course catalogue in Marvin.

The information in this online module guide was created automatically. Legally binding is only the information in the examination regulations (Prüfungsordnung). If you notice any discrepancies or errors, we would be grateful for any advice.