Module CS4523-KP12

Information Security and Cryptography (InfSecCry)


Duration

2 Semester

Turnus of offer

each year, can be started in winter or summer semester

Credit points

12

Course of studies, specific fields and terms:

  • Master Entrepreneurship in Digital Technologies 2020, advanced module, specific
  • Master Entrepreneurship in Digital Technologies 2014, advanced module, specific
  • Master Computer Science 2019, optional subject, advanced module

Classes and lectures:

  • Advanced Cryptology (exercise, 3 SWS)
  • Advanced Cryptology (lecture, 1 SWS)
  • Communication and System Security (exercise, 2 SWS)
  • Communication and System Security (lecture, 2 SWS)

Workload:

  • 40 hours exam preparation
  • 200 hours private studies
  • 120 hours in-classroom work

Contents of teaching:

  • Cryptographic procedures and protocols, security analyses
  • IT security at system level, security mechanisms
  • Security, privacy and trust of special systems such as Cloud and IoT
  • Code analysis
  • Security management, legal framework conditions
  • Security problems in IT systems
  • Concrete security and asymptotic security: comparison of both approaches in relation to modes of operations
  • Block-Ciphers: Feistel Networks, Substitution-Permutation Networks, Design Principles, Linear Cryptanalysis, Differential cryptanalysis
  • Authenticated Encryption
  • Secure multi-party calculations: preprocessing model, protection of algorithms against side-channel attacks, MPC-in-the-Head (for ZK evidence)
  • Obfuscation: Nicht-Machbarkeit (BlackBox), Machbarkeit (indistinguishable Obfuscation)

Qualification-goals/Competencies:

  • Students can explain the basic methods in the field of cybersecurity and apply them to case studies.
  • They can demonstrate a deeper understanding of cryptographic methods and their applications in communication systems.
  • They can analyze the entire spectrum of the security of a system.
  • They can explain modelling techniques and describe experiences with their use.
  • They can apply a variety of standard techniques to increase the security of a system.
  • The participants can explain and use basic theoretic cryptographic objects
  • They are able to understand current concepts of cryptography
  • They show a deep understanding of cryptographic methods
  • They understand the basic connection between theoretical and practical aspects of cryptography
  • They are able to understand current scientific works about cryptography and explain them

Grading through:

  • Written or oral exam as announced by the examiner

Responsible for this module:

Literature:

  • S. Mangard, E. Oswald & T. Popp : Power analysis attacks: Revealing the secrets of smart cards Vol. 31, Springer Science & Business Media, 2008
  • D. Stinson : Cryptography: Theory and Practice 4th ed., CRC Press, 2018
  • Stallings, Brown : Computer Security: Principles and Practice 4th ed., Pearson, 2018
  • Katz, Lindell : Introduction to Modern Cryptography 2nd ed., CRC Press, 2014
  • : Recent literature

Language:

  • English, except in case of only German-speaking participants

Notes:

Admission requirements for enrolling in the module:
- None (the skills covered in the modules listed under “Prerequisites” are required for this module, but are not a formal requirement)

Admission requirements for participation in module examination(s):
- Successful completion of exercise sheets in accordance with the specifications at the beginning of the semester
- Presentations during the semester in accordance with the specifications at the beginning of the semester
- Writing a lecture in LaTeX

Module examination(s):
- CS4523-L1: Information Security and Cryptography, oral exam, 100% of the module grade

Last Updated:

19.12.2025