Module CS4523-KP12
Information Security and Cryptography (InfSecCry)
Duration
2 Semester
Turnus of offer
each year, can be started in winter or summer semester
Credit points
12
Course of studies, specific fields and terms:
- Master Entrepreneurship in Digital Technologies 2020, advanced module, specific
- Master Entrepreneurship in Digital Technologies 2014, advanced module, specific
- Master Computer Science 2019, optional subject, advanced module
Classes and lectures:
- Advanced Cryptology (exercise, 3 SWS)
- Advanced Cryptology (lecture, 1 SWS)
- Communication and System Security (exercise, 2 SWS)
- Communication and System Security (lecture, 2 SWS)
Workload:
- 40 hours exam preparation
- 200 hours private studies
- 120 hours in-classroom work
Contents of teaching:
- Cryptographic procedures and protocols, security analyses
- IT security at system level, security mechanisms
- Security, privacy and trust of special systems such as Cloud and IoT
- Code analysis
- Security management, legal framework conditions
- Security problems in IT systems
- Concrete security and asymptotic security: comparison of both approaches in relation to modes of operations
- Block-Ciphers: Feistel Networks, Substitution-Permutation Networks, Design Principles, Linear Cryptanalysis, Differential cryptanalysis
- Authenticated Encryption
- Secure multi-party calculations: preprocessing model, protection of algorithms against side-channel attacks, MPC-in-the-Head (for ZK evidence)
- Obfuscation: Nicht-Machbarkeit (BlackBox), Machbarkeit (indistinguishable Obfuscation)
Qualification-goals/Competencies:
- Students can explain the basic methods in the field of cybersecurity and apply them to case studies.
- They can demonstrate a deeper understanding of cryptographic methods and their applications in communication systems.
- They can analyze the entire spectrum of the security of a system.
- They can explain modelling techniques and describe experiences with their use.
- They can apply a variety of standard techniques to increase the security of a system.
- The participants can explain and use basic theoretic cryptographic objects
- They are able to understand current concepts of cryptography
- They show a deep understanding of cryptographic methods
- They understand the basic connection between theoretical and practical aspects of cryptography
- They are able to understand current scientific works about cryptography and explain them
Grading through:
- Written or oral exam as announced by the examiner
Responsible for this module:
Literature:
- S. Mangard, E. Oswald & T. Popp : Power analysis attacks: Revealing the secrets of smart cards Vol. 31, Springer Science & Business Media, 2008
- D. Stinson : Cryptography: Theory and Practice 4th ed., CRC Press, 2018
- Stallings, Brown : Computer Security: Principles and Practice 4th ed., Pearson, 2018
- Katz, Lindell : Introduction to Modern Cryptography 2nd ed., CRC Press, 2014
- : Recent literature
Language:
- English, except in case of only German-speaking participants
Notes:
Admission requirements for enrolling in the module:- None (the skills covered in the modules listed under Prerequisites are required for this module, but are not a formal requirement)
Admission requirements for participation in module examination(s):
- Successful completion of exercise sheets in accordance with the specifications at the beginning of the semester
- Presentations during the semester in accordance with the specifications at the beginning of the semester
- Writing a lecture in LaTeX
Module examination(s):
- CS4523-L1: Information Security and Cryptography, oral exam, 100% of the module grade
Last Updated:
19.12.2025