|Prerequisites and co-requisites|
Mathematical and statistical fundamentals (eg large powers, statistic distributions)
- Basics and terms: security, security objectives, confidentiality, integrity, availability, liability, authenticity, accountability, access control
- Classic and modern cryptology
- Cryptanalysis: Selected procedures (Brute Force ...)
- Encryption: Symmetric (DES, 3-DES, AES), asymmetric (RSA, ECC, key generation, Diffie-Hellman) and hybrid encryption
- Hashes: properties, required lengths (Preimage Attack, Collision Attack, concrete algorithms: MD-5, SHA-1, SHA-256)
- Applications: Unix Passwords, SW Integrity, Digital Signature, MAC (Message Authentication Code), Digital Certificates: CA (Certification Authority), PKI
- Cryptographic applications: IT security in the area of Industry 4.0 and IoT, data anonymization, especially for big data applications, blockchain, smart contracts, cryptographic protocols for e-mail communication and instant messaging, automated, cryptographically secured, actor-related data exchange, secure data models, set up of secure (ad hoc) networks in the area of IoT, secure methods for SMEs, Information Security Management Systems
Cryptological procedures have a long tradition. Nevertheless, security and cryptology are gaining new meaning in the course of digital innovation and transformation processes due to the uncertain, potentially hostile environment.
Theoretical and methodological know-how (T/M):
- Students know the essential safety objectives (CIA) as well as the broader objectives.
- Students know the fundamental cryptographic algorithms and understand which algorithm should be used in a certain context and justify their purpose.
- Students name and explain the cryptological application areas. In addition, they are able to understand and implement the implementation steps in simple application scenarios.
In addition, social and communicative skills (S/C) such as teamwork/willingness to cooperate, critical faculty, motivation, reliability as well as self-competences (S) such as learning and motivation, decision-making, responsibility, expressiveness, appearance are trained.
|Planned learning activities and teaching methods|
Integrated course: 3 THW.
Lectures and exercises, which will be presented and discussed in the group.
|Assessment methods and criteria|
- Exercises (30 %)
- Final written exam (70 %)
|Recommended or required reading|
- Bishop, Matt (2017): Computer Security: Art and Science. 2nd edition. Boston, MA: Addison Wesley.
- Boyle, Randall J.; Panko, Raymond R. (2014): Corporate Computer Security, Global Edition. 4 ed. Boston, Mass.: Pearson Education Limited.
- Drescher, Daniel (2017): Blockchain Basics: A Non-Technical Introduction in 25 Steps. 1st ed. Berkeley, California Apress.
- Kurose, James; Keith, Ross (2016): Computer Networking: A Top-Down Approach, Global Edition. 7. Boston Columbus Indianapolis Amsterdam Cape Town: Prentice Hall.
- Tapscott, Don; Tapscott, Alex (2018): Blockchain Revolution: How the Technology Behind Bitcoin and Other Cryptocurrencies is Changing the World. Portfolio Penguin.
- Torra, Vicenç (2019): Data Privacy: Foundations, New Developments and the Big Data Challenge. Softcover reprint of the original 1st ed. 2017. S.l.: Springer.
|Mode of delivery (face-to-face, distance learning)|
In-class lecture: Compulsory attendance in the practice session.