Information on individual educational components (ECTS-Course descriptions) per semester

Degree programme:Bachelor Computer Science - Digital Innovation
Type of degree:FH Bachelor´s Degree Programme
 Summer Semester 2022

Course unit titleElective: Cryptological Application
Course unit code083121160103
Language of instructionEnglish
Type of course unit (compulsory, optional)Elective
Semester when the course unit is deliveredSummer Semester 2022
Teaching hours per week3
Year of study2022
Level of course unit (e.g. first, second or third cycle)First Cycle (Bachelor)
Number of ECTS credits allocated5
Name of lecturer(s)Armin SIMMA

Prerequisites and co-requisites

Mathematical and statistical fundamentals (eg large powers, statistic distributions)

Course content
  • Basics and terms: security, security objectives, confidentiality, integrity, availability, liability, authenticity, accountability, access control
  • Classic and modern cryptology
  • Cryptanalysis: Selected procedures (Brute Force ...)
  • Encryption: Symmetric (DES, 3-DES, AES), asymmetric (RSA, ECC, key generation, Diffie-Hellman) and hybrid encryption
  • Hashes: properties, required lengths (Preimage Attack, Collision Attack, concrete algorithms: MD-5, SHA-1, SHA-256)
  • Applications: Unix Passwords, SW Integrity, Digital Signature, MAC (Message Authentication Code), Digital Certificates: CA (Certification Authority), PKI
  • Cryptographic applications: IT security in the area of ​​Industry 4.0 and IoT, data anonymization, especially for big data applications, blockchain, smart contracts, cryptographic protocols for e-mail communication and instant messaging, automated, cryptographically secured, actor-related data exchange, secure data models, set up of secure (ad hoc) networks in the area of ​​IoT, secure methods for SMEs, Information Security Management Systems
Learning outcomes

Cryptological procedures have a long tradition. Nevertheless, security and cryptology are gaining new meaning in the course of digital innovation and transformation processes due to the uncertain, potentially hostile environment.

Theoretical and methodological know-how (T/M):

  • Students know the essential safety objectives (CIA) as well as the broader objectives.
  • Students know the fundamental cryptographic algorithms and understand which algorithm should be used in a certain context and justify their purpose.
  • Students name and explain the cryptological application areas. In addition, they are able to understand and implement the implementation steps in simple application scenarios.

In addition, social and communicative skills (S/C) such as teamwork/willingness to cooperate, critical faculty, motivation, reliability as well as self-competences (S) such as learning and motivation, decision-making, responsibility, expressiveness, appearance are trained.

Planned learning activities and teaching methods

Integrated course: 3 THW.

Lectures and exercises, which will be presented and discussed in the group. 

Assessment methods and criteria
  • Exercises (30 %)
  • Final written exam (70 %)


Recommended or required reading
  • Bishop, Matt (2017): Computer Security: Art and Science. 2nd edition. Boston, MA: Addison Wesley.
  • Boyle, Randall J.; Panko, Raymond R. (2014): Corporate Computer Security, Global Edition. 4 ed. Boston, Mass.: Pearson Education Limited.
  • Drescher, Daniel (2017): Blockchain Basics: A Non-Technical Introduction in 25 Steps. 1st ed. Berkeley, California Apress.
  • Kurose, James; Keith, Ross (2016): Computer Networking: A Top-Down Approach, Global Edition. 7. Boston Columbus Indianapolis Amsterdam Cape Town: Prentice Hall.
  • Tapscott, Don; Tapscott, Alex (2018): Blockchain Revolution: How the Technology Behind Bitcoin and Other Cryptocurrencies is Changing the World. Portfolio Penguin.
  • Torra, Vicenç (2019): Data Privacy: Foundations, New Developments and the Big Data Challenge. Softcover reprint of the original 1st ed. 2017. S.l.: Springer.
Mode of delivery (face-to-face, distance learning)

In-class lecture: Compulsory attendance in the practice session.

Summer Semester 2022go Top