Information on individual educational components (ECTS-Course descriptions) per semester

Elective: Cryptological Application

Degree programme Computer Science - Digital Innovation
Subject area Engineering Technology
Type of degree Bachelor
Part-time
Summer Semester 2025
Course unit title Elective: Cryptological Application
Course unit code 083121160103
Language of instruction English
Type of course unit (compulsory, optional) Elective
Teaching hours per week 3
Year of study 2025
Level of the course / module according to the curriculum
Number of ECTS credits allocated 5
Name of lecturer(s) Armin SIMMA
Requirements and Prerequisites

Mathematical and statistical fundamentals (eg large powers, statistic distributions)

"Installation of VirtualBox (or VMWare) and a Virtual Machine is not part of the class but a prerequisite.  Basic simple configuration settings including mastery of simple Windows command-line commands and linux shell commands is also assumed. Basic networking knowledge is assumed."

Course content
  • Basics and terms: security, security objectives, confidentiality, integrity, availability, liability, authenticity, accountability, access control
  • Classic and modern cryptology
  • Cryptanalysis: Selected procedures (Brute Force ...)
  • Encryption: Symmetric (DES, 3-DES, AES), asymmetric (RSA, ECC, key generation, Diffie-Hellman) and hybrid encryption
  • Hashes: properties, required lengths (Preimage Attack, Collision Attack, concrete algorithms: MD-5, SHA-1, SHA-256)
  • Applications: Unix Passwords, SW Integrity, Digital Signature, MAC (Message Authentication Code), Digital Certificates: CA (Certification Authority), PKI
  • Basic/low level of capability: Cryptographic applications: IT security in the area of ​​Industry 4.0 and IoT, data anonymization, especially for big data applications, blockchain, smart contracts, cryptographic protocols for e-mail communication and instant messaging, automated, cryptographically secured, actor-related data exchange, secure data models, set up of secure (ad hoc) networks in the area of ​​IoT, secure methods for SMEs
Learning outcomes

Cryptological procedures have a long tradition. Nevertheless, security and cryptology are gaining new meaning in the course of digital innovation and transformation processes due to the uncertain, potentially hostile environment.

Theoretical and methodological know-how (T/M):

  • Students know the essential security objectives (CIA) as well as the broader objectives.
  • Students know the fundamental cryptographic algorithms and understand which algorithm should be used in a certain context and justify their purpose.
  • Students name and explain the cryptological application areas. In addition, they are able to understand and implement the implementation steps in simple application scenarios.

In addition, social and communicative skills (S/C) such as teamwork/willingness to cooperate, critical faculty, motivation, reliability as well as self-competences (S) such as learning and motivation, decision-making, responsibility, expressiveness, appearance are trained.

Planned learning activities and teaching methods

Integrated course: 3 THW.

Lectures and exercises, which will be presented and discussed in the group. 

Assessment methods and criteria
  • Exercises (30%)
  • Final electronic (written) exam at FHV (70%)

For a positive grade, a minimum of 50% of the possible points must be achieved in each part of the examination.

Comment

None

Recommended or required reading
  • Bishop, Matt (2017): Computer Security: Art and Science. 2nd edition. Boston, MA: Addison Wesley.
  • Boyle, Randall J.; Panko, Raymond R. (2014): Corporate Computer Security, Global Edition. 4 ed. Boston, Mass.: Pearson Education Limited.
  • Drescher, Daniel (2017): Blockchain Basics: A Non-Technical Introduction in 25 Steps. 1st ed. Berkeley, California Apress.
  • Kurose, James; Keith, Ross (2016): Computer Networking: A Top-Down Approach, Global Edition. 7. Boston Columbus Indianapolis Amsterdam Cape Town: Prentice Hall.
  • Tapscott, Don; Tapscott, Alex (2018): Blockchain Revolution: How the Technology Behind Bitcoin and Other Cryptocurrencies is Changing the World. Portfolio Penguin.
  • Torra, Vicenç (2019): Data Privacy: Foundations, New Developments and the Big Data Challenge. Softcover reprint of the original 1st ed. 2017. S.l.: Springer.
Mode of delivery (face-to-face, distance learning)

In-class lecture: Compulsory attendance in the practice session.