Elective: Cryptological Application
Degree programme | Computer Science - Digital Innovation |
Subject area | Engineering & Technology |
Type of degree | Bachelor Part-time Summer Semester 2025 |
Course unit title | Elective: Cryptological Application |
Course unit code | 083121160103 |
Language of instruction | English |
Type of course unit (compulsory, optional) | Elective |
Teaching hours per week | 3 |
Year of study | 2025 |
Level of the course / module according to the curriculum | |
Number of ECTS credits allocated | 5 |
Name of lecturer(s) | Armin SIMMA |
Mathematical and statistical fundamentals (eg large powers, statistic distributions)
"Installation of VirtualBox (or VMWare) and a Virtual Machine is not part of the class but a prerequisite. Basic simple configuration settings including mastery of simple Windows command-line commands and linux shell commands is also assumed. Basic networking knowledge is assumed."
- Basics and terms: security, security objectives, confidentiality, integrity, availability, liability, authenticity, accountability, access control
- Classic and modern cryptology
- Cryptanalysis: Selected procedures (Brute Force ...)
- Encryption: Symmetric (DES, 3-DES, AES), asymmetric (RSA, ECC, key generation, Diffie-Hellman) and hybrid encryption
- Hashes: properties, required lengths (Preimage Attack, Collision Attack, concrete algorithms: MD-5, SHA-1, SHA-256)
- Applications: Unix Passwords, SW Integrity, Digital Signature, MAC (Message Authentication Code), Digital Certificates: CA (Certification Authority), PKI
- Basic/low level of capability: Cryptographic applications: IT security in the area of Industry 4.0 and IoT, data anonymization, especially for big data applications, blockchain, smart contracts, cryptographic protocols for e-mail communication and instant messaging, automated, cryptographically secured, actor-related data exchange, secure data models, set up of secure (ad hoc) networks in the area of IoT, secure methods for SMEs
Cryptological procedures have a long tradition. Nevertheless, security and cryptology are gaining new meaning in the course of digital innovation and transformation processes due to the uncertain, potentially hostile environment.
Theoretical and methodological know-how (T/M):
- Students know the essential security objectives (CIA) as well as the broader objectives.
- Students know the fundamental cryptographic algorithms and understand which algorithm should be used in a certain context and justify their purpose.
- Students name and explain the cryptological application areas. In addition, they are able to understand and implement the implementation steps in simple application scenarios.
In addition, social and communicative skills (S/C) such as teamwork/willingness to cooperate, critical faculty, motivation, reliability as well as self-competences (S) such as learning and motivation, decision-making, responsibility, expressiveness, appearance are trained.
Integrated course: 3 THW.
Lectures and exercises, which will be presented and discussed in the group.
- Exercises (30%)
- Final electronic (written) exam at FHV (70%)
For a positive grade, a minimum of 50% of the possible points must be achieved in each part of the examination.
None
- Bishop, Matt (2017): Computer Security: Art and Science. 2nd edition. Boston, MA: Addison Wesley.
- Boyle, Randall J.; Panko, Raymond R. (2014): Corporate Computer Security, Global Edition. 4 ed. Boston, Mass.: Pearson Education Limited.
- Drescher, Daniel (2017): Blockchain Basics: A Non-Technical Introduction in 25 Steps. 1st ed. Berkeley, California Apress.
- Kurose, James; Keith, Ross (2016): Computer Networking: A Top-Down Approach, Global Edition. 7. Boston Columbus Indianapolis Amsterdam Cape Town: Prentice Hall.
- Tapscott, Don; Tapscott, Alex (2018): Blockchain Revolution: How the Technology Behind Bitcoin and Other Cryptocurrencies is Changing the World. Portfolio Penguin.
- Torra, Vicenç (2019): Data Privacy: Foundations, New Developments and the Big Data Challenge. Softcover reprint of the original 1st ed. 2017. S.l.: Springer.
In-class lecture: Compulsory attendance in the practice session.