Cryptography and System Security
Module EI7121
This module handbook serves to describe contents, learning outcome, methods and examination type as well as linking to current dates for courses and module examination in the respective sections.
Basic Information
EI7121 is a semester module in German language at Bachelor’s level which is offered in summer semester.
This module description is valid to WS 2013/4.
Total workload | Contact hours | Credits (ECTS) |
---|---|---|
90 h | 45 h | 3 CP |
Content, Learning Outcome and Preconditions
Content
The lecture serves as an introduction to cryptology,
starting with the basic aspects of security: confidentiality, authenticity and integrity, anonymity, non-repudiation, authorisation and access control.
The relevant results from discrete math are reviewed with special focus on the arithmetics of finite fields and elliptic curves.
The discussion of cryptographic mechanisms (symmetric vs. asymmetric cryptography, stream cyphers, hybrid cryptography, one-way- and hash-functions, digital signatures) is succeeded by the inspection of important cryptographic algorithms. Namely, among others, (Triple-)DES, IDEA, AES, RSA, El-Gamal and ECC are considered along with their modes of operation.
The application of these algorithms for cryptographic protocols such as challenge-response procedures, Diffie-Hellman key exchange, the Fiat-Shamir protocol, Kerberos and public key infrastructures is covered.
The lecture is rounded off with a glance at the utilisation of cryptography for chip-card based security applications.
starting with the basic aspects of security: confidentiality, authenticity and integrity, anonymity, non-repudiation, authorisation and access control.
The relevant results from discrete math are reviewed with special focus on the arithmetics of finite fields and elliptic curves.
The discussion of cryptographic mechanisms (symmetric vs. asymmetric cryptography, stream cyphers, hybrid cryptography, one-way- and hash-functions, digital signatures) is succeeded by the inspection of important cryptographic algorithms. Namely, among others, (Triple-)DES, IDEA, AES, RSA, El-Gamal and ECC are considered along with their modes of operation.
The application of these algorithms for cryptographic protocols such as challenge-response procedures, Diffie-Hellman key exchange, the Fiat-Shamir protocol, Kerberos and public key infrastructures is covered.
The lecture is rounded off with a glance at the utilisation of cryptography for chip-card based security applications.
Learning Outcome
Upon completion of the course, the student understands the basic methods of cryptology and is capable of utilising those in a real-life scenario as well as judging basic security aspects of IT-systems and the intricacy of implementing cryptographic methods.
Preconditions
basic knowledge of programming, algorithms and data structures, computer hardware, communication protocols,
diskrete mathematics
the following courses should have been completed successfully:
Algorithmen und Datenstrukturen, Programmierpraktikum C,
Computertechnik, Kommunikationsnetze
diskrete mathematics
the following courses should have been completed successfully:
Algorithmen und Datenstrukturen, Programmierpraktikum C,
Computertechnik, Kommunikationsnetze
Courses, Learning and Teaching Methods and Literature
Courses and Schedule
Type | SWS | Title | Lecturer(s) | Dates | Links |
---|---|---|---|---|---|
VU | 3 | Cryptography |
documents |
Learning and Teaching Methods
The lecture employs Powerpoint slides as well as notes on blackboard and is accompanied by exercises that are presented in the same way.
Media
methods of presentations:
- slides, blackboard
- textbook
- guest lecturer(s) with industrial background
- slides, blackboard
- textbook
- guest lecturer(s) with industrial background
Literature
recommended literature:
- J. Swoboda, St.Spitz, M.Pramateftakis. Kryptographie und ITSicherheit, Vieweg Verlag, 2007.
(signature TUM-library: 0003/DAT 465f 2008 L 637)
- J. Swoboda, St.Spitz, M.Pramateftakis. Kryptographie und ITSicherheit, Vieweg Verlag, 2007.
(signature TUM-library: 0003/DAT 465f 2008 L 637)