This website is no longer updated.

As of 1.10.2022, the Faculty of Physics has been merged into the TUM School of Natural Sciences with the website For more information read Conversion of Websites.

de | en

Cryptography and System Security

Module EI7121

This Module is offered by TUM Department of Electrical and Computer Engineering.

This module handbook serves to describe contents, learning outcome, methods and examination type as well as linking to current dates for courses and module examination in the respective sections.

Basic Information

EI7121 is a semester module in German language at Bachelor’s level which is offered in summer semester.

This module description is valid to WS 2013/4.

Total workloadContact hoursCredits (ECTS)
90 h 45 h 3 CP

Content, Learning Outcome and Preconditions


The lecture serves as an introduction to cryptology,
starting with the basic aspects of security: confidentiality, authenticity and integrity, anonymity, non-repudiation, authorisation and access control.
The relevant results from discrete math are reviewed with special focus on the arithmetics of finite fields and elliptic curves.
The discussion of cryptographic mechanisms (symmetric vs. asymmetric cryptography, stream cyphers, hybrid cryptography, one-way- and hash-functions, digital signatures) is succeeded by the inspection of important cryptographic algorithms. Namely, among others, (Triple-)DES, IDEA, AES, RSA, El-Gamal and ECC are considered along with their modes of operation.
The application of these algorithms for cryptographic protocols such as challenge-response procedures, Diffie-Hellman key exchange, the Fiat-Shamir protocol, Kerberos and public key infrastructures is covered.
The lecture is rounded off with a glance at the utilisation of cryptography for chip-card based security applications.

Learning Outcome

Upon completion of the course, the student understands the basic methods of cryptology and is capable of utilising those in a real-life scenario as well as judging basic security aspects of IT-systems and the intricacy of implementing cryptographic methods.


basic knowledge of programming, algorithms and data structures, computer hardware, communication protocols,
diskrete mathematics

the following courses should have been completed successfully:
Algorithmen und Datenstrukturen, Programmierpraktikum C,
Computertechnik, Kommunikationsnetze

Courses, Learning and Teaching Methods and Literature

Courses and Schedule

VU 3 Cryptography documents

Learning and Teaching Methods

The lecture employs Powerpoint slides as well as notes on blackboard and is accompanied by exercises that are presented in the same way.


methods of presentations:
- slides, blackboard
- textbook
- guest lecturer(s) with industrial background


recommended literature:
- J. Swoboda, St.Spitz, M.Pramateftakis. Kryptographie und ITSicherheit, Vieweg Verlag, 2007.
(signature TUM-library: 0003/DAT 465f 2008 L 637)

Module Exam

Description of exams and course work

Final Exam
Top of page