IT & Mobile Security


Integrated course, 5.00 ECTS


Course content

A) Mathematcal Fundamentals

·         Euclidean Algorithmu

·         Congruences & Residues

·         Fermat's little Theorem

·         Discrete Logarithm

·         Discrere Roots

·         Principles of asymmetric Cryptography

B) Cryptographic Primitives

·         Examples of classic an modern Cryptography

·         Cryptosystems

·         Encryption-Algorithm

·         Hash-Functions and MACs

·         Digital Signatures

·         Key-Managment and Random Numbers

·         Cryptographic Protocols

Learning outcomes

Detailed knowledge of foundation and practical application of Cryptography.

Recommended or required reading and other learning resources / tools

Schneier: Applied Cryptography, Burnett:Cryptography, Ferguson, Schneier: Practical Cryptography, Buchmann: Introduction to Cryptography

Mode of delivery

Frontal lecture in the context of lectures

Implementation of cryptographic procedures in the laboratory

Prerequisites and co-requisites

Informatics at Bachelor Level

Assessment methods and criteria

In the framework of the practice labs, examples have to be given, for which points are awarded. At the end of the semester there will be a final theory exam.