IT & Mobile Security

Applied Cryptography

Integrated course, 3.00 ECTS


Course content

The following topics are covered within the lecture:
Application in example Internet Protocols (IPSec, SSL, TLS, SSH), Random Number Generators, Cryptographic Libraries & APIs for mobile Platform, Correct usage of cryptographic primitives in mobile solutions, Challenge/Response techniques, One Time Passwords, Elliptic Curves, Anonymity + Unlinkability, selected advanced topics

Learning outcomes

The graduate designs, plans and diagnoses computer networks with a focus on mobile infrastructures and database systems and masters the necessary cryptographic applications.

Recommended or required reading and other learning resources / tools

Schneier: Applied Cryptography,
Ferguson, Schneier: Practical Cryptography,
Natan R. Database Security,
Ambler S. Database Refactoring,
"Security and Privacy in Mobile Information and Communication Systems", Andreas U. Schmidt(Hg), 2012, ISBN-13: 978-3642333910
"Mobile Security", Steven Furnell, 2009, ISBN-13: 978-1849280204
"Wireless and Mobile Networks Security (Iste)", H. Chaouchi, ISBN-13: 978-1848211179
"Mobile and Wireless Network Security and Privacy", S. Kami Makki (Hg), 2007, ISBN-13: 978-0387710570
"Mobile and Wireless Networks Security: Proceedings of the MWNS 2008 Workshop", Maryline Laurent-Maknavickius (hg). 2008, ISBN-13: 978-9812833259
"Advanced IPSec VPN Design (Networking Technology)", Vijay Bollapragada, 2005, ISBN-13: 978-1587051111
"Telecommunication System Engineering", Roger L. Freeman, ISBN-13: 978-0471029557
Sammes: Forensic Computing
Anderson: Security Engineering
Bollapragada: IPSec VPN Design
Garfinkel: Practical Unix and Internet Security Freeman: Telecommunication System Engineering
Journals: -

Mode of delivery

1 ECTS lecture, 2 ECTS tutorial

Prerequisites and co-requisites

modules ISC 1 and CRY

Assessment methods and criteria

Lecture: final exam, tutorial: continuous assessment