Settings
Module Secure Systems, Master Course Computer Science (ER 5)
Module summary

Secure Systems

INFM220

Prof. Dr. Frank Schaefer

7 ECTS points / 5 Contact hours

2nd Semester

none

none

Understanding of the basic techniques used in applied cryptography and modern coding theory

Written Exam 120 Min. (graded)
Course Applied Cryptography

INFM221.a

Lecture

Prof. Dr. Frank Schaefer

German

4/3

Module exam

In the course the main cryptographic algorithms are presented. Blockciphers (DES, AES), Modes of Operation (ECB, CBC, Countermode), Hash functions, MACs, public key algorithms (RSA, Diffie-Helman, ElGamal) are covered by the lectures.
Then we will look at and analyze applications in IT-security, which use cryptography: E/mail-security (eg. PGP, S-MIME), web-security (SSL), network-security (IP-Sec), authentication mechanisms.
 

Claudia Eckert: IT-Sicherheit. Konzepte - Verfahren - Protokolle, München, Oldenbourg Wissenschaftsverlag, 2013, 8. Auflage, ISBN 978-3-486-58270-3.

The course consist of lectures (around 2/3) and exercises (around 1/3). In the exercises the mathematical techniques introduced in the lecture will be trained.

Course Coding Theory

INFM221.b

Lecture

Prof. Dr. Dirk Hoffmann

German

3/2

Module exam

This course teaches foundations about codes and codings as well as basic algorithms for source coding, channel coding and line coding. The lecture focuses on the following topics: information and coding theory, data compression, error detecting and correcting codes, limits of data transmission.

 

Slides, blackboard, exercise sheets

Lecture