Cryptography and Formal Methods of IT-Security

IT-Security Students receive a general overview of formal methods of security in distributed information systems and the central ideas and concepts of cryptography that were acquired in the Bachelor module IT Security are deepened and extended.

In particular, they master the mathematical principles, theories and functions of cryptographic methods. The students are able to assess protocols of encryption, authentication and key exchange, to apply them to solve complex problems and to extend and evaluate the practical implementation if required.

Furthermore, students are familiar with selected access control systems and have the ability to develop an information security and management system. They are prepared to use their knowledge to react creatively to new circumstances. The students are able to define goals and solutions in professional practice and in academic contexts for communication security and information assurance.


Content of this Course:

  • Notion of Cryptography, Cryptanalysis and Steganography
  • Cryptosystems and Classification, Shanonns Theory, Factorization Problem, Problem of Discrete Logarithm
  • Introduction in Methods for Cryptanalysis
  • Theory of Cryptographic Methods (AES, RSA, ElGamal, Digital Signature Algorithm, Elliptic Curve Cryptosystems)
  • Session Key Distribution Scheme und Key Agreement Scheme
  • Authentication and Protocols, i.e. On-time Password, Challenge-Response und Zero-Knowledge Protocols
  • Cryptographic Strong Hash Functions, Merkle-Damgard Principle, Message Authentication Codes
  • Access Control and Information Flow Systems (Chinese-Wall, Bell-LaPadula, need-to-know-Principle, RBAC)
  • Security Managementand Evaluation of Security Systems (Common Criteria, Standard ISO 27000)
  • Threat and Vulnerability Analysis, Audit, Penetration Testing
  • Digital Right Management (Water Marking)
  • Actual Problems of Information Security


last modified: 21.01.2020 08:59