Course contents *
Basic concepts and principles, intuition about safety, implementation and engineering aspects as well as influence on society, black box analysis, use of cryptographic primitives as symmetric and asymmetric encryption in applications, digital signatures, cryptographic hash functions and simple cryptosystems and cryptographic protocols.
Intended learning outcomes *
After passing the course, the students should be able to:
· use basic terminology in computer security and cryptography correctly,
· describe cryptographic concepts and explain their security properties,
· identify and categorise threats against an IT system at a conceptual level,
· find and use documentation of cryptographic libraries and standards,
· analyse descriptions of cryptographic systems and protocols in terms of black box cryptographic primitives from a software engineering perspective,
· identify vulnerabilities based on system descriptions, estimate the level of threat, suggest countermeasures against identified threats as well as show that they are efficient,
· compare countermeasures, evaluate their side effects and present their reasoning to others
in order to
· as citizen and engineer be able to discuss applied cryptography in general, and risks of using/developing cryptography in particular,
· in professional life and/or research and development project be able to evaluate challenges in software development related to cryptography.