Cryptology and Data Security

Faculty

Faculty of Engineering and Computer Science

Version

Version 1 of 09.02.2026.

Module identifier

11M2014

Module level

Master

Language of instruction

German

ECTS credit points and grading

5.0

Module frequency

only winter term

Duration

1 semester

 

 

Brief description

Digitized business processes are fundamentally dependent on the use of secure cryptographic procedures, such as TLS or digital signatures.

In addition to technical measures, operational data security depends in particular on the management of data and information security. Legal requirements (e.g. GDPR) must also be complied with.

After completing the module, students will know how cryptographic procedures work. They will be able to select suitable cryptographic procedures to ensure confidentiality, data integrity, authenticity and binding nature in application scenarios or process flows.

Students will be familiar with standardized procedures, approaches and legal requirements for implementing data security operationally, both from an organizational, procedural and technical perspective.

Teaching and learning outcomes

Cryptology

1.1 Brief review of necessary discrete mathematics

1.2 Block ciphers and their operating modes

1.3 Public key cryptosystems and key exchange procedures

1.4 Hash functions, message authentication codes and digital signatures

1.5 Post-quantum cryptography methods

Data security

1.1 Standards for information security management

1.2 Management processes and basic principles for data security

1.3 Legal requirements for data protection and data security

1.4 Fault-tolerant data storage and transmission

1.5 Error-detecting and error-correcting codes

Overall workload

The total workload for the module is 150 hours (see also "ECTS credit points and grading").

Teaching and learning methods
Lecturer based learning
Workload hoursType of teachingMedia implementationConcretization
45LecturePresence or online-
Lecturer independent learning
Workload hoursType of teachingMedia implementationConcretization
75Preparation/follow-up for course work-
30Exam preparation-
Graded examination
  • Written examination or
  • oral exam
Remark on the assessment methods

Written or oral examination.

The form of examination is determined by the teacher.

Exam duration and scope

Written examination: see the applicable study regulations

Oral examination: see the applicable study regulations

Recommended prior knowledge

Knowledge of the basics of number theory (residue classes, extended Euclidean algorithm, Euler's theorem, Euler's phi function, Chinese remainder theorem, finite fields)

Knowledge Broadening

Students know the most important cryptological procedures including their areas of application. Students know standardized procedures, approaches and legal requirements for implementing data security from an organizational, procedural and technical perspective.

Knowledge deepening

Students know how the most important cryptological procedures work, including the necessary mathematical principles. They will be able to assess the security and possible applications of the methods.

Knowledge Understanding

Students know the functions and limitations of cryptographic procedures as well as the functions of technical procedures for error detection and correction.

Application and Transfer

Students are able to select suitable cryptographic methods to ensure confidentiality, data integrity, authenticity and reliability in application scenarios or processes. 

Literature

Die Literaturangaben beziehen sich auf die neueste Auflage, sofern nicht explizit ein
Erscheinungsjahr angegeben ist.

J. Buchmann, "Einführung in die Kryptographie", Springer

W. Stallings, "Cryptography and network security", Pearson

Meyers, S. Harris, "CISSP", mitp-Verlag

D. Bernstein, J. Buchmann, E. Dahmen, "Post-Quantum Cryptography", Springer

C. Paar, J. Pelzl, "Kryptographie verst?ndlich", Springer Vieweg

Brenner, Gentschen Felde, Hommel, Metzger, Reiser, Schaaf, "Praxisbuch ISO/IEC 27001", Hanser

Applicability in study programs

  • Computer Science
    • Computer Science M.Sc. (01.09.2025)

    Person responsible for the module
    • Scheerhorn, Alfred
    Teachers
    • Scheerhorn, Alfred
    • T?njes, Ralf
    • Timmer, Gerald
    • Roer, Peter