Cryptology and Data Security
- Faculty
Faculty of Engineering and Computer Science
- Version
Version 1 of 09.02.2026.
- Module identifier
11M2014
- Module level
Master
- Language of instruction
German
- ECTS credit points and grading
5.0
- Module frequency
only winter term
- Duration
1 semester
- Brief description
Digitized business processes are fundamentally dependent on the use of secure cryptographic procedures, such as TLS or digital signatures.
In addition to technical measures, operational data security depends in particular on the management of data and information security. Legal requirements (e.g. GDPR) must also be complied with.
After completing the module, students will know how cryptographic procedures work. They will be able to select suitable cryptographic procedures to ensure confidentiality, data integrity, authenticity and binding nature in application scenarios or process flows.
Students will be familiar with standardized procedures, approaches and legal requirements for implementing data security operationally, both from an organizational, procedural and technical perspective.
- Teaching and learning outcomes
Cryptology
1.1 Brief review of necessary discrete mathematics
1.2 Block ciphers and their operating modes
1.3 Public key cryptosystems and key exchange procedures
1.4 Hash functions, message authentication codes and digital signatures
1.5 Post-quantum cryptography methods
Data security
1.1 Standards for information security management
1.2 Management processes and basic principles for data security
1.3 Legal requirements for data protection and data security
1.4 Fault-tolerant data storage and transmission
1.5 Error-detecting and error-correcting codes
- Overall workload
The total workload for the module is 150 hours (see also "ECTS credit points and grading").
- Teaching and learning methods
Lecturer based learning Workload hours Type of teaching Media implementation Concretization 45 Lecture Presence or online - Lecturer independent learning Workload hours Type of teaching Media implementation Concretization 75 Preparation/follow-up for course work - 30 Exam preparation -
- Graded examination
- Written examination or
- oral exam
- Remark on the assessment methods
Written or oral examination.
The form of examination is determined by the teacher.
- Exam duration and scope
Written examination: see the applicable study regulations
Oral examination: see the applicable study regulations
- Recommended prior knowledge
Knowledge of the basics of number theory (residue classes, extended Euclidean algorithm, Euler's theorem, Euler's phi function, Chinese remainder theorem, finite fields)
- Knowledge Broadening
Students know the most important cryptological procedures including their areas of application. Students know standardized procedures, approaches and legal requirements for implementing data security from an organizational, procedural and technical perspective.
- Knowledge deepening
Students know how the most important cryptological procedures work, including the necessary mathematical principles. They will be able to assess the security and possible applications of the methods.
- Knowledge Understanding
Students know the functions and limitations of cryptographic procedures as well as the functions of technical procedures for error detection and correction.
- Application and Transfer
Students are able to select suitable cryptographic methods to ensure confidentiality, data integrity, authenticity and reliability in application scenarios or processes.
- Literature
Die Literaturangaben beziehen sich auf die neueste Auflage, sofern nicht explizit ein
Erscheinungsjahr angegeben ist.J. Buchmann, "Einführung in die Kryptographie", Springer
W. Stallings, "Cryptography and network security", Pearson
Meyers, S. Harris, "CISSP", mitp-Verlag
D. Bernstein, J. Buchmann, E. Dahmen, "Post-Quantum Cryptography", Springer
C. Paar, J. Pelzl, "Kryptographie verst?ndlich", Springer Vieweg
Brenner, Gentschen Felde, Hommel, Metzger, Reiser, Schaaf, "Praxisbuch ISO/IEC 27001", Hanser
- Applicability in study programs
- Computer Science
- Computer Science M.Sc. (01.09.2025)
- Person responsible for the module
- Scheerhorn, Alfred
- Teachers
- Scheerhorn, Alfred
- T?njes, Ralf
- Timmer, Gerald
- Roer, Peter