Duration: 
  1 Semester |  Turnus of offer: 
  normally each year in the summer semester |  Credit points: 
  6 |  
    Course of studies, specific field and terms: - Master Robotics and Autonomous Systems 2019 (optional subject), Additionally recognized elective module, Arbitrary semester
 - Master Entrepreneurship in Digital Technologies 2020 (advanced module), specific, Arbitrary semester
 - Master Media Informatics 2020 (optional subject), computer science, Arbitrary semester
 - Master Medical Informatics 2019 (optional subject), ehealth / infomatics, 1st or 2nd semester
 - Master IT-Security 2019 (optional subject), IT Security and Privacy, 1st, 2nd, or 3rd semester
  
  |  
      Classes and lectures:   - Computer Security (practical course, 3 SWS)
 - Computer Security (lecture, 2 SWS)
     |   Workload:   - 20 Hours exam preparation
 - 85 Hours private studies
 - 75 Hours in-classroom work
     |       |  
      Contents of teaching:   |       - Applied cryptography in systems and protocols: Overview of common methods and their applications
 - Efficient and secure implementation of common crypto procedures: multiple-precision arithmetic, efficient exponentiation, constant time algorithms etc.
 - Physical implementation attacks and countermeasures: Error injection attacks, passive physical attacks such as SPA/DPA and timing attacks, modern inference methods and associated cryptanalysis methods, classes of protective measures
 - Virtualization security and microarchitecture attacks: security concepts in the operating system and hypervisor, microarchitecture attacks such as cache attacks, spectre, etc., measures to restore system security
 - Trusted computing and hardware-assisted system security: How TPMs, Secure Elements and Trusted Execution work environments, basics and cryptographic techniques, design basics for secure systems
     |       |  
   Qualification-goals/Competencies:   - The students can demonstrate a deep understanding of cryptographic methods and their applications in communication systems.
 - They can construct secure and efficient cryptographic primitives and implement them securely in computer systems.
 - They can explain methods and algorithms for efficient multiple-precision arithmetic.
 - They can perform basic side-channel attacks on systems with physical access or shared systems with code execution rights.
 - They can implement protection against specific physical attacks for cryptographic primitives.
 - They can evaluate the security of existing primitives.
     |  
   Grading through:   - Viva Voce or test
 - written homework
     |  
   Requires:    |  
    Responsible for this module:    Teachers:     |  
  Literature:  - S. Mangard, E. Oswald & T. Popp: Power analysis attacks: Revealing the secrets of smart cards - Vol. 31, Springer Science & Business Media, 2008
 - D. Stinson: Cryptography: Theory and Practice - 4th ed., CRC Press, 2018
 - : Recent literature
     |  
    Language: - English, except in case of only German-speaking participants
  
  |  
    Notes:Admission requirements for taking the module:  - None (the competencies under   |  
   Letzte Änderung: 6.1.2025  |  
 
 
	
für die Ukraine