course: Introduction to Cryptography 2

teaching methods:
lecture with tutorials
Moodle, black board and chalk
responsible person:
Prof. Dr.-Ing. Chris­tof Paar
Prof. Dr.-Ing. Chris­tof Paar (ETIT), M. Sc. Maik Ender (ETIT), B. Sc. Julian Speith (ETIT), B. Sc. Pascal Zimmer (ETIT)
offered in:
summer term

dates in summer term

  • start: Wednesday the 22.04.2020
  • lecture Wednesdays: from 08:15 to 09.45 o'clock
  • tutorial Mondays: Monday the 27.04.2020 from 14:15 to 15.00 o'clock
  • tutorial (alternativ) Wednesdays: Wednesday the 22.04.2020 from 12:15 to 13.00 o'clock
  • tutorial (alternativ) Wednesdays: Wednesday the 22.04.2020 from 14:15 to 15.00 o'clock


All statements pertaining to examination modalities (for the summer/winter term of 2020) are given with reservations. Changes due to new requirements from the university will be announced as soon as possible.
Form of exam:written
Registration for exam:FlexNow
Rooms : HZO 10,  HIB ,  HIC ,  HID ,  HGD 20 ,  HGD 30 ,  HZO 90
Individual appointments of students to each exam location will be issued by the responsible chair.


After successful completion of the course, students will have knowledge of the basic applications of asymmetric and hybrid methods. They are able to decide under which conditions certain methods are used in practice and how the security parameters should be selected. They are familiar with the basics of abstract thinking in IT security engineering. On the other hand, the students achieve an algorithmic and technical understanding for practical application by describing selected algorithms of practical relevance, such as the Diffie-Hellmann key exchange or ECC-based schemes. The students get an overview of the solutions used in companies. They will be able to defend a certain solution with arguments. The lectures are also offered as videos in German and English. The bilingual eLearning offer therefore enables students to acquire language skills in the English language.


The course offers a general introduction to the functionality of modern cryptography and data security. Basic terms and mathematical/technical methods of cryptography and data security are explained. Relevant asymmetric methods and algorithms are introduced and explained with practical examples. The lecture can be divided into two parts: The first part starts with an introduction to asymmetric methods and their most important substitutes (Diffie-Hellman, elliptic curves). The focus is on the algorithmic introduction of asymmetric procedures, which include both encryption algorithms and digital signatures. This part is completed by hash functions, which play an important role for digital signatures and Message Authentication Codes (MACs or cryptographic checksums). The second part of the lecture discusses the basics of security solutions based on the concepts of symmetric and asymmetric cryptography. Especially the solutions used in companies (PKI, digital certificates etc.) will be discussed.



recommended knowledge

Contents of the lecture "Introduction to Cryptography I"


  1. Paar, Christof, Pelzl, Jan "Kryptografie verständlich: Ein Lehrbuch für Studierende und Anwender", Springer, 2016
  2. Paar, Christof, Pelzl, Jan "Understanding Cryptography: A Textbook for Students and Practitioners", Springer, 2009


In the summer semester 2020, the course will be offered exclusively in digital form and there will be no classroom teaching. The stated lecture and exercise times remain the same, but will be offered digitally. All necessary information and materials will be made available through the Moodle course [1]. The Moodle course from "Introduction to Cryptography 1" will continue to be used, so participants of this course do not need to re-register. If you are not yet enrolled in the course, you will receive the corresponding password by email. Please send an informal e-mail including your matriculation number using your RUB e-mail address to E-mails from other sender addresses can unfortunately not be considered.


Video recordings at