course: Introduction to Cryptography 2

teaching methods:
lecture with tutorials
Videoübertragung, internet, Moodle
responsible person:
Prof. Dr.-Ing. Chris­tof Paar
Prof. Dr.-Ing. Chris­tof Paar (ETIT), M. Sc. Julian Speith (ETIT), M. Sc. Paul Staat (ETIT), M. Sc. Johannes Tobisch (ETIT)
offered in:
summer term

dates in summer term

  • start: Wednesday the 14.04.2021
  • lecture Wednesdays: from 16:15 to 17.45 o'clock
  • tutorial Fridays: from 12:15 to 13.45 o'clock
  • tutorial (alternativ) Thursdays: from 10:00 to 11.00 o'clock
  • tutorial (alternativ) Thursdays: from 14:00 to 15.00 o'clock


Form of exam:written
Registration for exam:FlexNow
Room : wird vom Lehr­stuhl be­kannt ge­ge­ben.


After successful completion of the course, students will have knowledge of the basic applications of asymmetric and hybrid methods. They are able to decide under which conditions certain methods are used in practice and how the security parameters should be selected. They are familiar with the basics of abstract thinking in IT security engineering. On the other hand, the students achieve an algorithmic and technical understanding for practical application by describing selected algorithms of practical relevance, such as the Diffie-Hellmann key exchange or ECC-based schemes. The students get an overview of the solutions used in companies. They will be able to defend a certain solution with arguments. The lectures are also offered as videos in German and English. The bilingual eLearning offer therefore enables students to acquire language skills in the English language.


The course offers a general introduction to the functionality of modern cryptography and data security. Basic terms and mathematical/technical methods of cryptography and data security are explained. Relevant asymmetric methods and algorithms are introduced and explained with practical examples. The lecture can be divided into two parts: The first part starts with an introduction to asymmetric methods and their most important substitutes (Diffie-Hellman, elliptic curves). The focus is on the algorithmic introduction of asymmetric procedures, which include both encryption algorithms and digital signatures. This part is completed by hash functions, which play an important role for digital signatures and Message Authentication Codes (MACs or cryptographic checksums). The second part of the lecture discusses the basics of security solutions based on the concepts of symmetric and asymmetric cryptography. Especially the solutions used in companies (PKI, digital certificates etc.) will be discussed.



recommended knowledge

Contents of the lecture "Introduction to Cryptography I"


  1. Paar, Christof, Pelzl, Jan "Kryptografie verständlich: Ein Lehrbuch für Studierende und Anwender", Springer, 2016
  2. Paar, Christof, Pelzl, Jan "Understanding Cryptography: A Textbook for Students and Practitioners", Springer, 2009


Im Sommersemester 2021 wird der Kurs wahrscheinlich aus­schließ­lich di­gi­tal an­ge­bo­ten. Alle be­nö­tig­ten In­for­ma­tio­nen und Ma­te­ria­li­en wer­den über den Moodle-Kurs zur Ver­fü­gung ge­stellt. Die Ein­schrei­bung in den Mood­le-Kurs soll­te aus­schließ­lich mit einer RUB-Mail­adres­se er­fol­gen (Aus­nah­me: UA Ruhr).