In the course the main cryptographic algorithms are presented. Blockciphers (DES, AES), Modes of Operation (ECB, CBC, Countermode), Hash functions, MACs, public key algorithms (RSA, Diffie-Helman, ElGamal) are covered by the lectures.
Then we will look at and analyze applications in IT-security, which use cryptography: E/mail-security (eg. PGP, S-MIME), web-security (SSL), network-security (IP-Sec), authentication mechanisms.
Claudia Eckert: IT-Sicherheit. Konzepte - Verfahren - Protokolle, München, Oldenbourg Wissenschaftsverlag, 2013, 8. Auflage, ISBN 978-3-486-58270-3.
The course consist of lectures (around 2/3) and exercises (around 1/3). In the exercises the mathematical techniques introduced in the lecture will be trained.