FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler Head of Degree Program IT-Security Head of Competence Center for IT-Security matthias.hudler@fh-campuswien.ac.at T: +43 1 606 68 77-2461 F: +43 1 606 68 77-2469 Room: B.3.18 Favoritenstraße 226 1100 WienLectures 2022/23Engineering> Introduction to Cryptography VO IT-Security moreIntroduction to Cryptography VOLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Prof. Dr. Peter Lory2SWS3ECTSLecture contentsIn this lecture basic principles of cryptography such as symmetric and asymmetric encryption as well as data security will be discussed. The main topics are for example the process of encryption and decryption of data, digital signatures, general cryptographic protocols and the practical field of operation of these mechanisms. Current approaches like elliptic curves are also dealt with. In addition to the related key management aspects like the comprehensive security infrastructure will be addressed. Tangible examples of use are shown for illustration and for getting familiar with the functionality.Assessment methodsFinal written examTeaching methodsPresentation with slides and video projector, additional explanations on the whiteboardLanguageGerman> Introduction to Cryptography Übung UE IT-Security moreIntroduction to Cryptography Übung UELector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.1SWS2ECTSLecture contentsIn this lecture basic principles of cryptography such as symmetric and asymmetric encryption as well as data security will be discussed. The main topics are for example the process of encryption and decryption of data, digital signatures, general cryptographic protocols and the practical field of operation of these mechanisms. Current approaches like elliptic curves are also dealt with. In addition to the related key management aspects like the comprehensive security infrastructure will be addressed. Tangible examples of use are shown for illustration and for getting familiar with the functionality. In the tutorial the students have the possibility to practise the formerly presented approaches, getting more familiar with them. Approaches of possible cryptanalysis will also be discussed.Assessment methodscontinous examinationTeaching methodsPresentation, discussion and solving problemsLanguageGerman> Selected Topics in IT-Security ILV Computer Science and Digital Communications moreSelected Topics in IT-Security ILVLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, Silvia Schmidt, BSc MSc3SWS6ECTSLecture contentsThis lecture consists of 2 parts 1. Seminar regarding the following topics: Web Security Exploits Overflows Awareness Bot Nets Applied Security Penetration Testing Tool 2. Theoretical Computer Science Finite state machines Complexity Theory Regular Expressions Chomsky HierarchyAssessment methodsFinal exam Term paper, presentation, final examTeaching methodsLectures, inverted classroom, remote/distance learningLanguageGerman> Selected Topics in IT-Security ILV Computer Science and Digital Communications moreSelected Topics in IT-Security ILVLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, Silvia Schmidt, BSc MSc3SWS6ECTSLecture contentsThis lecture consists of 2 parts 1. Seminar regarding the following topics: Web Security Exploits Overflows Awareness Bot Nets Applied Security Penetration Testing Tool 2. Theoretical Computer Science Finite state machines Complexity Theory Regular Expressions Chomsky HierarchyAssessment methodsFinal exam Term paper, presentation, final examTeaching methodsLectures, inverted classroom, remote/distance learningLanguageGermanPublications The publications of Matthias Peter Hudler written at FH Campus Wien can be found in our publication database, others in the personal web space.
> Introduction to Cryptography VO IT-Security moreIntroduction to Cryptography VOLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Prof. Dr. Peter Lory2SWS3ECTSLecture contentsIn this lecture basic principles of cryptography such as symmetric and asymmetric encryption as well as data security will be discussed. The main topics are for example the process of encryption and decryption of data, digital signatures, general cryptographic protocols and the practical field of operation of these mechanisms. Current approaches like elliptic curves are also dealt with. In addition to the related key management aspects like the comprehensive security infrastructure will be addressed. Tangible examples of use are shown for illustration and for getting familiar with the functionality.Assessment methodsFinal written examTeaching methodsPresentation with slides and video projector, additional explanations on the whiteboardLanguageGerman
> Introduction to Cryptography Übung UE IT-Security moreIntroduction to Cryptography Übung UELector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.1SWS2ECTSLecture contentsIn this lecture basic principles of cryptography such as symmetric and asymmetric encryption as well as data security will be discussed. The main topics are for example the process of encryption and decryption of data, digital signatures, general cryptographic protocols and the practical field of operation of these mechanisms. Current approaches like elliptic curves are also dealt with. In addition to the related key management aspects like the comprehensive security infrastructure will be addressed. Tangible examples of use are shown for illustration and for getting familiar with the functionality. In the tutorial the students have the possibility to practise the formerly presented approaches, getting more familiar with them. Approaches of possible cryptanalysis will also be discussed.Assessment methodscontinous examinationTeaching methodsPresentation, discussion and solving problemsLanguageGerman
> Selected Topics in IT-Security ILV Computer Science and Digital Communications moreSelected Topics in IT-Security ILVLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, Silvia Schmidt, BSc MSc3SWS6ECTSLecture contentsThis lecture consists of 2 parts 1. Seminar regarding the following topics: Web Security Exploits Overflows Awareness Bot Nets Applied Security Penetration Testing Tool 2. Theoretical Computer Science Finite state machines Complexity Theory Regular Expressions Chomsky HierarchyAssessment methodsFinal exam Term paper, presentation, final examTeaching methodsLectures, inverted classroom, remote/distance learningLanguageGerman
> Selected Topics in IT-Security ILV Computer Science and Digital Communications moreSelected Topics in IT-Security ILVLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, Silvia Schmidt, BSc MSc3SWS6ECTSLecture contentsThis lecture consists of 2 parts 1. Seminar regarding the following topics: Web Security Exploits Overflows Awareness Bot Nets Applied Security Penetration Testing Tool 2. Theoretical Computer Science Finite state machines Complexity Theory Regular Expressions Chomsky HierarchyAssessment methodsFinal exam Term paper, presentation, final examTeaching methodsLectures, inverted classroom, remote/distance learningLanguageGerman