FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler Head of Degree Program IT-Security Head of Competence Center for IT-Security matthias.hudler@fh-campuswien.ac.at T: +43 1 606 68 77-2461 F: +43 1 606 68 77-2469 Room: B.3.18 Favoritenstraße 226 1100 WienLectures 2020/21Engineering> Introduction to Cryptography VO IT-Security moreIntroduction to Cryptography VOLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, Dipl.-Ing. Manuel Koschuch, Bakk.techn., Prof. Dr. Peter Lory2SWS3ECTSLecture contentsIn this lecture basic principles of cryptography such as symmetric and asymmetric encryption as well as data security will be discussed. The main topics are for example the process of encryption and decryption of data, digital signatures, general cryptographic protocols and the practical field of operation of these mechanisms. Current approaches like elliptic curves are also dealt with. In addition to the related key management aspects like the comprehensive security infrastructure will be addressed. Tangible examples of use are shown for illustration and for getting familiar with the functionality.Assessment methodsFinal written examTeaching methodsPresentation with slides and video projector, additional explanations on the whiteboardLanguageGerman> Introduction to Cryptography Übung UE IT-Security moreIntroduction to Cryptography Übung UELector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, Dipl.-Ing. Manuel Koschuch, Bakk.techn.1SWS2ECTSLecture contentsIn this lecture basic principles of cryptography such as symmetric and asymmetric encryption as well as data security will be discussed. The main topics are for example the process of encryption and decryption of data, digital signatures, general cryptographic protocols and the practical field of operation of these mechanisms. Current approaches like elliptic curves are also dealt with. In addition to the related key management aspects like the comprehensive security infrastructure will be addressed. Tangible examples of use are shown for illustration and for getting familiar with the functionality. In the tutorial the students have the possibility to practise the formerly presented approaches, getting more familiar with them. Approaches of possible cryptanalysis will also be discussed.Assessment methodscontinous examinationTeaching methodsPresentation, discussion and solving problemsLanguageGerman> Applied Cryptography ILV IT-Security moreApplied Cryptography ILVLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, Dipl.-Ing. Manuel Koschuch, Bakk.techn.2SWS3ECTSLecture contentsThis course covers the differences between the „textbook” and the “real-world” implementations of cryptographic algorithms. Symmetric techniques like DES and especially AES with its most important variations are dealt with in detail, as well as padding techniques and selected parts from the PKCS. These topics are supplemented with a basic introduction to the efficient implementation of long integer arithmetic.Assessment methodsWritten elaboration of selected lecture contents Presentation Written examinationTeaching methodsPresentation with slides and video projectorLanguageGerman> Cryptographic Protocols ILV IT-Security moreCryptographic Protocols ILVLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, Dipl.-Ing. Manuel Koschuch, Bakk.techn.2SWS3ECTSLecture contentsThis lecture gives an overview of many different cryptographic protocols, possible usage scenarios and their peculiarities. The students implement selected protocols from a given domain, compare them to each other and present the results. The main topics are - Public-Key Schemes - Key-Agreement/Key-Establishment - Challenge Response Schemes/Authentication - Signature SchemesAssessment methodsEvery presentation is a partial examination, there is no written final examTeaching methodsImplementations and presentations by the studentsLanguageGerman> Master Thesis MT IT-Security moreMaster Thesis MTLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler0SWS20ECTSLecture contentsAutonomous authoring of a special, science-based theme under guidance by a supervisor, elaboration of the master's thesisAssessment methodsApprobation of the master's thesisTeaching methodsDiploma thesis: Autonomous scientific work under guidance by a supervisorLanguageGerman-English> Master Thesis Seminar SE IT-Security moreMaster Thesis Seminar SELector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler2SWS2ECTSLecture contentsThe students present the current state of their Master's Thesis at regular intervals and discuss their work with the audience.Assessment methodsContinous examinationTeaching methodsPresentations by the studentsLanguageGerman-English> Master Thesis Seminar SE Electronic Systems Engineering moreMaster Thesis Seminar SELector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler2SWS2ECTSLecture contentsThe students present the current state of their Master's Thesis at regular intervals and discuss their work with the audience.Assessment methodsContinous examinationTeaching methodsPresentations by the students> IT Security ILV Technical Management moreIT Security ILVLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, Dipl.-Ing. Manuel Koschuch, Bakk.techn., DI(FH) Roland Supper3SWS5ECTSLecture contentsThe course provides a general overview over the broad field of IT-Security, with a focus on practical relevance and current technologies. Topics are, among others, cryptographic foundations, firewall technologies, authentication methods, certificates, and cloud security.Assessment methodsFinal exam Final ExamTeaching methodsClassroom lecture and lab exercisesLanguageGerman> Selected Topics in IT-Security ILV Computer Science and Digital Communications moreSelected Topics in IT-Security ILVLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, Silvia Schmidt, BSc MSc3SWS6ECTSLecture contents(ONLY IN GERMAN - 01.03.2018) Die Lehrveranstaltung gibt einen Überblick über die zum Verständnis tiefergehender kryptographischer Thematiken notwendigen Konzepte der diskreten Mathematik und Komplexitätstheorie. Anschließend werden aktuellen Themen der IT-Security interaktiv mit Lehrendenunterstützung durch die Studierenden selbst erarbeitet und im Plenum präsentiert und diskutiert. - Grundlagen diskrete Mathematik (Gruppen, Körper, DLP) - Komplexitätstheorie - Endliche Automaten, Reguläre Sprachen - Chomsky-Hierarchie und ihre praktischen Entsprechungen - Aktuelle Themen der IT-SecurityAssessment methodsFinal examTeaching methods(ONLY IN GERMAN - 01.03.2018) praktische Übungen, VortragLanguageGerman> Selected Topics in IT-Security ILV Computer Science and Digital Communications moreSelected Topics in IT-Security ILVLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, Silvia Schmidt, BSc MSc3SWS6ECTSLecture contents(ONLY IN GERMAN - 01.03.2018) Die Lehrveranstaltung gibt einen Überblick über die zum Verständnis tiefergehender kryptographischer Thematiken notwendigen Konzepte der diskreten Mathematik und Komplexitätstheorie. Anschließend werden aktuellen Themen der IT-Security interaktiv mit Lehrendenunterstützung durch die Studierenden selbst erarbeitet und im Plenum präsentiert und diskutiert. - Grundlagen diskrete Mathematik (Gruppen, Körper, DLP) - Komplexitätstheorie - Endliche Automaten, Reguläre Sprachen - Chomsky-Hierarchie und ihre praktischen Entsprechungen - Aktuelle Themen der IT-SecurityAssessment methodsFinal examTeaching methods(ONLY IN GERMAN - 01.03.2018) praktische Übungen, VortragLanguageGermanPublications The publications of Matthias Peter Hudler written at FH Campus Wien can be found in our publication database, others in the personal web space.
> Introduction to Cryptography VO IT-Security moreIntroduction to Cryptography VOLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, Dipl.-Ing. Manuel Koschuch, Bakk.techn., Prof. Dr. Peter Lory2SWS3ECTSLecture contentsIn this lecture basic principles of cryptography such as symmetric and asymmetric encryption as well as data security will be discussed. The main topics are for example the process of encryption and decryption of data, digital signatures, general cryptographic protocols and the practical field of operation of these mechanisms. Current approaches like elliptic curves are also dealt with. In addition to the related key management aspects like the comprehensive security infrastructure will be addressed. Tangible examples of use are shown for illustration and for getting familiar with the functionality.Assessment methodsFinal written examTeaching methodsPresentation with slides and video projector, additional explanations on the whiteboardLanguageGerman
> Introduction to Cryptography Übung UE IT-Security moreIntroduction to Cryptography Übung UELector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, Dipl.-Ing. Manuel Koschuch, Bakk.techn.1SWS2ECTSLecture contentsIn this lecture basic principles of cryptography such as symmetric and asymmetric encryption as well as data security will be discussed. The main topics are for example the process of encryption and decryption of data, digital signatures, general cryptographic protocols and the practical field of operation of these mechanisms. Current approaches like elliptic curves are also dealt with. In addition to the related key management aspects like the comprehensive security infrastructure will be addressed. Tangible examples of use are shown for illustration and for getting familiar with the functionality. In the tutorial the students have the possibility to practise the formerly presented approaches, getting more familiar with them. Approaches of possible cryptanalysis will also be discussed.Assessment methodscontinous examinationTeaching methodsPresentation, discussion and solving problemsLanguageGerman
> Applied Cryptography ILV IT-Security moreApplied Cryptography ILVLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, Dipl.-Ing. Manuel Koschuch, Bakk.techn.2SWS3ECTSLecture contentsThis course covers the differences between the „textbook” and the “real-world” implementations of cryptographic algorithms. Symmetric techniques like DES and especially AES with its most important variations are dealt with in detail, as well as padding techniques and selected parts from the PKCS. These topics are supplemented with a basic introduction to the efficient implementation of long integer arithmetic.Assessment methodsWritten elaboration of selected lecture contents Presentation Written examinationTeaching methodsPresentation with slides and video projectorLanguageGerman
> Cryptographic Protocols ILV IT-Security moreCryptographic Protocols ILVLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, Dipl.-Ing. Manuel Koschuch, Bakk.techn.2SWS3ECTSLecture contentsThis lecture gives an overview of many different cryptographic protocols, possible usage scenarios and their peculiarities. The students implement selected protocols from a given domain, compare them to each other and present the results. The main topics are - Public-Key Schemes - Key-Agreement/Key-Establishment - Challenge Response Schemes/Authentication - Signature SchemesAssessment methodsEvery presentation is a partial examination, there is no written final examTeaching methodsImplementations and presentations by the studentsLanguageGerman
> Master Thesis MT IT-Security moreMaster Thesis MTLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler0SWS20ECTSLecture contentsAutonomous authoring of a special, science-based theme under guidance by a supervisor, elaboration of the master's thesisAssessment methodsApprobation of the master's thesisTeaching methodsDiploma thesis: Autonomous scientific work under guidance by a supervisorLanguageGerman-English
> Master Thesis Seminar SE IT-Security moreMaster Thesis Seminar SELector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler2SWS2ECTSLecture contentsThe students present the current state of their Master's Thesis at regular intervals and discuss their work with the audience.Assessment methodsContinous examinationTeaching methodsPresentations by the studentsLanguageGerman-English
> Master Thesis Seminar SE Electronic Systems Engineering moreMaster Thesis Seminar SELector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler2SWS2ECTSLecture contentsThe students present the current state of their Master's Thesis at regular intervals and discuss their work with the audience.Assessment methodsContinous examinationTeaching methodsPresentations by the students
> IT Security ILV Technical Management moreIT Security ILVLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, Dipl.-Ing. Manuel Koschuch, Bakk.techn., DI(FH) Roland Supper3SWS5ECTSLecture contentsThe course provides a general overview over the broad field of IT-Security, with a focus on practical relevance and current technologies. Topics are, among others, cryptographic foundations, firewall technologies, authentication methods, certificates, and cloud security.Assessment methodsFinal exam Final ExamTeaching methodsClassroom lecture and lab exercisesLanguageGerman
> Selected Topics in IT-Security ILV Computer Science and Digital Communications moreSelected Topics in IT-Security ILVLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, Silvia Schmidt, BSc MSc3SWS6ECTSLecture contents(ONLY IN GERMAN - 01.03.2018) Die Lehrveranstaltung gibt einen Überblick über die zum Verständnis tiefergehender kryptographischer Thematiken notwendigen Konzepte der diskreten Mathematik und Komplexitätstheorie. Anschließend werden aktuellen Themen der IT-Security interaktiv mit Lehrendenunterstützung durch die Studierenden selbst erarbeitet und im Plenum präsentiert und diskutiert. - Grundlagen diskrete Mathematik (Gruppen, Körper, DLP) - Komplexitätstheorie - Endliche Automaten, Reguläre Sprachen - Chomsky-Hierarchie und ihre praktischen Entsprechungen - Aktuelle Themen der IT-SecurityAssessment methodsFinal examTeaching methods(ONLY IN GERMAN - 01.03.2018) praktische Übungen, VortragLanguageGerman
> Selected Topics in IT-Security ILV Computer Science and Digital Communications moreSelected Topics in IT-Security ILVLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, Silvia Schmidt, BSc MSc3SWS6ECTSLecture contents(ONLY IN GERMAN - 01.03.2018) Die Lehrveranstaltung gibt einen Überblick über die zum Verständnis tiefergehender kryptographischer Thematiken notwendigen Konzepte der diskreten Mathematik und Komplexitätstheorie. Anschließend werden aktuellen Themen der IT-Security interaktiv mit Lehrendenunterstützung durch die Studierenden selbst erarbeitet und im Plenum präsentiert und diskutiert. - Grundlagen diskrete Mathematik (Gruppen, Körper, DLP) - Komplexitätstheorie - Endliche Automaten, Reguläre Sprachen - Chomsky-Hierarchie und ihre praktischen Entsprechungen - Aktuelle Themen der IT-SecurityAssessment methodsFinal examTeaching methods(ONLY IN GERMAN - 01.03.2018) praktische Übungen, VortragLanguageGerman