Enterprise and IT Security

Der fortgeschrittene Master-Studiengang Enterprise and IT Security (ENITS) öffnet Türen und hilft auf dem Weg zur Führungsposition im Bereich IT-Sicherheit.



Applied Cryptanalysis

  • Module Algorithms and Data Structures (Algorithmen und Datenstrukturen) or similar
  • Module Mathematics and Cryptography (Mathematik und Kryptografie) or similar: basic knowledge in symmetric and asymmetric cryptography and related basic principles of number theory
Teaching methods Lecture/Lab
Learning target / Competences

After successful participation in the course students shall be able to:

  • understand methods of applied cryptanalysis
  • apply them to concrete cryptographic systems
  • create implementations on their own or use third-party tools
Duration 1
SWS 4.0
Classes 60
Individual / Group work: 120
Workload 180
ECTS 6.0
Credits and grades

written exam,  90 min. (K90, Applied Cryptanalysis) and report (BE, Lab Applied Cryptanalysis)

Responsible person

Prof. Dr. Erik Zenner

Recommended semester 1
Frequency Every 2nd sem.

For penetration testers, the cracking of concrete cryptographic methods can become important. When creating secure IT security systems, therefore, it is important to know these techniques to select cryptographic methods that offer security against them.


Applied Cryptanalysis

Type Vorlesung
Nr. M+I801
SWS 3.0

Specific methods of modern cryptanalysis, e.g.

  • differential cryptanalysis and its variants
  • time-memory tradeoffs
  • number-theoretical analysis methods
  • practical attacks of the recent past (e.g. against TLS, random number generators etc.)

The lecture mainly deals with scientific papers that are provided for download at the beginning of the lecture.

Labor Applied Cryptanalysis

Type Labor
Nr. M+I802
SWS 1.0

See M+I801 Applied Cryptanalysis