- Cryptographic basics
- Securing network protocols
- Security analysis
Design of Secure Distributed Systems (Project) (M, 8.0 LP)
|Module Number||Module Name||CP (Effort)|
|INF-42-82-M-7||Design of Secure Distributed Systems (Project)||8.0 CP (240 h)|
|CP, Effort||8.0 CP = 240 h|
|Position of the semester||1 Sem. irreg.|
|Level|| Master (Advanced)|
|Area of study||[INF-VVS] Distributed and Networked Systems|
|Reference course of study||[INF-88.79-SG] M.Sc. Computer Science|
|Type/SWS||Course Number||Title||Choice in |
|SL||SL is |
required for exa.
Design of Secure Distributed Systems (Project)
|P||56 h||184 h||
Evaluation of grades
The module is not graded (only study achievements)..
Competencies / intended learning achievements
The students are able to design new or existing protocols. They have practiced cryptographic and other protection mechanisms.
Upon successful completion of the module, students will be able to
- determine basic and extended requirements for a system solution in discussions with users,
- independently define additional requirements for a system solution according to heuristic criteria
- divide agreed and self-chosen tasks into subtasks and to work on them together in a cooperative manner,
- estimate and plan the project effort in detail and to use resources in a goal-oriented way,
- document, manage and present work results comprehensively and accurately
- present a specialist lecture using suitable media to a heterogeneous specialist audience,
- lead and moderate a well-founded discussion on the chosen topic based on a technical lecture,
- assess their own scope for action and decision-making and the associated responsibility and, if necessary, obtain targeted information, define priorities, derive tasks, develop solutions and monitor progress
- recognize misunderstandings and role conflicts in communication situations at an early stage and to contribute to conflict resolution,
- argue goal-oriented in controversial discussions and to deal with criticism objectively,
- participate constructively and actively in heterogeneous working groups,
- represent independent points of view and, if necessary, points of view that differ from others in a very comprehensible way and to argue plausibly and convincingly.
- lead, instruct and motivate a working group frequently
- lead heterogeneously composed groups responsibly and to represent work results to third parties.
- develop their own professional, methodological, technological, interdisciplinary, social and personal skills independently.
Menezes, Orschoot, van der Merwe: Handbook of Applied Cryptography
Requirements for attendance of the module (informal)None
- Notice: Some Courses have informal requirements for attendance:
Requirements for attendance of the module (formal)None
References to Module / Module Number [INF-42-82-M-7]
|Course of Study||Section||Choice/Obligation|
|[INF-88.79-SG] M.Sc. Computer Science||[Specialisation] Specialization 1||[WP] Compulsory Elective|