Applied Cryptography

2026/2027

Content, progress and pedagogy of the module

Learning objectives

Knowledge

The student will acquire knowledge of:

  • Effectively securing information by understanding diverse algorithms for both encryption and decryption.
  • Applications of data security in real-life scenarios, such as Messaging Apps, Voice over IP, IoT devices, Wireless communication, Financial Transactions, or Cloud data security.
  • Comprehensive insights into cryptographic protocols, including their functions, limitations, and the challenges involved in their design.
  • Principles behind symmetric-key algorithms (e.g., DES, AES) and asymmetric-key algorithms (e.g., RSA, Elliptic Curve Cryptography, Diffie-Hellman Key Exchange).
  • Hash functions and its application in digital signatures, ensuring the credibility and integrity of messages.

The student must also be able to relate critically and reflexively in relation to these theoretical subjects.

Skills

The student must be able to use theories, methods, and models from the above-mentioned areas to identify, analyze, assess, and come up with proposals for solving concrete problems in practice. The student must be able to argue for the relevance of the chosen theories, methods, and models as well as for the proposed solution. In addition, the student must be able to reflect on the significance of the context in which the solution is part of. Concretely, it is expected that after completion of the course, the student will be able to:

  • Understand the security architecture of system, thereby gaining more visibility to secure the system.
  • Select and implement advanced technologies and security applications to integrate encryption and authentication, thereby enhancing the information security with an additional layer of protection.

Competences

The student will have competences in:

  • Implementing basic security properties for IT-systems based on the current best practices.
  • Being able to make a qualified assessment of which protocols and applications are appropriate in relation to a given information security problem.

Type of instruction

Teaching is based on a combination of lectures, active learning, problem solving and cases. There is an alternation between self-study, physical seminars/workshops lasting 1-2 days.

Exam

Exams

Name of examApplied Cryptography
Type of exam
Oral exam
ECTS5
Permitted aids
All written and all electronic aids
AssessmentPassed/Not Passed
Type of gradingInternal examination
Criteria of assessmentThe criteria of assessment are stated in the Examination Policies and Procedures

Facts about the module

Danish titleAnvendt kryptografi
Module codeESNITV1212
Module typeCourse
Duration1 semester
ECTS5
Language of instructionEnglish
Empty-place SchemeYes
Location of the lectureCampus Aalborg
Responsible for the module

Organisation

Education ownerMaster of Information Technology, Software Development
Study BoardStudy Board of Electronics and IT
DepartmentDepartment of Electronic Systems
FacultyThe Technical Faculty of IT and Design