Hasso-Plattner-Institut25 Jahre HPI
Hasso-Plattner-Institut25 Jahre HPI

Cryptographic Protocols (Sommersemester 2024)

Lecturer: Prof. Dr. Anja Lehmann (Cyber Security - Identity Management) , Dennis Dayanikli (Cyber Security - Identity Management) , Cavit Özbay (Cyber Security - Identity Management)

General Information

  • Weekly Hours: 4
  • Credits: 6
  • Graded: yes
  • Enrolment Deadline: 01.04.2024-30.04.2024
  • Examination time §9 (4) BAMA-O: 03.06.2024
  • Teaching Form: Seminar
  • Enrolment Type: Compulsory Elective Module
  • Course Language: English
  • Maximum number of participants: 12

Programs, Module Groups & Modules

IT-Systems Engineering MA
Data Engineering MA
Digital Health MA
Cybersecurity MA
Software Systems Engineering MA
  • MODA: Models and Algorithms
    • HPI-MODA-C Concepts and Methods
  • MODA: Models and Algorithms
    • HPI-MODA-T Technologies and Tools
  • MODA: Models and Algorithms
    • HPI-MODA-S Specialization
  • OISY: Online and Interactive Systems
    • HPI-OISY-C Concepts and Methods
  • OISY: Online and Interactive Systems
    • HPI-OISY-T Technologies and Tools
  • OISY: Online and Interactive Systems
    • HPI-OISY-S Specialization


In this seminar, we will examine various real-world cryptographic protocols.

Our focus will be on the core functional and security properties addressed by the protocols, their cryptographic solutions, and potential attacks or limitations. The seminar will start with a lecture period (2-3 weeks) where the required cryptographic building blocks are briefly introduced. Students will work in small groups (2 students per topic) on the presentation of a concrete protocol assigned at the beginning of the seminar.

The task of the presentations is to describe the desired functional and security properties, the construction of the protocols (using the previously introduced generic building blocks for a unified treatment throughout the seminar), and how the security of the building blocks contributes to the security of the protocol, possibly accompanied with discussions of real-world attacks. Alongside their presentations, students will create summaries in the form of a handout, which their peers will review. At the end of the seminar, there will also be a quiz over the topics of all presentations. 

More information and a list of papers/protocols can be found in Moodle:



Previous knowledge of cryptography (e.g., attendance of the Introduction to Cryptography lecture) is helpful but not required, as we start with a lecture period to ensure a shared common understanding of the fundamental cryptographic primitives among all attendees.

The lecture period will recap/introduce the abstract definition of the most basic cryptographic building blocks, such as encryption schemes or hash functions, i.e., explain and capture their generic behavior and security properties. How these building blocks are realized is not part of the introduction but also not necessary for the seminar.


A list of protocols and papers is given in the Moodle. In the first session we will give a brief overview of the protocols. Over the following days, participants will rate their preferences on Moodle, and afterwards, get allocated into groups (of two) and assigned a protocol based on their ratings. Ratings will start right after the first session and last until 11.04. If interested in taking a protocol that is not listed, feel free to bring it forward to us by sending an email or coming to our office before the ratings end.


Attendance is compulsory for all participants. Please get in touch with us if you are unable to attend.

Grading: Presentation (40%), handout (30%), review (15%), participation & quiz over all topics (15%)


The seminar will be held Mondays, 11.00 - 12.30 in HE.51/52

The first session on 08.04.2024 will be held in room K-1.04.