Accessibility

Theses

We are very pleased with your interest in writing your Bachelor or Master Thesis with us. We cover research fields in the theoretical and practical area as well as any combination within these. For every thesis there are similar approaches, organisational regulations and frameworks which we would like to explain in the following.

  • Topic Finding

    First, you need to think about which topics you are most capable of or in which you have the greatest interest in. Out of these areas you choose at least two subjects which are qualified for a thesis. You can find possible topics below as well as by contacting one of our research staff members in person or via mail. Alternatively, you are also welcome to come up with your own ideas.

    Please send us an email with your topics of choice and justify your interest by pointing out your qualifications. Afterwards we will propose a date to agree on a final topic in a personal meeting. The best-case scenario is for you to be able to write about your favourite topic and for us to involve your findings in our research work or teaching.

    Selection of Possible Topics for your Thesis

    Implementations for CrypTool 2

    CrypTool2 is an open-source program that allows you to try out various cryptographic methods. CrypTool 2 provides a visual programming interface which easily can be used to integrate and manipulate cryptographic functions into workflows. More specifically, the individual cryptographic methods are implemented by so-called plug-ins, which are represented by individual graphical objects. These can be combined with drag & drop on the graphical user interface. This approach makes it easy to visualise complex processes and thus to understand them better.

    Goal:
    Several existing cryptographic methods are to be implemented so that they can be officially recorded in CrypTool 2. This also includes the creation of documentation, the clean structuring and commenting of the source code, etc. The exact selection of the topics to be implemented is discussed with the student and the CrypTool 2 team.

     

    Privacy-Preserving Recommender System

    Recommender systems provide user recommendations on which objects (e.g. books, films, places) might be of interest to them. Naturally, this requires information about the user himself, which entails the risk of data misuse (e.g. transferring the interests of the customer to third parties for advertising purposes). Together with the Technical University of Darmstadt, a cryptographic method was developed, with which a user can still receive a recommendation, but without having to disclose information about himself. This is achieved by sending only encrypted data about the use to the recommender system. For this purpose, a new encryption method is used, which allows the recommender system to calculate the recommendation for the user directly on the encrypted data. The result is the encrypted recommendation which can be decrypted by the user while the recommender system has not learned anything about the data.

    Goal:
    The method has to be reviewed, displayed and implemented. Especially the safety analysis, which has hitherto only been carried out under idealistic assumptions, has to be considered when reviewing the method.

     

    Smart Contracts

    Smart contract is a term used to describe computer program code that is capable of facilitating, executing, and enforcing the negotiation or performance of an agreement (i.e. contract) using blockchain technology. The entire process is automated can act as a complement, or substitute, for legal contracts, where the terms of the smart contract are recorded in a computer language as a set of instructions.

    Goal:

    This thesis will comprise two parts. In the first part, smart contracts are explained, providing all necessary background for a reader to understand the technical working principle. In the second part, practical use cases for smart contracts are investigated. 

     

    Plugin Development Using CrypTool 2: Attacking Key Schedule of the ciphers.

    In this project  it will not be needed to start from the beginning, but to complete the 2 existing projects:

    1. Exploiting (Searching for) Weak-Key IV Pairs in Stream Ciphers 
    2. Slide Attacks on Block Ciphers 

    These are 2 almost completed tasks from the last year TeamProject, where  the CrypTool 2 platform was used to demonstrate so-called slide attacks on the block ciphers, and how weak key-IV pairs can be used for attacking stream ciphers. 

    The person working on the project will need to

    • to read and revise the documentation
    • to understand the ideas of both attacks
    • to understand how the implemented plugins work
    • to improve the plugins which refer to slide attack on block ciphers
    • to improve the templates which demonstrate how to use the plugins
    • to write the online help for the plugins


    The plugins are developed using C# programming language. The development is done using Microsoft Visual Studio environment.

    Contact person: Vasily Mikhalev

     

    Analyzing $IotDevice

    This is a more or less generic topic open to anyone who wants to void some warranties of their $IotDevice to either simply see how things work under the hood or even trying to get $IotDevice to do things it was not designed for in the first place.

    If you already have $IotDevice, bring it, or maybe you have a favorite $IotDevice you would like to analyze. Either way, contact Christian Müller to discuss the details.

  • Registration and Content

    After we have agreed on a final topic, we will discuss the content wise details with you. This will be handled individually for each thesis and usually happens during the meeting of the topic selection. Finally, we agree on the rough content and we will send you a table of contents. This serves as a guide to the processing for you and helps us with the evaluation. Thus, both parties have a fair basis.

    If you agree with the subject and the content, we need some additional information from you to register your thesis. This includes, for example, the language of choice for your thesis. You can choose between English and German. Also, the deadline will be set with registration to confirm the date on which you must submit your work. The available period of work is dependent on the type of thesis and your examination regulations – as a rule, it is three months for Bachelor theses and six months for Master theses.
    The start of a thesis is independent of other organisational appointments such as exam or term times.

  • Writing and Formalities

    In general, we are much more interested in content than in form. In other words, you are free to write the text of your thesis with LaTeX, Word or any other program. However, we recommend the use of LaTeX.

    Font, font size, line spacing, margin and the like should be chosen appropriately. For the scope, we propose 30 pages for a Bachelor thesis and 60 pages for a Master thesis. However, this is only a rough guideline and, in most cases, unimportant. You should be able to write down the content in a precise but detailed way and use a scientific writing style. Depending on the topic, including screenshots, graphics and source code is beneficial. As a result, the guideline for the scope can change very quickly.

  • Supervision

    It is up to you how to allot your time for your thesis. However, we recommend that you regularly contact us, your supervisors. This ensures that you can get feedback and thus avoid deepening in the wrong place. Keep in mind that a positive feedback can help you. Discuss the type of care with your supervisor.

  • Submission and Presentation

    At the latest you must submit your final thesis on the last day of your working time. To do this, please hand in two versions in print form and a signed affidavit at our offices. In addition, you must send a PDF version of your final thesis to your supervisor. The printouts should be printed on both sides. The binding is up to you, but we prefer a ring binding.

    Depending on your examination regulations you must also hold a presentation on the topic of your thesis. As a rule, the presentation of Bachelor theses is voluntary and the one of Master theses is obligatory for students who started their studies in or after the fall semester of 2013. However, even if you do not have to hold a presentation, we recommend you to take advantage of this opportunity. You can learn how to present your material in front of a professional audience and, if necessary, to convey some of the topics more profoundly or interactively than in your record. Such a presentation should take about 30 minutes, followed by a colloquium.
    Please note that any voluntary presentation will not be graded.