We are pleased that you are interested in writing your thesis with us. We cover theoretical and practical fields as well as any combination thereof. Similar approaches, organizational regulations, and framework conditions apply to each thesis.

First of all, you should consider which subject areas you are most interested in or which suite you best. Then, you should select at least two topics that you would consider as a thesis topic. An irregularly updated and incomplete list of topics can be found below. Nonetheless, we can also discuss your own idea for a topic. Feel free to contact a chair member by e-mail anytime.

You should send us an e-mail with your preferred topics and shortly state your interest in these topics, which is further strengthened by highlighting your experience in the respective field. We would then discuss the potential topic with you, preferably during a (virtual) personal meeting, to make sure the topic is appropriate for the pursued degree and in line with our area of expertise.

  • Open Topics

    Analyzing The IoT Or IoT Devices

    This is a more or less generic topic open to anyone who wants to void some warranties of their Internet of Things (IoT) Device(s) to either simply see how things work under the hood or even trying to get IoT Device(s) to do things not designed for in the first place.

    If you already have an IoT Device, bring it, or maybe you have a favorite IoT Device you would like to analyze. Either way, contact Christian Müller to discuss the details.

    Implementations for CrypTool 2

    CrypTool 2 is an open-source program that allows you to try out various cryptographic methods. CrypTool 2 provides a visual programming interface which easily can be used to integrate and manipulate cryptographic functions into workflows. More specifically, the individual cryptographic methods are implemented by so-called plug-ins, which are represented by individual graphical objects. These can be combined with drag & drop on the graphical user interface. This approach makes it easy to visualise complex processes and thus to understand them better.

    Several existing cryptographic methods are to be implemented so that they can be officially recorded in CrypTool 2. This also includes the creation of documentation, the clean structuring and commenting of the source code, etc. The exact selection of the topics to be implemented is discussed with the student and the CrypTool 2 team.

    Privacy-Preserving Recommender System

    Recommender systems provide user recommendations on which objects (e.g. books, films, places) might be of interest to them. Naturally, this requires information about the user himself, which entails the risk of data misuse (e.g. transferring the interests of the customer to third parties for advertising purposes). Together with the Technical University of Darmstadt, a cryptographic method was developed, with which a user can still receive a recommendation, but without having to disclose information about himself. This is achieved by sending only encrypted data about the use to the recommender system. For this purpose, a new encryption method is used, which allows the recommender system to calculate the recommendation for the user directly on the encrypted data. The result is the encrypted recommendation which can be decrypted by the user while the recommender system has not learned anything about the data.

    The method has to be reviewed, displayed and implemented. Especially the safety analysis, which has hitherto only been carried out under idealistic assumptions, has to be considered when reviewing the method.

    Plugin Development Using CrypTool 2: Attacking Key Schedule of the ciphers

    In this project  it will not be needed to start from the beginning, but to complete the 2 existing projects:

    1. Exploiting (Searching for) Weak-Key IV Pairs in Stream Ciphers 
    2. Slide Attacks on Block Ciphers 

    These are 2 almost completed tasks from the last year TeamProject, where  the CrypTool 2 platform was used to demonstrate so-called slide attacks on the block ciphers, and how weak key-IV pairs can be used for attacking stream ciphers. 

    The person working on the project will need to to read and revise the documentation, to understand the ideas of both attacks, to understand how the implemented plugins work, to improve the plugins which refer to slide attack on block ciphers, to improve the templates which demonstrate how to use the plugins,  to write the online help for the plugins.

    The plugins are developed using C# programming language. The development is done using Microsoft Visual Studio environment.

    Contact person: Vasily Mikhalev

  • Registration

    After agreeing on a topic, we discuss the expected content and agree on a preliminary structure, usually in the form of a table of contents. This may serve you as a guide while writing your thesis.

    Before you can start working on your thesis, we need additional information for the official thesis registration. The required information consists of

    • Your full name
    • Your matriculation number
    • Your address
    • Your pursued degree
    • Your study program
    • The language of writing (i.e. English or German)

    The deadline for submitting your thesis is set with registration and depends on the type of thesis and your examination regulations – usually, you have three months for working on a Bachelor's thesis and six months for a Master's thesis.

    Unlike other assessments, a thesis can be started flexibly during a semester irrespective of lecture or examination periods.

  • Form

    In general, we are much more interested in content than in form. You should be able to write down the content in a precise but detailed way and use a scientific writing style. You are free to write your thesis using LaTeX, Word, or any other program. However, we recommend the use of LaTeX.

    Font, font size, line spacing, margins and the like should be reasonable. As a rough guideline, we expect 30 pages for a Bachelor's thesis and 60 pages for a Master's thesis, however, this is not definitive. Depending on the topic, including screenshots, graphics, and source code (snippets) can be beneficial, possibly resulting in a higher total number of pages.

  • Supervision

    It is your responsibility to organize and manage the time available for writing your thesis. Formally, you are not required to keep your supervisor(s) up to date. However, we recommend contacting your supervisor(s) regularly as it helps you to stay on track and to tackle potentially emerging problems early on. Discuss your preferred style of supervision with your supervisor(s).

  • Submission

    You have to submit your thesis no later than the deadline as defined by the registration. As per most examination regulations, you are required to hand in two printed copies including a signed affidavit (cf. your examination regulation for the exact wording), and a digital copy, preferably as a PDF file. You should send the digital version directly to your supervisor(s). Consider using duplex printing for the two hard copies with a binding of your choice.

  • Talk

    Depending on your examination regulations, you may have to present your thesis in form of a talk. However, even if you are not obliged to, we encourage everyone to seize this opportunity as you can strengthen your presentation skills, especially when presenting scientific work to an academic and diverse audience. Such a talk should take about 30 minutes and include five minutes for questions from the audience. Please note that any voluntarily given talk will not be graded.