Classical ciphers; symmetric ciphers; hash functions; authentication; asymmetric ciphers; factorization; DLP and attacking asymmetric ciphers; security protocols; emerging concepts; selected topics from biometrics; elliptic curve cryptography; smart card security; identity based encryption; computer forensics. Practical work: Competitive cryptanalysis