This course gives an introduction to cryptography and cryptographic key management, as well as an introduction to cryptographic protocols and their application in the field of security in distributed systems. Relevant mathematical tools will be developed accordingly. In addition, the lecture addresses the importance of implementation details in the context of IT system security.