Security and Cryptography I
Information
Computer Science (Diploma),
Media Computer Science (Diploma),
Information Systems Engineering (Diploma),
Bachelor Computer Science (INF-B-510, INF-B-520),
Bachelor Media Computer Science (INF-B-530, INF-B-540),
Master/Diploma Computer Science (INF-BAS4, INF-VERT4, INF-PM-ANW),
Master Media Computer Science (INF-BI-3),
Master Distributed Systems Engineering (DSE-M3),
Master Computational Logic (MCL-CSE),
INF-04-FG-AVS, MINF-04-FG-IAS
Lecture and exercises integrated dynamically into each other each filling out approximately half of every teaching event. In the exercises not only the contents of the lectures are applied and practiced, but new knowledge discovered by yourself.
None
Lecture: 2, exercise: 2
- Computer Science (Diploma 2004) --> oral (8 SWS) 30-60 minutes or oral "Vertiefungsprüfung" (12 SWS) 60-90 minutes
- Media Computer Science (Diploma 2004) --> oral (8 SWS) 30-60 minutes or oral "Vertiefungsprüfung" (12 SWS) 60-90 minutes
- Information Systems Engineering (Diploma) --> oral according to exam. regulations / module description (30 or 40 minutes)
- Bachelor Computer Science (INF-B-510, INF-B-520) --> written exam, 90 minutes
- Bachelor Media Computer Science (INF-B-530, INF-B-540) --> written exam, 90 minutes
- Master/Diploma Computer Science
- INF-BAS4 (8 SWS) --> oral according to module description 30 minutes
- INF-VERT4 (10 SWS) --> oral according to module description 40 minutes
- INF-PM-ANW (2/2 SWS) --> oral 15 minutes
- Master Media Computer Science
- INF-BI-3 (8 SWS) --> oral according to module description 40 minutes
- Master Distributed Systems Engineering (DSE-M3) --> written exam, 90 Minuten
- Master Computational Logic (MCL-CSE) --> oral according to module description 40 minutes
- INF-04-FG-AVS, MINF-04-FG-IAS
- Erasmus students and students who graduate abroad can choose between the written exam (90 minutes) and an oral exam (30 minutes)
Thursday 2. and 3.DS (09:20-12:40), online
start: 29.10.2020
Please register using OPAL and jExam.
jExam: starting shortly
OPAL: open now
Information regarding the written exam
The written exam will take place on: 1st of March 2021, 07:30-09:00 CET.
Location: Zeuner Bau
The exam room will be assigned according to your course of study.
DSE-students: ZEU/250/Z
all others (Bachelor etc.): ZEU/LICH/H
Please bring your own paper and pen! Besides this no other tools and documents are allowed or necessary.
Additionally, there are certain regulations you need to follow with respect to Covid-19 protection. Please read this and this carefully.
The most important ones are:
- keep distance to other human beings all time (at least 1.5m in all directions measured from your mouth)
- register with the ZIH-tool before entering the building
- wear a mask all the time
Course execution until on-side classroom teching is safely possible again
As long as no on-side teching is safely and easily possible we will use online teaching. The current concept is, that you use the provide material (Videos, Script, Slides) to study the relevant topics yourself. We will offer online consulations. Therefore we will use our own video conferencing tool. The link will be provide in OPAL.
OPAL will contain information regarding the expected progress for each course and some self-check questions. Again, depending on how well everything works the style of teaching might change over the semester.
Content
This lecture gives a thorough introduction to security in general and to multilateral security of IT-systems in particular. Protection goals and their interdependencies are discussed as well as reasonable attacker models. Different kinds of security mechanisms are introduced to provide examples and to clarify that security mechanisms are means to provide for protection goals against attackers at most as powerful as described in the attacker model.
Cryptosystems are the fundamental security mechanisms to achieve the protection goals confidentiality and integrity in distributed IT-systems and are therefore discussed in depth: We start by a classification of cryptosystems according to the protection goal they are aiming at and the key-distribution they use. We concentrate on those cryptosystems, whose security is as much validated as possible or even provable. We stress the kind of validation or proof.
Participants are enabled both to define and analyze security properties of IT-systems in two respects: What security properties the IT-system is supposed to have and how sure we can be that it really has these properties with respect to could be attackers. In addition, basic knowledge is acquired and basic skills are developed how to construct secure IT-systems.
Teaching Material
Script, Exercises, Exemplary Solutions
The script covers the lectures Security & Cryptography I and II. Here only the chapters 1-3 are relevant.
Slides
List of Terminology: English <--> German
Videos
The videos are recordings of Security & Cryptography I of the winter term 2009/2010. Nevertheless the content is sitll relevant.
Material for the exercises
Please find the material for the exercises here