Security and Cryptography I
Information
Bachelor Computer Science (INF-B-510, INF-B-520),
Bachelor Media Computer Science (INF-B-530, INF-B-540),
Master/Diploma Computer Science (INF-BAS4, INF-VERT4, INF-PM-ANW),
Master Media Computer Science (INF-BI-3),
Master Distributed Systems Engineering (DSE-M3),
Lecture and exercises integrated dynamically into each other each filling out approximately half of every teaching event. In the exercises not only the contents of the lectures are applied and practiced, but new knowledge discovered by yourself.
None
Lecture: 2, exercise: 2
- Bachelor Computer Science (INF-B-510, INF-B-520) --> written exam, 90 minutes
- Bachelor Media Computer Science (INF-B-530, INF-B-540) --> written exam, 90 minutes
- Master/Diploma Computer Science
- INF-BAS4 (8 SWS) --> oral according to module description 30 minutes
- INF-VERT4 (10 SWS) --> oral according to module description 40 minutes
- INF-PM-ANW (2/2 SWS) --> oral 15 minutes
- Master Media Computer Science
- INF-BI-3 (8 SWS) --> oral according to module description 40 minutes
- Master Distributed Systems Engineering (DSE-M3) --> written exam, 90 Minuten
- Erasmus students and students who graduate abroad can choose between the written exam (90 minutes) and an oral exam (30 minutes)
Thursday 2. and 3.DS (09:20-12:40)
APB E023
start: 12.10.2023
Note: First lecture will be most likely online or by means of videos, since I am not in Dresden this day.
Please register using OPAL (possible now).
The OPAL e-Mail function will be used.
Course execution
The course will be mainly in presence. The presence part will happen in APB E023. Information regarding the online part well be published in OPAL.
OPAL will contain information regarding the expected progress for each course and some self-check questions.
Content
This lecture gives a thorough introduction to security in general and to multilateral security of IT-systems in particular. Protection goals and their interdependencies are discussed as well as reasonable attacker models. Different kinds of security mechanisms are introduced to provide examples and to clarify that security mechanisms are means to provide for protection goals against attackers at most as powerful as described in the attacker model.
Cryptosystems are the fundamental security mechanisms to achieve the protection goals confidentiality and integrity in distributed IT-systems and are therefore discussed in depth: We start by a classification of cryptosystems according to the protection goal they are aiming at and the key-distribution they use. We concentrate on those cryptosystems, whose security is as much validated as possible or even provable. We stress the kind of validation or proof.
Participants are enabled both to define and analyze security properties of IT-systems in two respects: What security properties the IT-system is supposed to have and how sure we can be that it really has these properties with respect to could be attackers. In addition, basic knowledge is acquired and basic skills are developed how to construct secure IT-systems.
Teaching Material
Script, Exercises, Exemplary Solutions
The script covers the lectures Security & Cryptography I and II. Here only the chapters 1-3 are relevant.
Slides
List of Terminology: English <--> German
Videos
The videos are recordings of Security & Cryptography I of the winter term 2009/2010. Nevertheless the content is sitll relevant.
Material for the exercises
Please find the material for the exercises here