Security and Cryptography II
Topic
This module gives an in-depth introduction into methods and techniques for unobservable and anonymous communications in computer networks. The basic principles will be explained and exemplified. More specific the following schemes will be discussed: Ring Network, Private Message Service, Mixes, DC-Net. Besides anonymity and unobservability on the network layer techniques for anonymity and pseudonymity on the application layer will be explained. The related principles will be illustrated using digital means of payment and value exchange as example.
Informations
Bachelor Computer Science (INF-B-510, INF-B-520),
Bachelor Media Computer Science (INF-B-530, INF-B-540),
Master/Diploma Computer Science (INF-BAS4, INF-VERT4),
Master Media Computer Science (INF-BI-3), Distributed Systems Engineering (DSE-E1)
Lectures and exercises integrated dynamically into each other each filling out approximately half of every teaching event. In the exercises not only the contents of the lectures are applied and practiced, but new knowledge discovered by yourself.
English
6th semester or later
Basic knowledge of IT-Security / Cryptography, learned for instance through attending the course "Security and Cryptography I" or "Kryptographie und Kryptoanalyse"
Lecture: 2, exercise: 2
oral examination
keine Angabe
Friday, 2. DS, 09:20 - 10:50 (E008) and Friday, 3. DS, 11:10 - 12:40 (E008)
start: 12.04. 2024
Please register at OPAL. OPAL will be used for all communication.
Course execution
The lecture will happen in presence.
OPAL will contain informaion regarding the expected progress for each course and some self-check questions.
Teaching material in english language
Script, Exercises, Exemplary Solutions
Note: The material is currently updated. At the moment it is based on the material of the course "Security & Cryptography II" previously taught by Prof. Andreas Pfitzmann. Here the Chapters 5 and 6 are most important.
- Script
- Slides
- Task for the Exercises
-
Self Assesment Test
This document contains some questions which you could use for self assessment. If you are able to answer all the questions correctly you do not need to fear the examination.
Note: Not all topics might have been covered during the lecture - depending on how fare we get in this semester. The parts not covered during lectures will obviously not be part of the exam. - Videos (from Summer Semester 2010)
- Introduction - Introduction to the lecture series
- Course 1 - Introduction to anonymous communication, Problem Statement & Attacker model
- Course 1a - Some more information regarding anonymity in general
- Course 2 - Broadcast for recipient anonymity
- Course 3 - Private Information Retrival for recipient anonymity
- Course 4 - Dummy Traffic as a general tool and for weak protection of sender anonymity
- Course 5 - Ring Net - protection of sender and recipient
- Course 6 - DC-Net Part 1 - strong protection of sender and recipient
- Course 7 - DC-Net Part 2 - general security proof strong & security improvements
- Course 8 - Mix Networks Part 1 - a more practical solution for sender / recipient anonymity
- Course 9 - Mix Networks Part 2 - attacks & fault tolerance
- Course 10 - Comparison of Schemes & Arranging into the OSI Layers
- Course 11 - OSI Layers Part 2 & Upgrade of existing Networks
- Course 12 - ISDN Mixes
- Course 13 - Anonymity & Network Termination
-
Course 14 - Anonymity in Radio Networks
-
Course 15 - Introduction to Electronic Banking
-
Course 16 - Pseudonyms, Anonymous Value Exchange & Anonymous Credentials
-
Course 17 - Anonymous Value Exchange, Anonymous Credentials, Anonymous offlien payment scheme - Part II
-
Course 18 - Steganography & The Impossibility to regulate Cryptography in a meaningful way
- old Resources (in case links above do not work)
- Summer Semester 2010 (many parts still relevant)
- List of Terminology: English <--> German