Klausur am 04.09.2014 um 10:00
Klausureinsicht: 14.10.2014 12:00 Raum 1111, Hans-Sommer Str. 66., 38106 Braunschweig
- Übung T12 enthält jetzt eine volle Musterlösung und ist etwas verbessert !!!
- Ein extra Musterklausur mit Lösung vom Jahr 2010 ist unter Musterklausuren zu finden
Ort: Raum 1111, Hans-Sommer Str. 66., 38106 Braunschweig
Vorlesungen 16 bis 22 sind markiert: P relevant für Aufgabenteil, S relevant für Kurzfragenteil
Vorlesungsort: Raum 1111, 11. Etage, Hans-Sommer Str 66, 38106 Braunschweig.
email@example.com phone: 0531 391 5298 or mobile +4917696768458
Instructor: Prof. W. Adi
Credit: 2 lecture hours + 1 exercise hour
Time: (adapted to participant's schedule)
Prerequisites: Knowledge of basic Cryptography
Course Materials: A course handout would be offered at lecture time
Course language: German. and/or English. Lecture material are however in English
The course introduces a refreshment summary on discrete mathematics, number theory and the basic contemporary cryptographic algorithms. The review concentrates on modern network security relevant symmetric and asymmetric cryptography including Digital signatures, certificates and authentication protocols. Contemporary network security technology related standards as (X.509, DSS, Kerberos), electronic mail security (PGP, S/MIME) as well as (IPSec, SSL, TLS, SET and others) would be presented showing their design concepts. Web security and protocols for secure electronic commerce, voting systems and other contemporary applications would cover the final concluding part of the lecture. The course concludes with modern trends in network security applications for voting, vehicular, sensor and similar networks.
Perquisites: Knowledge on Basic Communication Networks and Cryptography
At the end of the course the student will understand:
- Fundamentals of Secrecy theory, mathematical Background for modern cryptography.
- Network common Contemporary Secret-Key Ciphers: DES, IDEA , AES and Public Key Cryptography: Diffie Hellman Key Exchange, RSA secrecy system
- Network Authentication techniques: MD4, MD5 - Message Digest Algorithms SHS - Secure Hash Algorithm and Standard
- Authentication Systems for People and Computer networks
- Network Security in practice: Kerberos V4 and V5
- Electronic Mail Security
- S/MIME Secure/Multipurpose Internet Mail Extension
- PGP - Pretty Good Privacy
- Multicast and Broadcast Network Security
- Contemporary IP and Web Security
- Network Protocols for secure electronic commerce.
- Concepts of Digital Watermarking and Steganography
- Basics of Cryptography and Security, Review of Secret and Public Key Systems in view of contemporary network security functions.
- Common standards for network Hashes and Message Digests, Message Authentication, MD5, SHA, RIPEMD, HMAC
- Network oriented Authentication Systems Digital Signatures, Certificates, User Authentication
- Electronic Mail Security, (PGP), S/MIME, X.400, IP and Web Security, IPSec and Virtual Private Networks, Secure Sockets and Transport Layer (SSL and TLS)
- Wireless network security for 802.11 and Bluetooth
- Network routing and switching security
- Network Electronic Commerce and its Security, Electronic Payment Systems: CyberCash, iKey Protocols, Ecash (DigiCash), Secure Electronic Transaction (SET)
- Digital Watermarking and Steganography. Network wide Digital Copyright and IPR Protection, Secured Information Hiding and Steganography
- Trusted Computing, Secured Computing environment and Software
- “Network Security: Private Communication in a Public World”,
Charlie Kaufman, Radia Perlman, and Mike Speciner, 2-nd
edition, Prentice Hall, 2002
- Network Security Essentials, Applications and Standards”,William Stallings, 3-rd edition, Pearson Prentice Hall, 2007
- A reference textbook: Cryptography Theory and Practice, Second edition by D. Stinson.
Other optional contemporary papers and books.
- “Cryptography and Network Security: Principles and Practice”,
William Stallings, 3-rd edition, Prentice Hall, 2003
- Applied Cryptography: Protocols, Algorithms, and Source Code in C”, Bruce Schneier, 2-nd edition, John Wiley & Sons, 1996
- Date : To be agreed on later
- Open book written exam: 70% of the marks ca. 1,5 hours (all documents ar allowed). See sample exams
- Closed book part: 30%, short questions (without documents). See sample exams.
- Room: Hans-Sommer Str 66, 38106 Braunschweig, 11. Stock, Raum 1111 or alternative in the same building
Sample exams with solution would be made available with the lecture slides