Name: Netzwerksicherheit ET-IDA-082
Art der Veranstaltung: Vorlesung
Betreuer: Apl. Prof. Dr.-Ing. Wael Adi
Semester: Sommersemester
Termin: Beginn: Wird ab 12.04.10 mit der interessierten vereinbart
s. Unten
Semesterwochenstunden: 2 V + 2 Ü
Fachnummer (Dipl.): 0
Veranstaltungsnummern(n): 0
Prüfungsart: n.b.

 

Vorlesungstermin im SS 2014 ist festgelegt:

Erste Vorlesung wird am 30.04.2014 gehalten.

Vorlesungstermin Mittwochs  um 16:45


(Doodle Votum hat dieser Termin mit minimalen Kollision ergeben)
http://doodle.com/ewwb89e2xi3nuf7r#table[EXTERNAL]

Vorlesungsort: Raum 1111, 11. Etage, Hans-Sommer Str 66, 38106 Braunschweig.

 

Bemerkung:

Die gleiche Vorlesung wird in englischer Sprache als Blockvorlesung Angeboten.Teremin noch nicht vereinbart siehe Link:
www.ida.ing.tu-bs.de/lehre/veranstaltungen/ag_jukan/e_network_security_ss/

 

Course material:

(Full lecture material with extensions)
(click hier) Class Material

Contact information:

w.adi@tu-bs.de  phone:  0531 391 5298  or mobile +4917696768458  

 

 

Course Description

Instructor: Prof. W. Adi 
 Credit:    2 lecture hours + 1 exercise  hour 
 Time: (adapted to participant's schedule)
 Prerequisites:  Knowledge of  basic Cryptography
 Course Materials: A course handout would be offered at lecture time 
 Course language:   German. and/or English. Lecture material are however in English 

 

SUMMARY:

The course introduces a refreshment summary on discrete mathematics, number theory and the basic contemporary cryptographic algorithms. The review concentrates on modern network security relevant symmetric and asymmetric cryptography including Digital signatures, certificates and authentication protocols. Contemporary network security technology related standards as (X.509, DSS, Kerberos), electronic mail security (PGP, S/MIME) as well as (IPSec, SSL, TLS, SET and others) would be presented showing their design concepts. Web security and protocols for secure electronic commerce, voting systems and other contemporary applications would cover the final concluding part of the lecture. The course concludes with modern trends in network security applications for voting, vehicular, sensor and similar networks.

Perquisites: Knowledge on Basic Communication Networks and Cryptography

Objectives

At the end of the course the student will understand:

  • Fundamentals of Secrecy theory, mathematical Background for modern cryptography. 
  • Network common Contemporary Secret-Key Ciphers:  DES, IDEA , AES  and Public Key Cryptography: Diffie Hellman Key Exchange, RSA secrecy system
  • Network Authentication techniques: MD4, MD5 - Message Digest Algorithms SHS - Secure Hash Algorithm and Standard 
  • Authentication Systems for People and Computer networks 
  • Network Security in practice:  Kerberos V4 and V5 
  • Electronic Mail Security 
    • S/MIME Secure/Multipurpose Internet Mail Extension 
    • PGP - Pretty Good Privacy 
    • Multicast and Broadcast Network Security
  • Contemporary IP and Web Security 
  • Network Protocols for secure electronic commerce. 
  • Concepts of Digital Watermarking and Steganography

Contents

  1. Basics of Cryptography and Security, Review of Secret and Public Key Systems in view of contemporary network security functions.
  2. Common standards for network Hashes and Message Digests, Message Authentication, MD5, SHA, RIPEMD, HMAC
  3. Network oriented Authentication Systems Digital Signatures, Certificates, User Authentication  
  4. Electronic Mail Security, (PGP), S/MIME, X.400, IP and Web Security, IPSec and Virtual Private Networks, Secure Sockets and Transport Layer (SSL and TLS)
  5. Wireless network security for 802.11 and Bluetooth
  6. Network routing and switching security
  7. Network Electronic Commerce and its Security, Electronic Payment Systems: CyberCash, iKey Protocols, Ecash (DigiCash), Secure Electronic Transaction (SET)
  8. Digital Watermarking and Steganography. Network wide Digital Copyright and IPR Protection, Secured Information Hiding and Steganography
  9. Trusted Computing, Secured Computing environment and Software

 

Textbooks:

  • “Network Security: Private Communication in a Public World”,
     Charlie Kaufman, Radia Perlman, and Mike Speciner, 2-nd
     edition, Prentice Hall, 2002
  • Network Security Essentials, Applications and Standards”,William Stallings, 3-rd edition, Pearson Prentice Hall, 2007

References: 

  • A reference textbook: Cryptography Theory and Practice, Second edition by D. Stinson. 

Other optional contemporary papers and books.

  • “Cryptography and Network Security: Principles and Practice”,
    William Stallings, 3-rd edition, Prentice Hall, 2003
  • Applied Cryptography: Protocols, Algorithms, and Source Code in C”, Bruce Schneier, 2-nd edition, John Wiley & Sons, 1996

 Exam Regulations:

  • Date : To be agreed on later

  • Open book written exam: 70% of the marks ca. 1,5 hours (all documents ar allowed). See sample exams
  • Closed book part: 30%, short questions (without documents). See sample exams.

  • Room: Hans-Sommer Str 66, 38106 Braunschweig, 11. Stock, Raum 1111 or alternative in the same building

Sample exams with solution would be made available with the lecture slides

 

Instituts-Anschrift:
Hans-Sommer-Straße 66
38106 Braunschweig

Fon: (0531) 391-3734
Fax: (0531) 391-4587
sekretariat(at)ida.ing.tu-bs.de