Name: Netzwerksicherheit ET-IDA-082
Art der Veranstaltung: Vorlesung
Betreuer: Apl. Prof. Dr.-Ing. Wael Adi
Semester: Sommersemester
Termin: Beginn: Nach Vereinbarung

Semesterwochenstunden: 2 V + 2 Ü + Extra Übungen
Prüfungsart: n.b.

Klausurergebnisse: in unter hier zu finden.

 Herzlichen Glückwünsche an :

Signe Katerina Rüsch     und    Timo Schwarz

für die erzielten exzellenten Ergebnisse.


Klausureinsicht: 4.11.2015, 12:00 oder nach Vereinbarung

ORT: Raum 1111, 11. Etage, Hans-Sommer Str 66, 38106 Braunschweig.

Vorlesungsmaterial  aktualisiert!

Vorgehensweise im Klausur:

1. Teil (closed Book) sind nur Taschenrechner als Hilfsmittel ohne Vernetzung erlaubt !!    Dauer ca. 20 Minuten.

2. Teil (open Book). Alle Hilfsmittel sind erlaubt, Skripte, Alt-Klausuren, Bücher, Eigenschriften aber ohne vernetzbare Rechner. Dauer ca. 60-90 Minuten.



Die gleiche Vorlesung wird in englischer Sprache als Blockvorlesung Angeboten. Teremin noch nicht vereinbart siehe Link:


Course material:

(Full lecture material with extensions)
(click hier) Class Material

Contact information:  phone:  0531 391 5298  or mobile +4917696768458  



Course Description

Instructor: Prof. W. Adi 
 Credit:    2 lecture hours + 1 exercise  hour 
 Time: (adapted to participant's schedule)
 Prerequisites:  Knowledge of  basic Cryptography
 Course Materials: A course handout would be offered at lecture time 
 Course language:   German. and/or English. Lecture material are however in English 



The course introduces a refreshment summary on discrete mathematics, number theory and the basic contemporary cryptographic algorithms. The review concentrates on modern network security relevant symmetric and asymmetric cryptography including Digital signatures, certificates and authentication protocols. Contemporary network security technology related standards as (X.509, DSS, Kerberos), electronic mail security (PGP, S/MIME) as well as (IPSec, SSL, TLS, SET and others) would be presented showing their design concepts. Web security and protocols for secure electronic commerce, voting systems and other contemporary applications would cover the final concluding part of the lecture. The course concludes with modern trends in network security applications for voting, vehicular, sensor and similar networks.

Perquisites: Knowledge on Basic Communication Networks and Cryptography


At the end of the course the student will understand:

  • Fundamentals of Secrecy theory, mathematical Background for modern cryptography. 
  • Network common Contemporary Secret-Key Ciphers:  DES, IDEA , AES  and Public Key Cryptography: Diffie Hellman Key Exchange, RSA secrecy system
  • Network Authentication techniques: MD4, MD5 - Message Digest Algorithms SHS - Secure Hash Algorithm and Standard 
  • Authentication Systems for People and Computer networks 
  • Network Security in practice:  Kerberos V4 and V5 
  • Electronic Mail Security 
    • S/MIME Secure/Multipurpose Internet Mail Extension 
    • PGP - Pretty Good Privacy 
    • Multicast and Broadcast Network Security
  • Contemporary IP and Web Security 
  • Network Protocols for secure electronic commerce. 
  • Concepts of Digital Watermarking and Steganography


  1. Basics of Cryptography and Security, Review of Secret and Public Key Systems in view of contemporary network security functions.
  2. Common standards for network Hashes and Message Digests, Message Authentication, MD5, SHA, RIPEMD, HMAC
  3. Network oriented Authentication Systems Digital Signatures, Certificates, User Authentication  
  4. Electronic Mail Security, (PGP), S/MIME, X.400, IP and Web Security, IPSec and Virtual Private Networks, Secure Sockets and Transport Layer (SSL and TLS)
  5. Wireless network security for 802.11 and Bluetooth
  6. Network routing and switching security
  7. Network Electronic Commerce and its Security, Electronic Payment Systems: CyberCash, iKey Protocols, Ecash (DigiCash), Secure Electronic Transaction (SET)
  8. Digital Watermarking and Steganography. Network wide Digital Copyright and IPR Protection, Secured Information Hiding and Steganography
  9. Trusted Computing, Secured Computing environment and Software



  • “Network Security: Private Communication in a Public World”,
     Charlie Kaufman, Radia Perlman, and Mike Speciner, 2-nd
     edition, Prentice Hall, 2002
  • Network Security Essentials, Applications and Standards”,William Stallings, 3-rd edition, Pearson Prentice Hall, 2007


  • A reference textbook: Cryptography Theory and Practice, Second edition by D. Stinson. 

Other optional contemporary papers and books.

  • “Cryptography and Network Security: Principles and Practice”,
    William Stallings, 3-rd edition, Prentice Hall, 2003
  • Applied Cryptography: Protocols, Algorithms, and Source Code in C”, Bruce Schneier, 2-nd edition, John Wiley & Sons, 1996

 Exam Regulations:

  • Date : To be agreed on later

  • Open book written exam: 70% of the marks ca. 1,5 hours (all documents ar allowed). See sample exams
  • Closed book part: 30%, short questions (without documents). See sample exams.

  • Room: Hans-Sommer Str 66, 38106 Braunschweig, 11. Stock, Raum 1111 or alternative in the same building

Sample exams with solution would be made available with the lecture slides

Hans-Sommer-Straße 66
38106 Braunschweig

Fon: (0531) 391-3734
Fax: (0531) 391-4587

Anschrift AG Prof. Jukan:

Hans-Sommer-Straße 66
38106 Braunschweig

Fon: (0531) 391-5286
Fax: (0531) 391-5296