Spezialvorlesung

Foundations of Cryptography and
Network Security

 

Have you ever asked yourself how to design a secure distributed system, such as outsourced cloud storage, border access control or Internet call services? Do you believe that Amazon EC2, Germany’s electronic pass or Skype do a proper job, or are you a skeptic flavored with some cynicism and courageous to put existing security and privacy technologies in question?
In this class, you learn the state-of-the-art skills beyond folklore hacking. In fact, we give the proficiency to become a general security expert capable of solving today’s challenging problems. You will meet the requirements to build, analyze and assess security applications as desired from academia and industry nowadays. You will learn the groundbreaking theoretical and practical tools.

Cryptography is an elementary component of any security application. The first part of the lecture covers foundations of cryptography. Starting from one-way functions, we construct pseudo-random generators, pseudo-random functions, encryption schemes and digital signatures. You will understand why hardness and randomness are intrinsic ingredients of a cryptographic algorithm. In the second part, we compose cryptographic algorithms to practical network protocols, such as IPSec, SSH, SSL or Kerberos. We augment the realm of network security with Intrusion Detection Systems and Firewalls. These are off-the-shelf solutions to protect against network attacks. On top of that, we round off the lecture with an introduction to application-layer security in distributed systems such as peer-to-peer communication or Voiceover-IP services.

Leitung

Dr. Sebastian Gajek, Jan Seedorf, NEC Laboratories

Angaben

Spezialvorlesung, 2 SWS

Zeit und Ort

ab 22.10.2012, Montag 16:00 - 18:00 Uhr, INF325 1.OG Seminarraum 23a/b

Teilnahme

Bachelor/Master Angewandte Informatik sowie HörerInnen anderer Fachrichtungen

Voraussetzungen

Empfohlene Vorkenntnisse: Vorlesung Theoretische Informatik und Betriebsysteme und Netzwerke

Zuordnung

Kerninformatik

Übungsschein oder Leistungsnachweis

Leistungsnachweis je nach Studiengang;
Voraussetzung für die Vergabe von Leistungspunkten ist die erfolgreiche
Abgabe von Hausaufgaben und Teilnahme an der Abschlussprüfung
(mündlich oder schriftlich, je nach Anzahl der TeilnehmerInnen).

Kontakt

Prof. Dr. Barbara Paech, INF326, Raum 208

 

 

 

Contact | Travel Info

News

Our paper 'Empirical Research Design for Software Architecture Decision Making: An Analysis' was selected for the JSS Happy Hour. You can watch it on YouTube

'Continuous Management of Requirement Decisions Using the ConDec Tools' received the best paper award on the tool track of REFSQ'20 (pitch)

2020-2023 Barbara Paech member of DFG review board "software engineering and programing languages"

The IoT-Platform "HEIOT" was developed during the ISE project

Anja Kleebaum et al. 'Continuous Design Decision Support'. Chapter published in 'Managed Software Evolution' (2019)