Information Security and Cryptography



Similar documents
Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

CS 758: Cryptography / Network Security

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

CNT Computer and Network Security Review/Wrapup

CRYPTOGRAPHY AND NETWORK SECURITY

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

VALLIAMMAI ENGINEERING COLLEGE

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

CRYPTOG NETWORK SECURITY

Table of Contents. Bibliografische Informationen digitalisiert durch

CPSC 467b: Cryptography and Computer Security

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Wireless Mobile Internet Security. 2nd Edition

IT Networks & Security CERT Luncheon Series: Cryptography

Chapter 8. Network Security

NETWORK ADMINISTRATION AND SECURITY

CRIPT - Cryptography and Network Security

Cryptography and Key Management Basics

Cryptography and network security CNET4523

CRYPTOGRAPHY IN NETWORK SECURITY

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

An Overview of Common Adversary Models

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Weighted Total Mark. Weighted Exam Mark

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

EXAM questions for the course TTM Information Security May Part 1

Bachelor of Information Technology (Network Security)

Security Goals Services

JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder

BUY ONLINE FROM:

Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics.

Security + Certification (ITSY 1076) Syllabus

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

Chapter 10. Network Security

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

SE 4472a / ECE 9064a: Information Security

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

Tim Bovles WILEY. Wiley Publishing, Inc.

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring Nitesh Saxena Polytechnic University

Implementing Cisco IOS Network Security v2.0 (IINS)

CS Final Exam

Overview. SSL Cryptography Overview CHAPTER 1

INFORMATION SECURITY A MULTIDISCIPLINARY. Stig F. Mjolsnes INTRODUCTION TO. Norwegian University ofscience & Technology. CRC Press

Content Teaching Academy at James Madison University

Computer Security CS 426. CS426 Fall 2010/Lecture 40 1

Network Security Essentials:

How To Understand And Understand The Security Of A Key Infrastructure

How To Protect Your Data From Attack

Lecture 9 - Network Security TDTS (ht1)

Lecture 9: Application of Cryptography

Curran, K. Tutorials. Independent study (including assessment) N/A

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

CS 356 Lecture 28 Internet Authentication. Spring 2013

Information Security Basic Concepts

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Eleventh Hour Security+

Module 7 Security CS655! 7-1!

VoIP Security. Seminar: Cryptography and Security Michael Muncan

CS 464/564 Networked Systems Security SYLLABUS

TELECOMMUNICATION NETWORKS

Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

Associate Prof. Dr. Victor Onomza Waziri

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security Course Specifications

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Certificate in Cyber Security

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

Computer Security: Principles and Practice

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

SSL BEST PRACTICES OVERVIEW

Distributed Public Key Infrastructure via the Blockchain. Sean Pearl April 28, 2015

White Paper. Enhancing Website Security with Algorithm Agility

Public Key Cryptography in Practice. c Eli Biham - May 3, Public Key Cryptography in Practice (13)

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Information Security

Lecture 6 - Cryptography

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

Transcription:

Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland Lecturers: David Basin, ETH Zurich Ueli Maurer, ETH Zurich ATG www.infsec.ch

Program Starting 09:00 on Monday June 1 and ending at 17:00 on June 3 Information Security: An Overview Information at Risk: Threats, Security Objectives, and Security Measures Classification of the Fundamental Information Security Problems Information Security as Policy Compliance Information Security as Risk Minimization Cryptography: Basic Concepts and Terminology Some History Types and Models of Cryptographic Systems Cryptographic Functions, Hash Functions Secrecy, Authenticity, and their Duality and Independence Cryptographic Calculus of Channel Security Properties Symmetric Cryptography: Block Ciphers, Stream Ciphers, MACs, etc. Randomness and Pseudo-Randomness Cryptanalytic Attacks, Assumptions, Security Definitions Public-Key Cryptosystems, Public-Key Agreement Digital Signatures Cryptography Foundations Basics of Discrete Mathematics Theoretical Foundations of Cryptography Discrete Logarithms, Factoring, and other Hard Problems Design and Analysis of Cryptographic Systems RSA: Workings and Security Analysis Diffie-Hellman Protocol: Workings and Security Analysis Elliptic Curve Cryptography Modes of Operation for Cryptographic Systems Indistinguishability and Provable Security Constructive Cryptography and Universal Composability System and Network Security Networking Essentials Trade-offs in Securing Network Layers Security Protocols including Kerberos, SSL, IPsec Security Architectures Firewalls and Intrusion Detection PKI and Key Management Key Management Challenges PKI Certificates, Architectures, and Standards Key Revocation and Recovery Trust Models (Direct, Cross, Hierarchical, Web of Trust) X.509 and PGP Alternative PKIs: client, CA, and domain-centric options Certificate Handling in Web Browsers

Nonrepudiation and Digital Evidence The Digital Evidence Dilemma Types of Digital Evidence Semantics of Digital Signatures, Certificates, Time-stamps Revalidation, Revocation Digital Signatures vs. Handwritten Signatures Digital Signature Legislation Authentication, Authorization, and Access Control AAA Architectures: Authentication, Authorization, and Access Control Authentication: Passwords, Biometrics, and Token-based Policies and Models Access Control Matrix Model DAC and MAC Models BLP, Biba, and Chinese Wall Models RBAC, XACML Single Sign-on Identity Management Privacy and Usage Control Data Protection and Control of Intellectual Property Anonymity and Privacy-enhancing Technologies Proxies, Mix Networks, and other Anonymity Approaches Usage Control Architectures Digital Rights Management Trusted Computing Security Engineering and Web-Application Security Security Engineering in the Software Engineering Life Cycle Common Vulnerability Classes including: Session Management, Injection Attacks, Cross-Site Scripting, and Race Conditions. Security Standards and Certification Advanced Topics in Cryptography Cryptographic Protocols Zero-Knowledge Protocols Digital Payment Systems, E-Cash, Bitcoin Secure Multi-Party Computation E-Voting Quantum Cryptography ATG www.infsec.ch

Lecturers David Basin is a full professor of Computer Science at ETH Zurich. He received his Ph.D. in Computer Science from Cornell University in 1989 and his Habilitation in Computer Science from the University of Saarbrucken in 1996. From 1997 2002 he held the chair of Software Engineering at the University of Freiburg in Germany. His research areas are Information Security and Software Engineering. He is the founding director of the ZISC, the Zurich Information Security Center, which he led from 2003-2011. He is Editor-in-Chief of Springer- Verlag's book series in Information Security and Cryptography and serves on the editorial boards of numerous journals including ACM Transactions on Information and System Security and Acta Informatica. He serves on various management and scientific advisory boards and has consulted extensively for IT companies and government organizations. Ueli Maurer is a full professor of Computer Science at ETH Zurich. He received his Ph.D. degree in electrical engineering from ETH Zurich in 1990. From 1990 1991 he was a DIMACS post-doctoral fellow at the Department of Computer Science, Princeton University. His research interests include the theory and applications of cryptography and information security. He served as the Editor-in- Chief of the Journal of Cryptology from 2001 to 2010, and Editor-in-Chief of Springer Verlag's book series in Information Security and Cryptography from 1997 to 2012. Maurer holds several patents for cryptographic systems. He serves on several management and scientific advisory boards, has consulted extensively for the financial industry, the IT industry, and government organisations, and has co-founded the Zurich-based securitysoftware company Visonys AG. He is a Fellow of the IEEE, a Fellow of the IACR, and recipient of the 2013 Vodafone Innovation Award for Mobile Communications. Seminar goals Information Security and Cryptography are of vital importance today, with applications in communication and information systems, cyberphysical systems, and more generally, in the emerging Information Society. Our 2015 seminar covers complementary topics and is aimed at different target audiences, providing an in-depth coverage of Information Security and Cryptography from both a conceptual and application-oriented viewpoint. At the same time, the mathematical, algorithmic, protocol-specific, and system-oriented aspects are explained in a way understandable to a wide audience. This includes the foundations needed to understand the different approaches, a critical look at the state-of-the-art, and a perspective on future security technologies. The seminar is aimed at all professionals who need up-to-date knowledge and expertise in this area. This includes system designers and engineers, security experts, IT-professionals, instructors, project managers, consultants, law enforcement professionals, and professional cryptographers. The material is presented at three different levels. At the highest level, the basic concepts are presented in detail, but abstractly (e.g., as black boxes), without mathematics. No background is required to follow at this level. At an intermediate level, the most important concrete schemes, models, algorithms, and protocols are presented as well as their applications. Here some minimal mathematical and systems background is assumed. At the deepest level, which is not required to understand the higher levels, different special topics, requiring some mathematical background, are discussed. Venue The seminar will take place at the Marriott Courtyard Zurich North, Max-Bill-Platz 1, CH-8050 Zurich, Switzerland. The seminar hotel is located between downtown Zurich and the airport, easily accessible from both with public transportation.

ATG Seminar enrollment 2015 Venue: Hotel Marriott Courtyard Zurich Nord Max-Bill-Platz 1, CH-8050 Zurich, Switzerland r Ms. r Mr. r Dr. r Prof. r Other:... Last name:... First name:... Company name:... Business address:......... Phone:... Fax:... Email:... r Information Security and Cryptography on June 1-3, 2015 in Zurich, Switzerland Early registration before February 28, 2015: CHF 3,600 Standard registration as from March 1, 2015: CHF 3,900 Price includes course material, lunches, coffee breaks, and beverages during the seminar. r r Check enclosed payable to ATG GmbH, Wil Payment will be made upon receipt of invoice Date:... Signature:... Send to: ATG GmbH Grundgasse 13 CH-9500 Wil info@infsec.ch www.infsec.ch Fax +41-(0)44-632 1172

ATG Hotel reservation 2015 Venue: Hotel Marriott Courtyard Zurich Nord Max-Bill-Platz 1, CH-8050 Zurich, Switzerland Please reserve your hotel room for the seminars directly with the hotel (and with payment to the hotel). Note that there are a limited number of discounted rooms available for the seminar on a first-come first-serve basis. Please reserve your room at your earliest convenience. The block reservation cut-off date is May 1, 2015. r Single room (CHF 269 including breakfast and WLAN) r Double room (CHF 289 including breakfast and WLAN) Arrival date:... Departure date:... r Ms. r Mr. r Dr. r Prof. r Other:... Last name / first name:... Company name:... Business address:...... Phone:... Fax:... Email:... Credit card number:... Expiration date:... Name on card:... Type of card:... Date:... Signature:... Send to: Marriott Courtyard Zurich North Max-Bill-Platz 1 CH-8050 Zurich Switzerland Fax +41-(0)44-564 0400

http://www.springer.com/series/4752