Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 1/20 Security Protocols and Infrastructures Chapter 0: and Contents Nicolas Buchmann (Harald Baier) Hochschule Darmstadt, CASED Winter Term 2014/2015
Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 2/20 Literature CASED
Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 3/20 Literature CASED
Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 4/20 General Remarks 1. Elective module in Master of Computer Science / JIM: Catalogue: Application systems. Applicable for IT-Security track. SWH: 2 lecture + 1 lab + 1 exercise 6 ECTS 2. Time schedule of lecture: Thursday, 4:00 p.m. until 5:30 p.m. Lecture hall D14/3.03. Start: Thursday, 2014-10-09 3. Contact person for lab: Lisa Schehlmann lisa.schehlmann--at--cased.de
Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 5/20 x-y-scheme
Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 6/20 Exercises 1. Every second Tuesday, 12:00 p.m. - 13:30 p.m. 2. Lecture hall: D14/1.03. 3. Voluntary participation (preparation and participation is strongly recommended). 4. 5 exercises (y-weeks) (grey): 4.1 2014-10-28: 1st exercise 4.2 2014-11-11: 2nd exercise 4.3 2014-11-25: 3rd exercise 4.4 2014-12-09: 4th exercise 4.5 2015-01-13: 5th exercise
Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 7/20 Lab 1. Every second Wednesday, 10:15 a.m. until 11:45 a.m. 2. Lecture hall: D14/3.03. 3. You have to pass all labs!!! 4. 5 labs : Please check the OBS or my webpage for the dates
Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 8/20 Teaching Cooperation with TUD 1. Students from TUD: Please fill in the circulating list. 2. Further questions regarding time table, locations,...?
Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 9/20 Literature CASED
Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 10/20 Security Protocols (1/2) Cryptographic Primitives: Security goals Cryptographic base techniques Mathematical foundations of cryptographic primitives Attack models on encryption The Diffie-Hellman key exchange scheme The RSA cryptographic scheme
Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 11/20 Security Protocols (2/2) Security Protocols for electronic ID cards: Basic Access Control Extended Access Control PACE Security Protocols for the Internet: Transport Layer Security
Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 12/20 Security Infrastructures 1. Standards for Security Infrastructures: ASN.1 X.509 and RFC 5280 Public Key Cryptrographic Standard Series 2. PKI of Machine Readable Travel Documents 3. Revocation Mechanisms of X.509 certificates: Certificate Revocation Lists Online Certificate Status Protocol 4. Validation of Signatures and Validity Models
Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 13/20 Time Table (1/3) 2014-10-09: Chapter 0: and Contents Chapter 1: Motivation and Security Goals 2014-10-14 (exercise date): 2014-10-16: Chapter 2: Cryptographic and Mathematical Foundations No lecture 2014-10-23: Chapter 3: The Diffie-Hellman and the RSA Scheme
Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 14/20 Time Table (2/3) 2014-10-30: Chapter 4: Introduction to Abstract Syntax Notation 1 (ASN.1) 2014-11-06 + 2014-11-13: 2014-11-20: Chapter 5: Standards for Security Infrastructures Chapter 6: Extended Validation Certificates and Current Topics 2014-11-27 + 2014-12-04: Chapter 7: Security Protocols for Electronic ID Cards
Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 15/20 Time Table (3/3) 2014-12-11 + 2014-12-18: 2015-01-15: 2015-01-22: Chapter 8: The Transport Layer Security Protocol (TLS) Chapter 9: Security Considerations of TLS and DTLS Chapter 10: Revocation and Validity Models
Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 16/20 Literature Literature CASED
Literature Literature 1. A. Menezes, P. van Oorschoot, S. Vanstone: Handbook of Applied Cryptography, CRC Press, 1997 2. V. Shoup, A Computational Introduction to Number Theory and Algebra, Cambridge University Press, 2008 3. N.P. Smart, Cryptography, An Introduction : Third Edition, 2013 4. David Cooper et.al.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, Request for Comments 5280, May 2008 5. ICAO Document 9303 6. BSI Technical Report TR-03110, www.bsi.bund.de 7. Slides Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 17/20
Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 18/20 CASED Literature CASED
CASED Abschlussarbeiten, Hiwi-Tätigkeiten, Projektmitarbeit 1. Themenschwerpunkte in da/sec: Computerforensik. Botnetzdetektion in Hochverkehrsnetzen. Sicherheitsprotokolle für elektronische Reisedokumente. 2. In diesen Bereichen haben wir interessante Projekte: CASED, OpenC 3 S, iaid, NetFlowBot, FIDELITY, Auftragsforschung,... 3. Mitwirkung im Rahmen...... einer Masterarbeit.... einer Hiwi-Tätigkeit.... eines Master-Projektes Systementwicklung. 4. Und später vielleicht als Mitarbeiter und Doktorand. Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 19/20
Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 20/20 CASED Abschlussarbeiten: Ausschreibungen 1. Ausschreibungen im Themenfeld IT-Sicherheit: www.dasec.h-da.de 2. In Kooperation mit internationalen Partnern: Norwegian Information Security Laboratory Royal Holloway University of London