Security Protocols and Infrastructures. Chapter 0: Formalities and Contents



Similar documents
Netzwerksicherheit [NetSec] Systemsicherheit [SysSec]

Cryptography and Key Management Basics

SE 4472a / ECE 9064a: Information Security

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

CSCI 4541/6541: NETWORK SECURITY

(Part 2) Lunch Block 7 1:05 PM 2:27 PM

GT 6.0 GSI C Security: Key Concepts

F21CN: Computer Network Security: Overview

Module 7 Security CS655! 7-1!

Long term electronic signatures or documents retention

CRIPT - Cryptography and Network Security

ECCA 2014 Conference Santander

Computer Security: Principles and Practice

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

I N F O R M A T I O N S E C U R I T Y

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Software Tool for Implementing RSA Algorithm

National Security Agency Perspective on Key Management

VoIP Security. Seminar: Cryptography and Security Michael Muncan

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

I N F O R M A T I O N S E C U R I T Y

Network Security Course Specifications

A Taxonomy of Single Sign-On Systems

Preventing fraud in epassports and eids

SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

Public Key Infrastructure (PKI)

CS 758: Cryptography / Network Security

Public Key Cryptography in Practice. c Eli Biham - May 3, Public Key Cryptography in Practice (13)

SUMMER TIMETABLE CAMBRIDGE

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

Systematization of Knowledge Lessons Learned From SSL/TLS Attacks

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring Nitesh Saxena Polytechnic University

An Introduction to Digital Signature Schemes

Applying Cryptography as a Service to Mobile Applications

INFORMATION SECURITY A MULTIDISCIPLINARY. Stig F. Mjolsnes INTRODUCTION TO. Norwegian University ofscience & Technology. CRC Press

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

A Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract

A SOFTWARE COMPARISON OF RSA AND ECC

How To Protect Your Network From Attack

Wireless Mobile Internet Security. 2nd Edition

Key Management and Distribution

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Case Studies. National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system

Lecture VII : Public Key Infrastructure (PKI)

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

Cryptography and Network Security Chapter 14

Network Security SWISS GERMAN UNIVERSITY. Administration Charles Lim

NIST Test Personal Identity Verification (PIV) Cards

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

IT Networks & Security CERT Luncheon Series: Cryptography

Advanced Topics in Cryptography and Network Security

PKCS. PKCS: Public Key Cryptography Standards. Apple, Digital, Lotus, Microsoft, MIT, Northern Telecom, Novell, Sun

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

CSci 4211: Data Communications and Computer Networks. Time: Tuesday and Thursday 8:15 to 9:30 am Location: Phyics 170 Spring 2015, 3 Credits

Key Management and Distribution

CS 392/681 - Computer Security

HTTPS is Fast and Hassle-free with CloudFlare

A Simulation Game for Teaching Secure Data Communications Protocols

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Concept for a cryptographic infrastructure for measurement components in smart grids

PKCS. PKCS: Public Key Cryptography Standards

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

DEPARTMENT OF DEFENSE ONLINE CERTIFICATE STATUS PROTOCOL RESPONDER INTEROPERABILITY MASTER TEST PLAN VERSION 1.0

CRYPTOGRAPHY AS A SERVICE

TLS-RSA-PSK. Channel Binding using Transport Layer Security with Pre Shared Keys

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

Number Theory and Cryptography using PARI/GP

MSc Computer Security & Resilience Steve Riddle Degree Programme Director

How To Understand And Understand The Security Of A Key Infrastructure

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

CS 356 Lecture 28 Internet Authentication. Spring 2013

Authentication Applications

Introduction to Network Security Key Management and Distribution

Lectures for the course: Electronic Commerce Technology (IT 60104)

Certificate Authorities and Public Keys. How they work and 10+ ways to hack them.

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Overview. SSL Cryptography Overview CHAPTER 1

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

The New Key Management:

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Cryptography and Network Security Chapter 1

Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi

Online Voting Project. New Developments in the Voting System an Consequently Implemented Improvements in the Representation of Legal Principles.

CSE/EE 461 Lecture 23

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Transcription:

Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 1/20 Security Protocols and Infrastructures Chapter 0: and Contents Nicolas Buchmann (Harald Baier) Hochschule Darmstadt, CASED Winter Term 2014/2015

Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 2/20 Literature CASED

Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 3/20 Literature CASED

Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 4/20 General Remarks 1. Elective module in Master of Computer Science / JIM: Catalogue: Application systems. Applicable for IT-Security track. SWH: 2 lecture + 1 lab + 1 exercise 6 ECTS 2. Time schedule of lecture: Thursday, 4:00 p.m. until 5:30 p.m. Lecture hall D14/3.03. Start: Thursday, 2014-10-09 3. Contact person for lab: Lisa Schehlmann lisa.schehlmann--at--cased.de

Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 5/20 x-y-scheme

Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 6/20 Exercises 1. Every second Tuesday, 12:00 p.m. - 13:30 p.m. 2. Lecture hall: D14/1.03. 3. Voluntary participation (preparation and participation is strongly recommended). 4. 5 exercises (y-weeks) (grey): 4.1 2014-10-28: 1st exercise 4.2 2014-11-11: 2nd exercise 4.3 2014-11-25: 3rd exercise 4.4 2014-12-09: 4th exercise 4.5 2015-01-13: 5th exercise

Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 7/20 Lab 1. Every second Wednesday, 10:15 a.m. until 11:45 a.m. 2. Lecture hall: D14/3.03. 3. You have to pass all labs!!! 4. 5 labs : Please check the OBS or my webpage for the dates

Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 8/20 Teaching Cooperation with TUD 1. Students from TUD: Please fill in the circulating list. 2. Further questions regarding time table, locations,...?

Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 9/20 Literature CASED

Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 10/20 Security Protocols (1/2) Cryptographic Primitives: Security goals Cryptographic base techniques Mathematical foundations of cryptographic primitives Attack models on encryption The Diffie-Hellman key exchange scheme The RSA cryptographic scheme

Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 11/20 Security Protocols (2/2) Security Protocols for electronic ID cards: Basic Access Control Extended Access Control PACE Security Protocols for the Internet: Transport Layer Security

Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 12/20 Security Infrastructures 1. Standards for Security Infrastructures: ASN.1 X.509 and RFC 5280 Public Key Cryptrographic Standard Series 2. PKI of Machine Readable Travel Documents 3. Revocation Mechanisms of X.509 certificates: Certificate Revocation Lists Online Certificate Status Protocol 4. Validation of Signatures and Validity Models

Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 13/20 Time Table (1/3) 2014-10-09: Chapter 0: and Contents Chapter 1: Motivation and Security Goals 2014-10-14 (exercise date): 2014-10-16: Chapter 2: Cryptographic and Mathematical Foundations No lecture 2014-10-23: Chapter 3: The Diffie-Hellman and the RSA Scheme

Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 14/20 Time Table (2/3) 2014-10-30: Chapter 4: Introduction to Abstract Syntax Notation 1 (ASN.1) 2014-11-06 + 2014-11-13: 2014-11-20: Chapter 5: Standards for Security Infrastructures Chapter 6: Extended Validation Certificates and Current Topics 2014-11-27 + 2014-12-04: Chapter 7: Security Protocols for Electronic ID Cards

Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 15/20 Time Table (3/3) 2014-12-11 + 2014-12-18: 2015-01-15: 2015-01-22: Chapter 8: The Transport Layer Security Protocol (TLS) Chapter 9: Security Considerations of TLS and DTLS Chapter 10: Revocation and Validity Models

Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 16/20 Literature Literature CASED

Literature Literature 1. A. Menezes, P. van Oorschoot, S. Vanstone: Handbook of Applied Cryptography, CRC Press, 1997 2. V. Shoup, A Computational Introduction to Number Theory and Algebra, Cambridge University Press, 2008 3. N.P. Smart, Cryptography, An Introduction : Third Edition, 2013 4. David Cooper et.al.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, Request for Comments 5280, May 2008 5. ICAO Document 9303 6. BSI Technical Report TR-03110, www.bsi.bund.de 7. Slides Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 17/20

Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 18/20 CASED Literature CASED

CASED Abschlussarbeiten, Hiwi-Tätigkeiten, Projektmitarbeit 1. Themenschwerpunkte in da/sec: Computerforensik. Botnetzdetektion in Hochverkehrsnetzen. Sicherheitsprotokolle für elektronische Reisedokumente. 2. In diesen Bereichen haben wir interessante Projekte: CASED, OpenC 3 S, iaid, NetFlowBot, FIDELITY, Auftragsforschung,... 3. Mitwirkung im Rahmen...... einer Masterarbeit.... einer Hiwi-Tätigkeit.... eines Master-Projektes Systementwicklung. 4. Und später vielleicht als Mitarbeiter und Doktorand. Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 19/20

Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 20/20 CASED Abschlussarbeiten: Ausschreibungen 1. Ausschreibungen im Themenfeld IT-Sicherheit: www.dasec.h-da.de 2. In Kooperation mit internationalen Partnern: Norwegian Information Security Laboratory Royal Holloway University of London