direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Logo der TU Berlin

VL Communication Network Security

Modul: Communication Network Security (BINF-KT-CNS)
Semester: Sommersemester 2012
Art: VL (2 SWS / 3 LP)
LV-Nr.: 0435 L 768
Veranstalter: Albayrak, Camtepe
Raum und Zeit: Mo. 10 - 12, ab 23.04., TEL 1315

---

Diese Veranstaltung wird online mit ISIS durchgeführt Bitte melden Sie sich dort an!

This course will be in English / German!

--- 

Ihre Anmeldung ist zunächst unverbindlich.
Infos zur Anmeldung, zum Einloggen finden sich hier.

Course Details

This is a Bachelor degree lecture to introduce basic cryptographic methods and tools for securing communications networks. Class will cover topics from number theory and basic cryptography to communications protocol security. It is a hybrid course since it will have sufficient depth in theory as well as hands-on experience with the network protocols. After completion of this module students will have basic knowledge and experience in cryptographic methods and their theoretical background as well as in state of the art security problems and solutions for communications networks.

Language: English

Offered: Every Summer Semester

Trainer: Dr. Seyit Ahmet Camtepe

Office: TEL 1409 (Ernst-Reuter-Platz 7)

Office Hours: Wednesday 10:00AM – 12:00AM (Tentative)

Textbook: Following textbooks will be used in this class. Textbooks will be only the starting point for majority of topics that we will cover. The slides used will cover ideas from a broad range of sources including other books, papers, standard etc.

  • Cryptography and Network Security, Ed. 4, by William Stallings
  • Cryptography: Theory and Practice, Ed. 3 by Douglas R. Stinson
  • Cryptography Demystified, by John E. Hershey
  • Malicious Cryptography - Exposing Cryptovirology, by A. L. Young & M.Yung
  • Various Conference Papers, Journals, Standard Specifications and RFCs

Grading: Exam at the end of semester will form ~60% of the lecture grade. Remaining ~40% of the lecture grade will be decided from overall course participation and a few assignments.

Prerequisites: Students required to have basic understanding of Computer Communications Networks, basic understanding of Operating Systems, and knowledge of a programming language (Java, C, C++, Perl).

Assignments: There will be few assignments that can be completed with the materials covered in class.

A tentative outline of topics that will be covered in this lecture are as follows:

Week 1: (Monday, April 18, 2011)

Topics: Introduction (Attacks, Services, Mechanisms)

Materials: Chapter 1 (Cryptography and Network Security, Ed. 4, by William Stallings)

 

Week 2: (Monday, April 25, 2011) (Easter Monday - No Class)

 

Week 3: (Monday, May 2, 2011)

Topics: Classical Encryption and Cryptanalysis

Materials:

  • Chapter 2 (Cryptography and Network Security, Ed. 4, by William Stallings)
  • Chapter 1 (Cryptography: Theory and Practice, Ed. 3 by Douglas R. Stinson)

 

Week 4: (Monday, May 9, 2011)

Topics: Theoretical Foundations: Shannon's Theory

Materials: Chapter 2 (Cryptography: Theory and Practice, Ed. 3 by Douglas R. Stinson)

 

Week 5: (Monday, May 16, 2011)

Topics: Block Ciphers: DES, 3DES, AES and Modes

Materials:

  • Chapters 3 and 5 (Cryptography and Network Security, Ed. 4, by William Stallings)
  • Chapter 3 (Cryptography: Theory and Practice, Ed. 3 by Douglas R. Stinson)

 

Week 6: (Monday, May 23, 2011)

Topics: Stream Ciphers, PRNG, Key Management

Materials: Chapters 6 and 7 (Cryptography and Network Security, Ed. 4, by William Stallings)

 

Week 7: (Monday, May 30, 2011)

Topics: Cryptographic Hash Functions, Symmetric Cryptography Applications in Communications Networks (WLAN Security)

Materials:

  • Chapter 12 (Cryptography and Network Security, Ed. 4, by William Stallings)
  • Chapter 4 (Cryptography: Theory and Practice, Ed. 3 by Douglas R. Stinson)

 

Week 8: (Monday, June 6, 2011)

Topics: Symmetric Cryptography Applications in Communications Networks (IPSEC, Kerberos)

Materials:

  • Chapter 14 and 16 (Cryptography and Network Security, Ed. 4, by William Stallings)

 

Week 9: (Monday, June 13, 2011) (Pfingstmontag - No Class)

 

Week 10: (Monday, June 20, 2011)

Topics: Asymmetric Cryptography: RSA, PKC, Number Theory

Materials:

  • Chapter 8 and 9 (Cryptography and Network Security, Ed. 4, by William Stallings)
  • Chapters 5 and 6 (Cryptography: Theory and Practice, Ed. 3 by Douglas R. Stinson)
  • Cryptography Demystified, by John E. Hershey

 

Week 11: (Monday, June 27, 2011)

Topics: Diffie-Hellman, ElGamal, Elliptic Curves, Digital Signature Standard

Materials:

  • Chapter 10 (Cryptography and Network Security, Ed. 4, by William Stallings)
  • Chapter 6 (Cryptography: Theory and Practice, Ed. 3 by Douglas R. Stinson)

 

Week 12: (Monday, July 4, 2011)

Topics: Digital Signatures, Authnetication, Certificates, SSL, TLS, SET

Materials:

  • Chapters 13, 14 and 17 (Cryptography and Network Security, Ed. 4, by William Stallings)
  • Chapter 9 and 12 (Cryptography: Theory and Practice, Ed. 3 by Douglas R. Stinson)

 

Week 13: (Monday, July 11, 2011)

Topics: PGP, S-MIME, ID-Based Cryptography

Materials:

  • Chapters 15 (Cryptography and Network Security, Ed. 4, by William Stallings)
  • Chapter 12 (Cryptography: Theory and Practice, Ed. 3 by Douglas R. Stinson)

 

Week 14: (Monday, July 18, 2011)

Topics: ID-Based Cryptography, Secret Sharing, Malicious Cryptography

Materials:

  • Chapter 13 (Cryptography: Theory and Practice, Ed. 3 by Douglas R. Stinson)
  • Malicious Cryptography - Exposing Cryptovirology, by A. L. Young & M.Yung

Take-Home Exam: TBD