Turnus of offer:
each winter semester
Course of studies, specific field and terms:
- Master IT-Security 2019 (optional subject), IT Security and Privacy, 1st, 2nd, or 3rd semester
- Master Medical Informatics 2014 (optional subject), major subject informatics, 1st or 2nd semester
Classes and lectures:
- Modeling and Analysing Security (exercise, 1 SWS)
- Modeling and Analysing Security (practical course, 1 SWS)
- Modeling and Analysing Security (lecture, 3 SWS)
- 20 Hours exam preparation
- 85 Hours private studies and exercises
- 75 Hours in-classroom work
Contents of teaching:
- Modelling and formalizing protocols and security properties
- Adversaries and models of attacks, security pitfalls
- Symbolic methods and automatic verification of security properties
- Consistency and synchronization
- The students can comprehensively elaborate on algorithmic basics for IT security.
- They can report on security properties.
- They can recite complex methods for IT security and apply them.
- They are able to specify, analyse and verify protocols and security properties.
- They can describe techniques for automatic verification of security properties.
Responsible for this module:
- V. Cortier, S. Kremer, editors: Formal Models and Techniques for Analyzing Security Protocols - Cryptology and Information Security Series 5, IOS Press, 2011
- C. P. Pfleeger, S. L. Pfleeger: Security in Computing - Prentice-Hall, 2007
- A. Joux: Algorithmic Cryptanalysis - CRC Press 2009
- J. Katz, Y. Lindell: Introduction to Modern Cryptography - Chapman & Hall 2008
- S. Loepp, W. Wootters: Protecting Information - Cambridge Univ. Press 2006
- English, except in case of only German-speaking participants
Admission requirements for taking the module:
- None (the competencies under
Letzte Änderung: 2.10.2023