Modul CS4702-KP06

Computer Security (CoSec)


1 Semester
Turnus of offer:

normally each year in the summer semester
Credit points:

Course of studies, specific field and terms:
  • Master Entrepreneurship in Digital Technologies 2020 (advanced module), technology field computer science, Arbitrary semester
  • Master Media Informatics 2020 (optional subject), computer science, Arbitrary semester
  • Master Medical Informatics 2019 (optional subject), ehealth / infomatics, 1st or 2nd semester
  • Master IT-Security 2019 (optional subject), IT Security and Privacy, 1st, 2nd, or 3rd semester
Classes and lectures:
  • Computer Security (practical course, 3 SWS)
  • Computer Security (lecture, 2 SWS)
  • 75 Hours in-classroom work
  • 85 Hours private studies
  • 20 Hours exam preparation
Contents of teaching:
  • Applied cryptography in systems and protocols: Overview of common methods and their applications
  • Efficient and secure implementation of common crypto procedures: multiple-precision arithmetic, efficient exponentiation, constant time algorithms etc.
  • Physical implementation attacks and countermeasures: Error injection attacks, passive physical attacks such as SPA/DPA and timing attacks, modern inference methods and associated cryptanalysis methods, classes of protective measures
  • Virtualization security and microarchitecture attacks: security concepts in the operating system and hypervisor, microarchitecture attacks such as cache attacks, spectre, etc., measures to restore system security
  • Trusted computing and hardware-assisted system security: How TPMs, Secure Elements and Trusted Execution work environments, basics and cryptographic techniques, design basics for secure systems
  • The students can demonstrate a deep understanding of cryptographic methods and their applications in communication systems.
  • They can construct secure and efficient cryptographic primitives and implement them securely in computer systems.
  • They can explain methods and algorithms for efficient multiple-precision arithmetic.
  • They can perform basic side-channel attacks on systems with physical access or shared systems with code execution rights.
  • They can implement protection against specific physical attacks for cryptographic primitives.
  • They can evaluate the security of existing primitives.
Grading through:
  • Viva Voce or test
  • written homework
Responsible for this module:
  • S. Mangard, E. Oswald & T. Popp: Power analysis attacks: Revealing the secrets of smart cards - Vol. 31, Springer Science & Business Media, 2008
  • D. Stinson: Cryptography: Theory and Practice - 4th ed., CRC Press, 2018
  • : Recent literature
  • English, except in case of only German-speaking participants

Admission requirements for taking the module:
- None (the competencies of the modules listed under

Letzte Änderung: