Duration:
2 Semester | Turnus of offer:
each year, can be started in winter or summer semester | Credit points:
12 |
Course of studies, specific field and terms: - Master Entrepreneurship in Digital Technologies 2020 (advanced module), technology field computer science, Arbitrary semester
- Master Computer Science 2019 (optional subject), advanced module, Arbitrary semester
- Master Computer Science 2014 (compulsory), specialization field IT security and safety, 1st and 2nd semester
- Master Entrepreneurship in Digital Technologies 2014 (advanced module), technology field computer science, 2nd and 3rd semester
- Master Computer Science 2014 (advanced module), advanced curriculum, 2nd and 3rd semester
|
Classes and lectures: - Modeling and Analysing Security (exercise, 1 SWS)
- Modeling and Analysing Security (practical course, 1 SWS)
- Modeling and Analysing Security (seminar, 3 SWS)
- Cryptographic Protocols (exercise, 1,5 SWS)
- Cryptographic Protocols (lecture, 3 SWS)
| Workload: - 150 Hours in-classroom work
- 40 Hours exam preparation
- 170 Hours private studies
| |
Contents of teaching: | - see module parts CS4211T and CS4210T
- Modelling and formalizing protocols and security properties
- Adversaries and models of attacks, security pitfalls
- Symbolic methods and automatic verification of security properties
- Consistency and synchronization
| |
Qualification-goals/Competencies: - The students can comprehensively explain the security challenges of of digital communication.
- They can reason about cryptographic methods and their application in communication systems.
- The are able to select suitable security primitives for given applications and to implement them.
- The can conduct a security analysis of communication protocols.
- They can designate the weaknesses of real systems and evaluate them.
- The students can comprehensively elaborate on algorithmic basics for IT security.
- They can report on security properties.
- They can recite complex methods for IT security and apply them.
- They are able to specify, analyse and verify protocols and security properties.
- They can describe techniques for automatic verification of security properties.
|
Grading through: |
Requires: |
Responsible for this module: Teachers: |
Literature: - V. Cortier, S. Kremer (Ed.): Formal Models and Techniques for Analyzing Security Protocols - Cryptology and Information Security Series 5, IOS Press, 2011
- C. Pfleeger, S. Pfleeger: Security in Computing - Prentice-Hall 2007
- A. Joux: Algorithmic Cryptanalysis - CRC Press 2009
- J. Katz, Y. Lindell: Introduction to Modern Cryptography - CRC Press 2014
- S. Loepp, W. Wootters: Protecting Information - Cambridge Univ. Press 2006
- Lindell: Tutorials on the Foundations of Cryptography - Springer 2017
- Goldreich: Fundamentals of Cryptography - Cambridge Univ. Press 2004
- I. Cox, M. Miller, J. Bloom, J. Fridrich, T. Kalkerm: Digital Watermarking and Steganography - Morgan Kaufmann 2008
- Dwork, Roth: The Algorithmic Foundations of Differential Privacy - 2014
|
Language: - English, except in case of only German-speaking participants
|
Notes:Prerequisites for attending the module: - None Prerequisites for the exam: - Successful completion of homework and project assignments during the semester |
Letzte Änderung: 5.8.2021 |
für die Ukraine