Website
Curriculum

Modul CS4506-KP12, CS4506

Information and Communication Security (SDK)

Duration:


2 Semester
Turnus of offer:


each year, can be started in winter or summer semester
Credit points:


12
Course of studies, specific field and terms:
  • Master Entrepreneurship in Digital Technologies 2020 (advanced module), technology field computer science, Arbitrary semester
  • Master Computer Science 2019 (optional subject), advanced module, Arbitrary semester
  • Master Computer Science 2014 (compulsory), specialization field IT security and safety, 1st and 2nd semester
  • Master Entrepreneurship in Digital Technologies 2014 (advanced module), technology field computer science, 2nd and 3rd semester
  • Master Computer Science 2014 (advanced module), advanced curriculum, 2nd and 3rd semester
Classes and lectures:
  • Modeling and Analysing Security (exercise, 1 SWS)
  • Modeling and Analysing Security (practical course, 1 SWS)
  • Modeling and Analysing Security (seminar, 3 SWS)
  • Cryptographic Protocols (exercise, 1,5 SWS)
  • Cryptographic Protocols (lecture, 3 SWS)
Workload:
  • 150 Hours in-classroom work
  • 40 Hours exam preparation
  • 170 Hours private studies
Contents of teaching:
  • see module parts CS4211T and CS4210T
  • Modelling and formalizing protocols and security properties
  • Adversaries and models of attacks, security pitfalls
  • Symbolic methods and automatic verification of security properties
  • Consistency and synchronization
Qualification-goals/Competencies:
  • The students can comprehensively explain the security challenges of of digital communication.
  • They can reason about cryptographic methods and their application in communication systems.
  • The are able to select suitable security primitives for given applications and to implement them.
  • The can conduct a security analysis of communication protocols.
  • They can designate the weaknesses of real systems and evaluate them.
  • The students can comprehensively elaborate on algorithmic basics for IT security.
  • They can report on security properties.
  • They can recite complex methods for IT security and apply them.
  • They are able to specify, analyse and verify protocols and security properties.
  • They can describe techniques for automatic verification of security properties.
Grading through:
  • Oral examination
Requires:
Responsible for this module:
Teachers:
Literature:
  • V. Cortier, S. Kremer (Ed.): Formal Models and Techniques for Analyzing Security Protocols - Cryptology and Information Security Series 5, IOS Press, 2011
  • C. Pfleeger, S. Pfleeger: Security in Computing - Prentice-Hall 2007
  • A. Joux: Algorithmic Cryptanalysis - CRC Press 2009
  • J. Katz, Y. Lindell: Introduction to Modern Cryptography - CRC Press 2014
  • S. Loepp, W. Wootters: Protecting Information - Cambridge Univ. Press 2006
  • Lindell: Tutorials on the Foundations of Cryptography - Springer 2017
  • Goldreich: Fundamentals of Cryptography - Cambridge Univ. Press 2004
  • I. Cox, M. Miller, J. Bloom, J. Fridrich, T. Kalkerm: Digital Watermarking and Steganography - Morgan Kaufmann 2008
  • Dwork, Roth: The Algorithmic Foundations of Differential Privacy - 2014
Language:
  • English, except in case of only German-speaking participants
Notes:

Prerequisites for attending the module:
- None

Prerequisites for the exam:
- Successful completion of homework and project assignments during the semester

Letzte Änderung:
5.8.2021