Modern Cryptography and Networked Systems Security

Instructors

Prof. Dr.-Ing. Volker Roth

Description

This course gives a modern introduction to cryptography and cryptographic key management, followed by an introduction to cryptographic protocols and their applications in distributed systems security. Mathematical background is developed to the degree reasonable in an introductory class. In addition to the mathematical underpinnings of cryptographic primitives the course also touches on the importance of implementation for a secure system. However, note that this course is not a course on cryptoanalysis.

This semester, the course also includes four three digressive guest lectures on social engineering and espionage techniques, given by an professional expert in the field. See below for further information. If the guest lectures are received well then these lectures will be offered again in the summer semesters as part of the computer security course.

Time and Location

Lectures:

Recitations (Tutorien):

Note: The recitations start in the third week of the semester.

Grading

The grade will be computed as a weighted sum as shown below. Passing the exam is necessary to pass the course.

Active participation requires successful completion of homework assignments and projects and is graded on a pass / no pass basis. At least 50% of the cumulative score is required to pass.

The exam will take place on Thursday March 29th, 2012 from 1pm ct to 3pm in lecture hall 001 of Arnimalle 3 (math department).

About the guest lectures

Description

Technical information security rests on the proper application of security mechanisms with the goal to counter threats to information assets. However, even systems with flawless security mechanisms are vulnerable to attacks that are directed against the human users of a system. The tactics employed range from so-called social engineering to coercion, and they are common tools for intelligence operations and industrial espionage. In this series of guest lectures, we will give an overview over these tactics and categorize them. Subsequently, we illustrate, analyze and discuss how these tactics have been applied in a series of real-world cases.

Speaker

Our guest speaker, the former aviator Christoph Remshagen, worked for nearly two decades in the Military Counterintelligence Service. His speciality was counter-espionage, a field on which he has regularly lectured in front of national and international audiences, including occasions as guest speaker at the School for the Protection of the Constitution. For the past two years, he has been assigned to the Legal Affairs Directorate of the German Federal Ministry of Defense.

Homework

Below are the homework assignments. Each assignment is given on a Monday, and is due on the Monday two weeks later (see exceptions below). You can turn in your assignments at the recitation or at Fabeckstraße 15 before the recitation.

Lectures

No lecture on Tuesday October 18, we begin on Tuesday 25th.

No lecture on Thursday October 20, we begin on Tuesday 25th.

Lecture 1, Tuesday October 25

Topics:

Read: sect. 7.3 of [1]

Lecture 2, Thursday October 27

Topics:

Read: chap. 2 of [2]

Lecture 3, Tuesday November 01

Topics:

Read: chap. 2 of [2]

Lecture 4, Thursday November 03

Topic:

Read: chap. 3 of [2], the anecdote in [3]

Lecture 5, Tuesday November 08

Topics:

Read: chap. 3 of [2], [4]

Lecture 6, Thursday November 10

Guest lecture: Christoph Remshagen

Lecture 7, Tuesday November 15

Topics:

Read: [5], [6], [7], [8], [9]

Lecture 8, Thursday November 17

Topics:

Lecture 9, Tuesday November 29

Guest lecture: Christoph Remshagen

Lecture 10, Tuesday January 17

Topics:

Read: chap. 3 of [2]

Lecture 11, Thursday January 19

Topics:

Read: chap. 3 of [2]

Lecture 12, Tuesday January 24

Guest lecture: Christoph Remshagen

Lecture 13, Thursday January 26

Topics:

Read: chap. 4 of [2]

Lecture 14, Thursday February 02

Topics:

Read: chap. 4 of [2]

Lecture 15, Monday February 6

Topics:

Read: chap. 4 of [2]

Lecture 16, Tuesday February 07

Topics:

Read: chap. 4 of [2]

Lecture 17, Thursday February 09

Topics:

Read: chap. 5 of [2]

Lecture 18, Tuesday February 14

Topics:

Read: chap. 7 of [2]

Lecture 19, Thursday February 16

Topics:

Read: chap. 9 of [2]

Lecture 20, Monday March 05

Topics:

Read: chap. 10 of [2]

Lecture 21, Monday March 05

Topics:

Read: chap. 10 of [2]

Lecture 22, Tuesday March 06

Topics:

Read: chap. 10 of [2]

Lecture 23, Tuesday March 06

Topics:

Read: chap. 12 of [2]

Lecture 24, Wednesday March 07

Topics:

Read: chap. 13 of [2], [10]

Lecture 25, Wednesday March 07

Topics:

Read: sect. 11.3 of [2], [11], [12]

Lecture 26, Thursday March 08

Topics to be determined

Lecture 27, Thursday March 08

Topics to be determined

Lecture 28, Friday March 09

Topics to be determined

Lecture 29, Friday March 09

Topics to be determined

Literature

  1. Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 2001.
  2. Jonathan Katz, Yehuda Lindell. Introduction to Modern Cryptography. Chapman & Hall/CRC, 2008.
  3. R. Morris and K. Thompson. Password security: a case history. Commun. ACM 22, 11 (Nov. 1979), 594-597.
  4. Hongjun Wu, The Misuse of RC4 in Microsoft Word and Excel. IACR e-print number 007, 2005.
  5. Martin Abadi and Roger Needham. Prudent Engineering Practice for Cryptographic Protocols. Digital Equipment Corporation, November 1995.
  6. Loren M. Kohnfelder. Towards a practical public-key cryptosystem. B.Sc. thesis, MIT, May 1978.
  7. Carl M. Ellison. Establishing Identity Without Certification Authorities. In Proc. USENIX Security Symposium, July 1996.
  8. Moxie Marlinspike. Null Prefix Attacks against SSL/TLS Certificates. Published online.
  9. Moxie Marlinspike. Defeating OCSP With the Character '3'. Published online.
  10. Mihir Bellare and Phillip Rogaway. Random Oracles are practical: a paradigm for designing efficient protocols. Proc. ACM Computer and Communications Security, November 1993.
  11. Caroline Fontaine and Fabien Galand. A Survey of Homomorphic Encryption for Nonspecialists. EURASIP Journal on Information Security, October 2007.
  12. Castelluccia, C., Chan, A. C., Mykletun, E., and Tsudik, G. 2009. Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. Sen. Netw. 5, 3 (May. 2009), 1-36.