Information Security

Overview

Lecturers:
Prof. Ueli Maurer, Prof. David Basin

Assistants:
Gregory Demay, Peter Gazi, Dr. Felix Klaedkte, Marko Horvat, Srdjan Marinovic, Dr. Christoph Sprenger

Classes (4V):
Mon  13-15    CAB G 61
Thu   13-15    CAB G 61

Exercises (3U):
Wed at 15-18 in NO E 39
Thu at 15-18 in LFW E 13   and also   at 15-18 in LFW E 15

Credits: 8

Requirements: None

Language: English

Description

The course will survey the principles and methods of information security, along with the discussion of selected applications. This includes the following topics:

  • Foundations of Cryptography
  • Key Management and Trust
  • Security Protocols
  • Access Control and Security Policies
  • Anonymity and Privacy

Course material

Course Material (Login with your nethz username/password.)

Ressources

Literature:

  • Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, 1996 (available online).
  • Dieter Gollmann: Computer Security, Wiley, 2000.
  • Matt Bishop: Computer Security: Art and Science, Addison-Wesley, 2002 (available online for ETH members).
  • William Stallings: Cryptography and Network Security: Principles and Practice (3rd Edition), Prentice Hall, 2002.
  • William Stallings: Network Security Essentials: Applications and Standards (2nd Edition), Pearson, 2003.
  • Ken Thompson: Reflections on trusting trust (available online).
  • Wenbo Mao: Modern Cryptography: Theory & Practice, Prentice Hall, 2004.
JavaScript has been disabled in your browser