Information Security
Overview
Lecturers:
Prof. Ueli Maurer, Prof. David Basin
Assistants:
Gregory Demay, Peter Gazi, Dr. Felix Klaedkte, Marko Horvat, Srdjan Marinovic, Dr. Christoph Sprenger
Classes (4V):
Mon 13-15 CAB G 61
Thu 13-15 CAB G 61
Exercises (3U):
Wed at 15-18 in NO E 39
Thu at 15-18 in LFW E 13 and also at 15-18 in LFW E 15
Credits: 8
Requirements: None
Language: English
Description
The course will survey the principles and methods of information security, along with the discussion of selected applications. This includes the following topics:
- Foundations of Cryptography
- Key Management and Trust
- Security Protocols
- Access Control and Security Policies
- Anonymity and Privacy
Course material
Course Material (Login with your nethz username/password.)
Ressources
Literature:
- Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, 1996 (available online).
- Dieter Gollmann: Computer Security, Wiley, 2000.
- Matt Bishop: Computer Security: Art and Science, Addison-Wesley, 2002 (available online for ETH members).
- William Stallings: Cryptography and Network Security: Principles and Practice (3rd Edition), Prentice Hall, 2002.
- William Stallings: Network Security Essentials: Applications and Standards (2nd Edition), Pearson, 2003.
- Ken Thompson: Reflections on trusting trust (available online).
- Wenbo Mao: Modern Cryptography: Theory & Practice, Prentice Hall, 2004.