Information Security

Spring semester 2013 (252-0211-00L)

Overview

Lecturers:
Dr. Christoph Sprenger (Part I), Prof. David Basin (Part II)

Assistants:
Gregory Demay, Peter Gazi, Dr. Srdjan Marinovic, Dr. Sasa Radomirovic, Dr. Ralf Sasse

Classes (4V):
Mon  13-15    CAB G 61
Thu   13-15    CAB G 61

Exercises (3U):
Wed  15-18    HG F26.5
Thu   15-18    LFW E 13 and LFW E 15

Credits: 8 ECTS (4V + 3U)

Requirements: None

Language: English

Annoucements

  • On Mar 18, we will have a PGP tutorial instead of the lecture (in CAB G 61). Please bring your laptops with GnuPG 2.0 or higher installed.

Description

The course will survey the principles and methods of information security, along with the discussion of selected applications. This includes the following topics:

  • Foundations of Cryptography
  • Key Management and Trust
  • Security Protocols
  • Access Control and Security Policies
  • Anonymity and Privacy

Course material

The course material is available on a separate page (use your nethz login/passwd).

Ressources

Literature

  • Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, 1996 (available online).
  • Dieter Gollmann: Computer Security, Wiley, 2000.
  • Matt Bishop: Computer Security: Art and Science, Addison-Wesley, 2002 (available online for ETH members).
  • Jonathan Katz and Yehuda Lindell, Introduction to Modern Cryptography, Chapman & Hall, 2008
  • Charlie Kaufman, Rhadia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World, 2nd Edition, 2002.
  • William Stallings: Cryptography and Network Security: Principles and Practice, 3rd Edition, Prentice Hall, 2002.
  • William Stallings: Network Security Essentials: Applications and Standards, 2nd Edition, Pearson, 2003.
  • Ken Thompson: Reflections on trusting trust (available online).
  • Wenbo Mao: Modern Cryptography: Theory & Practice, Prentice Hall, 2004.
JavaScript has been disabled in your browser