Information Security

Spring semester 2014 (252-0211-00L)

Overview

Lecturers:
Prof. Srdjan Capkun (Part I), Prof. Adrian Perrig (Part II)

Assistants:
Dr. Srdjan Marinovic, Dr. Claudio Soriente

Lectures:
Thu  13-15    CAB G 61
Fri    13-15    CAB G 61

Exercises:
Wed  15-18    HG F 26.5
Wed  15-18    NO E 39
Thu   15-18    LFW E 13
Thu 15-18 LFW E 15

Credits: 8 ECTS (4V + 3U)

Requirements: None

Language: English

Annoucements

  • 02.18.2014 - No exercise sessions during the first week.
    There will be no exercise sessions on Wed 19.02 and Thur 20.02. The first exercise sessions will take place on Wed 26.02. For this session we would ask all students who are planning to attend the session, to come to HG F 26.5.

Description

This course provides an introduction to Information Security. The focus is on fundamental concepts and models, basic cryptography, protocols and system security, and privacy and data protection. While the emphasis is on foundations, case studies will be given that examine different realizations of these ideas in practice.

Resources

Literature

  • Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, 1996 (available online).
  • Dieter Gollmann: Computer Security, Wiley, 2000.
  • Matt Bishop: Computer Security: Art and Science, Addison-Wesley, 2002 (available online for ETH members).
  • Jonathan Katz and Yehuda Lindell, Introduction to Modern Cryptography, Chapman & Hall, 2008
  • Charlie Kaufman, Rhadia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World, 2nd Edition, 2002.
  • William Stallings: Cryptography and Network Security: Principles and Practice, 3rd Edition, Prentice Hall, 2002.
  • William Stallings: Network Security Essentials: Applications and Standards, 2nd Edition, Pearson, 2003.
  • Ken Thompson: Reflections on trusting trust (available online).
  • Wenbo Mao: Modern Cryptography: Theory & Practice, Prentice Hall, 2004.

Course material

The lecture notes, exercises, slides, and other resources is available in our protected pagesecured area (login with your nethz credentials).

JavaScript has been disabled in your browser