Information Security

Spring semester 2015 (252-0211-00L)

Overview

Lecturers:
Prof. Srdjan Capkun (Part I), Prof. David Basin (Part II)

Assistants:
Part I: Dr. Kari Kostiainen, Dr. Claudio Soriente

Part II: Carlos Cotrini Jimenez, Marco Guarnieri, Dr. Ralf Sasse

Lectures:
Thu  13-15    CAB G 61
Fri    13-15    CAB G 61

Exercises:
Wed  15-18    HG F 26.5
Thu   15-18    ML F 36

Credits: 8 ECTS (4V + 3U)

Requirements: None

Language: English

Announcements

  • 18.02.2015 - No exercise sessions during the first week.
    There will be no exercise sessions on Wed 18.02. and Thur 19.02. The first exercise sessions will take place on Wed 25.02. For this session we would ask all students who are planning to attend the session, to come to HG F 26.5.
  • 30.03.2015 - No exercise sessions during this week.
    On Thursday 02.04 we will have the last lecture for the first part of the course. During the second half of that lecture we will have a Q&A session and we will also go over the last set of exercises. Therefore the exercise sessions for the current week (Wednesday 01.04 and Thursday 02.04) are cancelled.
  • 13.04.2015 - No exercise sessions during this week.
    There will be no exercise sessions on Wednesday 15.04 and on Thursday 16.04.
  • 15.04.2015 - Exercise sessions for part II start next week, April 22/23. One new type of session is available!
    We offer an additional Wednesday session (in HG D 3.3) where students shall present their solution (with help from our assistant). Attendance at this session is only recommended if you have done the exercises and are willing to present your work.
  • 29.05.2015 - guest speaker from Industry: Dr. Patrick Schaller from Raiffeisen Bank, Schweiz will talk about challenges in web security from the banking perspective. Title: Architectural Challenges in Modern, Security Critical Web Platforms
  • 29.05.2015 - Q&A session.
    There will be a Q&A session in CAB G61 on Thursday, 30.07., from 9.30-12.00, or until all questions are answered.

Description

This course provides an introduction to Information Security. The focus is on fundamental concepts and models, basic cryptography, protocols and system security, and privacy and data protection. While the emphasis is on foundations, case studies will be given that examine different realizations of these ideas in practice.

Resources

Literature

  • Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, 1996 (available online).
  • Dieter Gollmann: Computer Security, Wiley, 2000.
  • Matt Bishop: Computer Security: Art and Science, Addison-Wesley, 2002 (available online for ETH members).
  • Jonathan Katz and Yehuda Lindell, Introduction to Modern Cryptography, Chapman & Hall, 2008
  • Charlie Kaufman, Rhadia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World, 2nd Edition, 2002.
  • William Stallings: Cryptography and Network Security: Principles and Practice, 3rd Edition, Prentice Hall, 2002.
  • William Stallings: Network Security Essentials: Applications and Standards, 2nd Edition, Pearson, 2003.
  • Ken Thompson: Reflections on trusting trust (available online).
  • Wenbo Mao: Modern Cryptography: Theory & Practice, Prentice Hall, 2004.

Course Material

The lecture notes, exercises, slides, and other resources are available in our protected pagesecured area.

JavaScript has been disabled in your browser