Information Security

Spring semester 2015 (252-0211-00L)

Overview

Lecturers:
Prof. Srdjan Capkun (Part I), Prof. David Basin (Part II)

Assistants:
Part I: Dr. Kari Kostiainen, Arthur Gervais

Part II: Carlos Cotrini Jimenez, Dr. Ralf Sasse, Lara Schmid

Lectures:
Thu  13-15    CAB G 61
Fri    13-15    CAB G 61

Exercises:
Wed  15-18    HG F 26.5
Thu   15-18    ML F 36

Credits: 8 ECTS (4V + 3U)

Requirements: None

Language: English

Announcements

  • 19.02.2016 - No exercise sessions during the first week.
    There will be no exercise sessions during the first week. The first exercise sessions will take place on Wed 02.03.
  • 18.04.2016 - No exercise sessions during this week.
    There will be no exercise sessions during this week. The next exercise sessions will take place on Wed 27.04.
  • 18.04.2016 -  You can hand in exercises to receive feedback for part II of the course. Exercises will be published Wednesdays, solutions the following Thursday (after the exercise sessions).
  • 30.05.2016 -  There will be a Questions&Answers session one week before the exam, on Thursday, August 4th, starting at 09:00 in CAB G61. Do note that if there are no questions, there will be no answers. You can also hand in questions beforehand by mail or in our dropbox.

 

Hand in exercises

You can hand in your solutions to the exercises to receive feedback from the tutors. Solutions can be submitted in two ways. The first way is to e-mail Ralf Sasse. Please put [InfSec] in the subject of the message. The second way is to drop off your solution in the drop box opposite of CNB F 101. In that case, please mark which exercise session (Wednesday/Thursday) you plan to attend.  Solutions must be received by 23:59 on the Monday after the exercise is published, in order to receive feedback.

Description

This course provides an introduction to Information Security. The focus is on fundamental concepts and models, basic cryptography, protocols and system security, and privacy and data protection. While the emphasis is on foundations, case studies will be given that examine different realizations of these ideas in practice.

Resources

Literature

  • Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, 1996 (available online).
  • Dieter Gollmann: Computer Security, Wiley, 2000.
  • Matt Bishop: Computer Security: Art and Science, Addison-Wesley, 2002 (available online for ETH members).
  • Jonathan Katz and Yehuda Lindell, Introduction to Modern Cryptography, Chapman & Hall, 2008
  • Charlie Kaufman, Rhadia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World, 2nd Edition, 2002.
  • William Stallings: Cryptography and Network Security: Principles and Practice, 3rd Edition, Prentice Hall, 2002.
  • William Stallings: Network Security Essentials: Applications and Standards, 2nd Edition, Pearson, 2003.
  • Ken Thompson: Reflections on trusting trust (available online).
  • Wenbo Mao: Modern Cryptography: Theory & Practice, Prentice Hall, 2004.

Course Material

The lecture notes, exercises, slides, and other resources are available in our protected pagesecured area (log in at the top of the page first!).

Please login first at the top right corner of the page.

JavaScript has been disabled in your browser