Module CS4506-KP12, CS4506

Information and Communication Security (SDK)


Duration

2 Semester

Turnus of offer

each year, can be started in winter or summer semester

Credit points

12

Course of studies, specific fields and terms:

  • Master Entrepreneurship in Digital Technologies 2020, advanced module, specific
  • Master Computer Science 2019, optional subject, advanced module
  • Master Computer Science 2014, compulsory, specialization field IT security and safety
  • Master Entrepreneurship in Digital Technologies 2014, advanced module, specific
  • Master Computer Science 2014, advanced module, advanced curriculum

Classes and lectures:

  • Modeling and Analysing Security (exercise, 1 SWS)
  • Modeling and Analysing Security (practical course, 1 SWS)
  • Modeling and Analysing Security (seminar, 3 SWS)
  • Cryptographic Protocols (exercise, 1.5 SWS)
  • Cryptographic Protocols (lecture, 3 SWS)

Workload:

  • 170 hours private studies
  • 40 hours exam preparation
  • 150 hours in-classroom work

Contents of teaching:

  • see module parts CS4211T and CS4210T
  • Modelling and formalizing protocols and security properties
  • Adversaries and models of attacks, security pitfalls
  • Symbolic methods and automatic verification of security properties
  • Consistency and synchronization

Qualification-goals/Competencies:

  • The students can comprehensively explain the security challenges of of digital communication.
  • They can reason about cryptographic methods and their application in communication systems.
  • The are able to select suitable security primitives for given applications and to implement them.
  • The can conduct a security analysis of communication protocols.
  • They can designate the weaknesses of real systems and evaluate them.
  • The students can comprehensively elaborate on algorithmic basics for IT security.
  • They can report on security properties.
  • They can recite complex methods for IT security and apply them.
  • They are able to specify, analyse and verify protocols and security properties.
  • They can describe techniques for automatic verification of security properties.

Grading through:

  • Oral examination

Responsible for this module:

Literature:

  • V. Cortier, S. Kremer (Ed.) : Formal Models and Techniques for Analyzing Security Protocols Cryptology and Information Security Series 5, IOS Press, 2011
  • C. Pfleeger, S. Pfleeger : Security in Computing Prentice-Hall 2007
  • A. Joux : Algorithmic Cryptanalysis CRC Press 2009
  • J. Katz, Y. Lindell : Introduction to Modern Cryptography CRC Press 2014
  • S. Loepp, W. Wootters : Protecting Information Cambridge Univ. Press 2006
  • Lindell : Tutorials on the Foundations of Cryptography Springer 2017
  • Goldreich : Fundamentals of Cryptography Cambridge Univ. Press 2004
  • I. Cox, M. Miller, J. Bloom, J. Fridrich, T. Kalkerm : Digital Watermarking and Steganography Morgan Kaufmann 2008
  • Dwork, Roth : The Algorithmic Foundations of Differential Privacy 2014

Language:

  • English, except in case of only German-speaking participants

Notes:

Prerequisites for attending the module:
- None

Prerequisites for the exam:
- Successful completion of homework and project assignments during the semester

Last Updated:

06.01.2025