Module CS4506-KP12, CS4506
Information and Communication Security (SDK)
Duration
2 Semester
Turnus of offer
each year, can be started in winter or summer semester
Credit points
12
Course of studies, specific fields and terms:
- Master Entrepreneurship in Digital Technologies 2020, advanced module, specific
- Master Computer Science 2019, optional subject, advanced module
- Master Computer Science 2014, compulsory, specialization field IT security and safety
- Master Entrepreneurship in Digital Technologies 2014, advanced module, specific
- Master Computer Science 2014, advanced module, advanced curriculum
Classes and lectures:
- Modeling and Analysing Security (exercise, 1 SWS)
- Modeling and Analysing Security (practical course, 1 SWS)
- Modeling and Analysing Security (seminar, 3 SWS)
- Cryptographic Protocols (exercise, 1.5 SWS)
- Cryptographic Protocols (lecture, 3 SWS)
Workload:
- 170 hours private studies
- 40 hours exam preparation
- 150 hours in-classroom work
Contents of teaching:
- see module parts CS4211T and CS4210T
- Modelling and formalizing protocols and security properties
- Adversaries and models of attacks, security pitfalls
- Symbolic methods and automatic verification of security properties
- Consistency and synchronization
Qualification-goals/Competencies:
- The students can comprehensively explain the security challenges of of digital communication.
- They can reason about cryptographic methods and their application in communication systems.
- The are able to select suitable security primitives for given applications and to implement them.
- The can conduct a security analysis of communication protocols.
- They can designate the weaknesses of real systems and evaluate them.
- The students can comprehensively elaborate on algorithmic basics for IT security.
- They can report on security properties.
- They can recite complex methods for IT security and apply them.
- They are able to specify, analyse and verify protocols and security properties.
- They can describe techniques for automatic verification of security properties.
Grading through:
- Oral examination
Responsible for this module:
Literature:
- V. Cortier, S. Kremer (Ed.) : Formal Models and Techniques for Analyzing Security Protocols Cryptology and Information Security Series 5, IOS Press, 2011
- C. Pfleeger, S. Pfleeger : Security in Computing Prentice-Hall 2007
- A. Joux : Algorithmic Cryptanalysis CRC Press 2009
- J. Katz, Y. Lindell : Introduction to Modern Cryptography CRC Press 2014
- S. Loepp, W. Wootters : Protecting Information Cambridge Univ. Press 2006
- Lindell : Tutorials on the Foundations of Cryptography Springer 2017
- Goldreich : Fundamentals of Cryptography Cambridge Univ. Press 2004
- I. Cox, M. Miller, J. Bloom, J. Fridrich, T. Kalkerm : Digital Watermarking and Steganography Morgan Kaufmann 2008
- Dwork, Roth : The Algorithmic Foundations of Differential Privacy 2014
Language:
- English, except in case of only German-speaking participants
Notes:
Prerequisites for attending the module:- None
Prerequisites for the exam:
- Successful completion of homework and project assignments during the semester
Last Updated:
06.01.2025