Module CS4702-KP06
Computer Security (CoSec)
Duration
1 Semester
Turnus of offer
normally each year in the summer semester
Credit points
6
Course of studies, specific fields and terms:
- Master Robotics and Autonomous Systems 2019, optional subject, Additionally recognized elective module
- Master Entrepreneurship in Digital Technologies 2020, advanced module, specific
- Master Media Informatics 2020, optional subject, computer science
- Master Medical Informatics 2019, optional subject, ehealth / infomatics
- Master IT-Security 2019, optional subject, IT Security and Privacy
Classes and lectures:
- Computer Security (practical course, 3 SWS)
- Computer Security (lecture, 2 SWS)
Workload:
- 20 hours exam preparation
- 85 hours private studies
- 75 hours in-classroom work
Contents of teaching:
- Applied cryptography in systems and protocols: Overview of common methods and their applications
- Efficient and secure implementation of common crypto procedures: multiple-precision arithmetic, efficient exponentiation, constant time algorithms etc.
- Physical implementation attacks and countermeasures: Error injection attacks, passive physical attacks such as SPA/DPA and timing attacks, modern inference methods and associated cryptanalysis methods, classes of protective measures
- Virtualization security and microarchitecture attacks: security concepts in the operating system and hypervisor, microarchitecture attacks such as cache attacks, spectre, etc., measures to restore system security
- Trusted computing and hardware-assisted system security: How TPMs, Secure Elements and Trusted Execution work environments, basics and cryptographic techniques, design basics for secure systems
Qualification-goals/Competencies:
- The students can demonstrate a deep understanding of cryptographic methods and their applications in communication systems.
- They can construct secure and efficient cryptographic primitives and implement them securely in computer systems.
- They can explain methods and algorithms for efficient multiple-precision arithmetic.
- They can perform basic side-channel attacks on systems with physical access or shared systems with code execution rights.
- They can implement protection against specific physical attacks for cryptographic primitives.
- They can evaluate the security of existing primitives.
Grading through:
- Viva Voce or test
- written homework
Requires:
Responsible for this module:
Literature:
- S. Mangard, E. Oswald & T. Popp : Power analysis attacks: Revealing the secrets of smart cards Vol. 31, Springer Science & Business Media, 2008
- D. Stinson : Cryptography: Theory and Practice 4th ed., CRC Press, 2018
- : Recent literature
Language:
- English, except in case of only German-speaking participants
Notes:
Admission requirements for taking the module:- None (the competencies under
Last Updated:
06.01.2025