Information Security
Spring semester 2015 (252-0211-00L)
Overview
Lecturers:
Prof. Srdjan Capkun (Part I), Prof. David Basin (Part II)
Assistants:
Part I: Dr. Kari Kostiainen, Arthur Gervais
Part II: Carlos Cotrini Jimenez, Dr. Ralf Sasse, Lara Schmid
Lectures:
Thu 13-15 CAB G 61
Fri 13-15 CAB G 61
Exercises:
Wed 15-18 HG F 26.5
Thu 15-18 ML F 36
Credits: 8 ECTS (4V + 3U)
Requirements: None
Language: English
Announcements
- 19.02.2016 - No exercise sessions during the first week.
There will be no exercise sessions during the first week. The first exercise sessions will take place on Wed 02.03. - 18.04.2016 - No exercise sessions during this week.
There will be no exercise sessions during this week. The next exercise sessions will take place on Wed 27.04. - 18.04.2016 - You can hand in exercises to receive feedback for part II of the course. Exercises will be published Wednesdays, solutions the following Thursday (after the exercise sessions).
- 30.05.2016 - There will be a Questions&Answers session one week before the exam, on Thursday, August 4th, starting at 09:00 in CAB G61. Do note that if there are no questions, there will be no answers. You can also hand in questions beforehand by mail or in our dropbox.
Hand in exercises
You can hand in your solutions to the exercises to receive feedback from the tutors. Solutions can be submitted in two ways. The first way is to e-mail Ralf Sasse. Please put [InfSec] in the subject of the message. The second way is to drop off your solution in the drop box opposite of CNB F 101. In that case, please mark which exercise session (Wednesday/Thursday) you plan to attend. Solutions must be received by 23:59 on the Monday after the exercise is published, in order to receive feedback.
Description
This course provides an introduction to Information Security. The focus is on fundamental concepts and models, basic cryptography, protocols and system security, and privacy and data protection. While the emphasis is on foundations, case studies will be given that examine different realizations of these ideas in practice.
Resources
Literature
- Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, 1996 (available online).
- Dieter Gollmann: Computer Security, Wiley, 2000.
- Matt Bishop: Computer Security: Art and Science, Addison-Wesley, 2002 (available online for ETH members).
- Jonathan Katz and Yehuda Lindell, Introduction to Modern Cryptography, Chapman & Hall, 2008
- Charlie Kaufman, Rhadia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World, 2nd Edition, 2002.
- William Stallings: Cryptography and Network Security: Principles and Practice, 3rd Edition, Prentice Hall, 2002.
- William Stallings: Network Security Essentials: Applications and Standards, 2nd Edition, Pearson, 2003.
- Ken Thompson: Reflections on trusting trust (available online).
- Wenbo Mao: Modern Cryptography: Theory & Practice, Prentice Hall, 2004.
Course Material
The lecture notes, exercises, slides, and other resources are available in our protected page secured area (log in at the top of the page first!).