Information Security
Spring semester 2013 (252-0211-00L)
Overview
Lecturers:
Dr. Christoph Sprenger (Part I), Prof. David Basin (Part II)
Assistants:
Gregory Demay, Peter Gazi, Dr. Srdjan Marinovic, Dr. Sasa Radomirovic, Dr. Ralf Sasse
Classes (4V):
Mon 13-15 CAB G 61
Thu 13-15 CAB G 61
Exercises (3U):
Wed 15-18 HG F26.5
Thu 15-18 LFW E 13 and LFW E 15
Credits: 8 ECTS (4V + 3U)
Requirements: None
Language: English
Annoucements
- On Mar 18, we will have a PGP tutorial instead of the lecture (in CAB G 61). Please bring your laptops with GnuPG 2.0 or higher installed.
Description
The course will survey the principles and methods of information security, along with the discussion of selected applications. This includes the following topics:
- Foundations of Cryptography
- Key Management and Trust
- Security Protocols
- Access Control and Security Policies
- Anonymity and Privacy
Course material
The course material is available on a separate page (use your nethz login/passwd).
Ressources
Literature
- Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, 1996 (available online).
- Dieter Gollmann: Computer Security, Wiley, 2000.
- Matt Bishop: Computer Security: Art and Science, Addison-Wesley, 2002 (available online for ETH members).
- Jonathan Katz and Yehuda Lindell, Introduction to Modern Cryptography, Chapman & Hall, 2008
- Charlie Kaufman, Rhadia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World, 2nd Edition, 2002.
- William Stallings: Cryptography and Network Security: Principles and Practice, 3rd Edition, Prentice Hall, 2002.
- William Stallings: Network Security Essentials: Applications and Standards, 2nd Edition, Pearson, 2003.
- Ken Thompson: Reflections on trusting trust (available online).
- Wenbo Mao: Modern Cryptography: Theory & Practice, Prentice Hall, 2004.