Information Security
Spring semester 2014 (252-0211-00L)
Overview
Lecturers:
Prof. Srdjan Capkun (Part I), Prof. Adrian Perrig (Part II)
Assistants:
Dr. Srdjan Marinovic, Dr. Claudio Soriente
Lectures:
Thu 13-15 CAB G 61
Fri 13-15 CAB G 61
Exercises:
Wed 15-18 HG F 26.5
Wed 15-18 NO E 39
Thu 15-18 LFW E 13
Thu 15-18 LFW E 15
Credits: 8 ECTS (4V + 3U)
Requirements: None
Language: English
Annoucements
- 02.18.2014 - No exercise sessions during the first week.
There will be no exercise sessions on Wed 19.02 and Thur 20.02. The first exercise sessions will take place on Wed 26.02. For this session we would ask all students who are planning to attend the session, to come to HG F 26.5.
Description
This course provides an introduction to Information Security. The focus is on fundamental concepts and models, basic cryptography, protocols and system security, and privacy and data protection. While the emphasis is on foundations, case studies will be given that examine different realizations of these ideas in practice.
Resources
Literature
- Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, 1996 (available online).
- Dieter Gollmann: Computer Security, Wiley, 2000.
- Matt Bishop: Computer Security: Art and Science, Addison-Wesley, 2002 (available online for ETH members).
- Jonathan Katz and Yehuda Lindell, Introduction to Modern Cryptography, Chapman & Hall, 2008
- Charlie Kaufman, Rhadia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World, 2nd Edition, 2002.
- William Stallings: Cryptography and Network Security: Principles and Practice, 3rd Edition, Prentice Hall, 2002.
- William Stallings: Network Security Essentials: Applications and Standards, 2nd Edition, Pearson, 2003.
- Ken Thompson: Reflections on trusting trust (available online).
- Wenbo Mao: Modern Cryptography: Theory & Practice, Prentice Hall, 2004.
Course material
The lecture notes, exercises, slides, and other resources is available in our protected page secured area (login with your nethz credentials).