Information Security
Spring Semester 2020 (252-0211-00L)
Overview
Lecturers:
Part 1: Prof. Dr. Srdjan Capkun
Part 2: Prof. Dr. David Basin and Dr. Ralf Sasse
Assistants:
Part 1: Dr. Kari Kostiainen, Dr. Marc Röschlin, Karl Wüst, Daniele Lain
Part 2: Sven Hammann, Karel Kubicek, Dennis Jackson
Course material:
Published through course Moodle which also includes a discussion forum.
Lectures:
Thursday 13–15, CAB G 61
Friday 13–15, CAB G 61
Exercises:
Wednesday 15–18, HG F 26.5
Thursday 15–18, CAB G 61
Credits: 8 ECTS (4V + 3U)
Requirements: None
Language: English
Description
This course provides an introduction to Information Security. The focus is on fundamental concepts and models, basic cryptography, protocols and system security, and privacy and data protection. While the emphasis is on foundations, case studies will be given that examine different realizations of these ideas in practice.
Exercise info
Part I
- There will be no exercise sessions on the first week of the course!
- The weekly exercises will be published in the course Moodle approximately one week before each exercise session.
- Students should attempt to solve the exercises first on their own.
- Master solutions will be published few days before the exercise sessions. Students should check the master solutions before the exercise session.
- At the exercise session the course assistants will explain the master solutions and discuss alternative solutions.
- The exercise sessions are expected to last about 2 hours, depending on the number and the difficulty of exercises that week.
- Exercises are not graded, but working on them independently and attending the exercise sessions is highly recommended.
Part II
You can hand in your solutions to the exercises to receive feedback from the tutors. Solutions should be submitted by email to all tutors. Please put [InfSec] in the subject of the message and indicate which exercise session (Wednesday/Thursday) you plan to attend. Solutions must be received by 23:59 on the Monday after the exercise is published, in order to receive feedback.
Resources
Literature
- Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, 1996 (available online).
- Dieter Gollmann: Computer Security, Wiley, 2000.
- Matt Bishop: Computer Security: Art and Science, Addison-Wesley, 2002 (available online for ETH members).
- Jonathan Katz and Yehuda Lindell, Introduction to Modern Cryptography, Chapman & Hall, 2008
- Charlie Kaufman, Rhadia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World, 2nd Edition, 2002.
- William Stallings: Cryptography and Network Security: Principles and Practice, 3rd Edition, Prentice Hall, 2002.
- William Stallings: Network Security Essentials: Applications and Standards, 2nd Edition, Pearson, 2003.
- Ken Thompson: Reflections on trusting trust (available online).
- Wenbo Mao: Modern Cryptography: Theory & Practice, Prentice Hall, 2004.