Security on the Internet
Responsible
Prof. Dr. Joachim von zur Gathen
Lecture
Tutorial
Time & Place
- Monday, 1300-1430, b-it bitmax.
- Wednesday, 1130-1300, b-it bitmax.
- Tutorial: Monday, 1445-1615, b-it bitmax (Caféte?).
First meeting: Monday, 2 April 2007, 1300. Second meeting: Wednesday, 4 April 2007, 1130.
First tutorial: Monday, 16 April 2007, 1445.
Exam
The exam will carry the hints displayed on the right.
Pre-exam meeting: Tuesday, 24 July 2007, 1600, Cafeteria.
The first exam will be on 27 July 2007 in the time between 10 00 and 13 00 o'clock in the bitmax.
There was a post-exam meeting on 14 August 2007, 16 00 in the b-it, room 2.1. At this occasion you can also review our ranking of your exam.
The second exam was on 2 October 2007 in the time between 1300 and 1600 o'clock in the bitmax.
There was a post-exam meeting on Thursday, 25 October 2007, 1500 in the b-it, room 1.25. At this occasion you can also review our ranking of your exam.
Allocation
4+2 SWS, 8 credits.
- Media Informatics, Computer and Communication Technology.
- University of Bonn - Computer Science, A or A1, respectively.
Prerequisites
Basic knowledge in cryptography might be helpful, as for example Cryptography I. Yet, this is not required.
Contents
This course is about various aspects of security in the internet.
- Who can read my email?
- How do I know that eBay is eBay, or amazon is amazon?
- What is the public key of Angela Merkel? Where do I get it and how do I verify that it's really hers?
- ...
In the internet a large variety of protocols ("chatting programs") are in use to make this or that `secure'. VPN, IPsec, SSL, PKI, PGP are just a few tokens that need explanations. We will try to understand a little of that and how things are used and made available.
Lecture notes & exercises
The lecture notes (PDF, 12.4MB) from the course now contain the slides up to 4 July.
- Sheet 1 ( PDF ).
- Sheet 2 ( PDF ).
- Sheet 3 ( PDF ).
Slides from the tutorial on 30 April ( PDF , 506KB). - Sheet 4 ( PDF ).
- Sheet 5 (PDF). [Minor update 9 May 2007, 01:00.]
- Sheet 6 (PDF).
- Sheet 7 (PDF).
For copy and pasting the numbers from exercise 7.2:- N = 736518644769481063127931153488032823524624691168931264550157,
- x = 114929747478656946659840400558284171506013987113875892871679.
- Sheet 8 (PDF).
- Sheet 9 (PDF).
Slides from Michael's tutorial on 18 June ( PDF , 290KB). - Sheet 10 (PDF).
- Mihir Bellare et al. (1996f), The HMAC papers .
- Sheet 11 (PDF). [Update 26 June: Slight improvement in the formulation of Exercise 11.3.]
- Niels Ferguson & Bruce Schneier (1999), A Cryptographic Evaluation of IPsec .
- Sheet 12 (PDF). Last regular sheet!
- Steve Gibson (2001). The Strange Tale of the Denial of Service Attacks Against GRC.COM .
- Exam preparation sheet (PDF). [Updated exercise 11 at Monday 16 July 10:47.]
Literature
- Kaufmann, Charlie & Perlman, Radia & Speciner, Mike (2002). Network Security. Prentice Hall.
- Smith, Richard E. (1997). Internet cryptography. Addison Wesley.
- Tanenbaum, Andrew S. (2003). Computer Networks. Pearson.
- Birkholz, Erik Pace (2003). Special Ops, Host and Network Security for Microsoft, UNIX, and Oracle. Syngress.
- hemang#bcpsparc.ucdavis.edu . Good Times Virus Hoax FAQ .
- Wikipedia (2007). Goodtimes virus .
Mailinglist
Raphael was so kind to organize a mailing list .