Security on the Internet
Corresponding entry in Aachen Campus, Bonn University (Lecture, Tutorial).
Responsible
Prof. Dr. Joachim von zur Gathen
Lecture
Tutorial
Time & Place
- Tuesday 1230-1400, b-it bitmax.
- Wednesday 1145-1315, b-it bitmax.
- Tutorials:
- Tuesday 1045-1215. b-it 2.1.
- Wednesday 1000-1130. b-it 2.1.
First meeting: Tuesday, 28 October 2008.
Allocation
4+2 SWS, 8 credits. Optionally, 3+2 SWS, 6 credits.
Successful completion of the course yields 8 credit points. For students who only want 6 credit points, a breakpoint at about 3/4 of the teaching time will be defined, and only the course material up to that point will be relevant for their exams and grades.
- Media Informatics: Computer and Communication Technology.
- Recommendation for University of Bonn - Computer Science: A or A1, respectively.
Prerequisites
Basic knowledge in cryptography might be helpful. Yet, this is not required.
Contents
This course is about various aspects of security in the internet.
- Who can read my email?
- How do I know that eBay is eBay, or amazon is amazon?
- What is the public key of Angela Merkel? Where do I get it and how do I verify that it's really hers?
- ...
In the internet a large variety of protocols ("chatting programs") are in use to make this or that `secure'. VPN, IPsec, SSL, PKI, PGP are just a few tokens that need explanations. We will try to understand a little of that and how things are used and made available.
Notes and Exercises
The lecture notes (PDF) contain all slides from the course. Now (since 16 February) including pictures of your posters.
- Sheet 1 (PDF)
- Radu Poenaru describes in his blog what he did to solve Exercise 1.1.
- Sheet 2( PDF)
- Plaintext (txt)
- Sheet 3 (PDF)
- Sheet 4 (PDF)
- Sheet 5 (PDF)
- Sheet 6 (PDF)
- Sheet 7 (PDF)
- Sheet 8 (PDF)
- Sheet 9 (PDF)
- Sheet 10 (PDF)
- Sheet 11 (PDF)
- Sheet 12 (PDF)
Furthermore, Daniel Rosenthal provides his (non-authorized, non-validated) personal notes.
Literature
- Kaufmann, Charlie & Perlman, Radia & Speciner, Mike (2002). Network Security. Prentice Hall.
- Smith, Richard E. (1997). Internet cryptography. Addison Wesley.
- Tanenbaum, Andrew S. (2003). Computer Networks. Pearson.
- Birkholz, Erik Pace (2003). Special Ops, Host and Network Security for Microsoft, UNIX, and Oracle. Syngress.
- Les Jones (1995). Good Times Virus Hoax FAQ .
- Wikipedia (2007). Goodtimes virus .
- Common Internet Message Headers (RFC 2076)
- Key words for use in RFCs to Indicate Requirement Levels (RFC 2119)
- Simple Mail Transfer Protocol (RFC821, RFC 2821, RFC5321)
- Extended SMTP (RFC1869)
- Internet Message Format (RFC 2822)
- Bellare et al., "Keying Hash Functions for Message Authentication" (pdf)
- HTTP over TLS (RFC2818)
- The Transport Layer Security Protocol (RFC5246)
- Bellare et al., "The Security of the Cipher Block Chaining Message Authentication Code" (pdf)
Mailinglist
We will put each member on the mailing list 08ws-soti-students@bit.uni-bonn.de. This list can be used
- for discussions among all participants, and Daniel and Michael may also comment on your questions.
- for announcements related to the course.