Network Security

Exam

  • Date: 12.09.23
  • Entry: 10:30
  • Exam starts: 11:00 a.m
  • Exam end: 1:00 p.m
  • Exam duration: 120 min: 25 min (closed book exam) + 5 min (break) + 90 min (open book exam)
  • Room: Hörsaal BI 84.2

Lecture time would be agreed on with interested students. Lecture is held via Webex video meeting. Link is distributed through Stud-IP or on request.

Lecture time: NN
Tutorial time: NN

If you are interested to attend please register at StudIP or send an email to :
Zarrouk Randa-TU <randa.zarrouk@tu-braunschweig.de>

Lecture is also held  in German over the web in SS 2021

Lecture material would be available here <click>

 

Instructor: Prof. W. Adi
Credit: 2 lecture hours + 1 exercise hour
Time: (adapted to participant's schedule)
Prerequisites: Knowledge of basic Cryptography
Course Materials: A course handout would be offered at lecture time
Course language: English. Same lecture is held in German under Netzwerksicherheit

SUMMARY:

The course introduces a refreshment summary on discrete mathematics, number theory and the basic contemporary cryptographic algorithms. The review concentrates on modern network security relevant symmetric and asymmetric cryptography including Digital signatures, certificates and authentication protocols. Contemporary network security technology related standards as (X.509, DSS, Kerberos), electronic mail security (PGP, S/MIME) as well as (IPSec, SSL, TLS, SET and others) would be presented showing their design concepts. Web security and protocols for secure electronic commerce, voting systems and other contemporary applications would cover the final concluding part of the lecture. The course concludes with modern trends in network security applications for voting, vehicular, sensor and similar networks.

Perquisites: Knowledge on Basic Communication Networks and Cryptography

Objectives

At the end of the course the student will understand:

  • Fundamentals of Secrecy theory, mathematical Background for modern cryptography.
  • Network common Contemporary Secret-Key Ciphers: DES, IDEA , AES and Public Key Cryptography: Diffie Hellman Key Exchange, RSA secrecy system
  • Network Authentication techniques: MD4, MD5 - Message Digest Algorithms SHS - Secure Hash Algorithm and Standard
  • Authentication Systems for People and Computer networks
  • Network Security in practice: Kerberos V4 and V5
  • Electronic Mail Security
    • S/MIME Secure/Multipurpose Internet Mail Extension
    • PGP - Pretty Good Privacy
    • Multicast and Broadcast Network Security

  • Contemporary IP and Web Security
  • Network Protocols for secure electronic commerce.
  • Concepts of Digital Watermarking and Steganography
  • Contents

  • Basics of Cryptography and Security, Review of Secret and Public Key Systems in view of contemporary network security functions.
  • Common standards for network Hashes and Message Digests, Message Authentication, MD5, SHA, RIPEMD, HMAC
  • Network oriented Authentication Systems Digital Signatures, Certificates, User Authentication
  • Electronic Mail Security, (PGP), S/MIME, X.400, IP and Web Security, IPSec and Virtual Private Networks, Secure Sockets and Transport Layer (SSL and TLS)
  • Wireless network security for 802.11 and Bluetooth
  • Network routing and switching security
  • Network Electronic Commerce and its Security, Electronic Payment Systems: CyberCash, iKey Protocols, Ecash (DigiCash), Secure Electronic Transaction (SET)
  • Digital Watermarking and Steganography. Network wide Digital Copyright and IPR Protection, Secured Information Hiding and Steganography
  • Trusted Computing, Secured Computing environment and Software
  • Textbooks:

    • "Network Security: Private Communication in a Public World",
      Charlie Kaufman, Radia Perlman, and Mike Speciner, 2-nd
      edition, Prentice Hall, 2002
    • Network Security Essentials, Applications and Standards",William Stallings, 3-rd edition, Pearson Prentice Hall, 2007

    References:

    • A reference textbook: Cryptography Theory and Practice, Second edition by D. Stinson.
    • Recommended as designer's handbook: Handbook of Applied Cryptography by A. Menezes, P. Van Oorschot, S. Vanstone. free

    Other optional contemporary papers and books.

    • "Cryptography and Network Security: Principles and Practice", William Stallings, 3-rd edition, Prentice Hall, 2003
    • Applied Cryptography: Protocols, Algorithms, and Source Code in C", Bruce Schneier, 2-nd edition, John Wiley & Sons, 1996

    Exam Regulations:

    • Date : To be agreed on later
    • Open book written exam: 70% of the marks ca. 1,5 hours (all documents ar allowed). See sample exams
    • Closed book part: 30%, short questions (without documents). See sample exams.

    • Room: Hans-Sommer Str 66, 38106 Braunschweig, 11. Stock, Raum 1111 or alternative in the same building

    Sample exams with solution would be made available with the lecture slides