Modul | Network Security (IN2101) | Course | Network Security (Netzsicherheit) | Lecturers | Prof. Dr.-Ing. Georg Carle, Dr. Heiko Niedermayer, Ralph Holz | SWS | 4 (3+1) | ECTS Credits | 5.0 | Language | English | Dates | Wednesdays 14:00 - 15:30 Uhr bi-weekly (lecture and exercise according to exercise plan) MI 00.08.038 Thursdays 14:15 - 15:45 Uhr weekly MI 00.08.038 | | Exercise dates: Wednesdays 14:00-15:30 bi-weekly (see above) | Contents | This lecture is an introduction to the field of network security and its fundamental topics like cryptographic operations, threats, and security goals. This is used further as a starting point and requirements for the design of secure networks are discuessed. Modern security protocols in modern network protocols and architectures are presented as well as vulnerabilities in existing systems. | Registration | For the course: TUMOnline. For the exercises: none necessary! (The corresponding statement on the assignments is now outdated, you can participate without further registration)
Registration for exam dates: go to the secretariat of our group at room 03.05.052. | Exercises | The purpose of the assignments is to help you deepen your understanding of the subject and get your questions answered. In our experience, students who have done the assignments do also better in the exam later. We thus strongly recommend doing the assignments and also to attend the exercises. Example solutions to the assignments will be provided during exercise hours.
Submission: Either by mail (holz@in ...) or during course hours.
Download the assignments as PDF. Assignment instructions can be found in Assignment 1.
Assignment | Version | Sample solution | Remarks |
---|
Assignment 1 | 2010-10-21 | - | | Assignment 2 | 2010-11-08 | - | same version; exported again with Acrobat | Assignment 3 | 2010-11-25 | - | Note: there was a mistake in Task 2; see sample solution | Assignment 4 | 2010-12-16 | - | We are amazingly good at typos. While the submission date is correct, the day of the exercise hours is 2011-01-19, of course. | Assignment 5 | 2011-01-19 | - | |
| Slides | Download the slides as PDF. Current slides will be published in time before presentation. Updates may occur, please check for changes.
Chapter | Version | 1 up | 2 up | 4 up | 1. Introduction | 26.10.2010 (minor) | PDF | PDF | PDF | 2.1 Basics - Symmetric Crytography | 16.11.2010 (some info from overhead, resolves issues found in lectures) | PDF | PDF | PDF | 2.2 Basics -Public Key Crytography | 16.11.2010 (repositions and rewrites the sign and encrypt discussion) | PDF | PDF | PDF | 2.3 Basics - Crytographic Hash Functions | 26.10.2010 | PDF | PDF | PDF | 2.4 Basics - Random Number Generation for Cryptographic Protocols | 2.11.2010 | PDF | PDF | PDF | 3. Cryptographic Protocols for Encryption, Authentication and Key Establishment | 11.11.2010 | PDF | PDF | PDF | 4. The IPSec Architecture | 11.11.2010 | PDF | PDF | PDF | 5. Secure Socket Layer (SSL)/ Transport Layer Security (TLS) | 14.12.2010 | PDF | PDF | PDF | 6. Link Layer Security (also Wireless LAN Security) | 11.1.2011 (problem with some graphs in PDF) | PDF | PDF | PDF | 7. Middleboxes | 11.1.2011 | PDF | PDF | PDF | 8. System Vulnerabilities and Denial of Service Attacks | 11.1.2011 | PDF | PDF | PDF | 9. Intrusion Prevention, Detection and Response | 11.1.2011 | PDF | PDF | PDF | 10 Application Layer Security | 26.1.2011 | PDF | PDF | PDF | | |
|
|
|