Network Security

Modul

Network Security (IN2101)

Course

Network Security (Netzsicherheit)

Lecturers

Prof. Dr.-Ing. Georg CarleDr. Heiko Niedermayer, Cornelius DiekmannDr. Ralph Holz

SWS

4 (3+1)

ECTS Credits

5.0

Language

English

Dates

Tuesday, 14:15-15:45 h in Interims-HS 2
Wednesday, 16:00-17:30 h in Interims-HS 2

Exercises will take place at certain time slots of the lectures; these will be announced during the course.

Contents

This lecture is an introduction to the field of network security and its fundamental topics like cryptographic operations, threats, and security goals. This is used further as a starting point and requirements for the design of secure networks are discuessed. Modern security protocols in modern network protocols and architectures are presented as well as vulnerabilities in existing systems.

Reader

tbd

Registration

For the course/exam: TUMOnline.

Exams

Main Exam: Sa 14.2.2015 14:30 16:00 MW 2001 (watch TUMonline for changes!)
Exam starts at 14:30, please arrive at least 30min earlier!
Retake Exam: tbd

IMPORTANT: The exam is closed-book. All you need, and will be allowed to use, is a pen (not a pencil). In particular, material from the lecture (slide deck, material from tutorial/exercises) is not allowed.


News

Added news section
No lecture on 23.12.2014
Please register for the exam in TUMonline!

Exercises

Always watch this space for updates to exercises (in case flaws are found).


Exercise

Version

Sample solution

Remarks

exercise 1

1

sample solution 1

Discussion: Mi 8th October

exercise 2

1

sample solution 2

Discussion: Mi 22th October

exercise 3
cert archive

1.1 (tuned shebang)

sample_solution_3

Discussion: Mi 19th November

repetition

0

sample_solution

Discussion: Mi 10th December

exercise 4

1

sample_solution_4

Discussion: Mi 10th December

exercise_5

1

sample_solution_5

Discussion: Mi 14th January 

exercise_6

1.1 (fixed solution)

sample_solution_6

Discussion: Di 27th January

repetition

1




Network Security Experimentation Tasks

Version

Remarks

challenge01

1.0

Solution: `nc netsec.net.in.tum.de 20001', enter the hinted user/password

challenge02

1.0

Solution: eval(untrusted_data), always a good idea ;)

challenge03

1.0

Solution: for i in range(0,1000000): 6 digits, don't forget string.zfill

challenge04

1.1

Solution: no brute-forcing but DH MitM

challenge05 (.py, .pdf)

1.0

Discussion: tbd

challenge06 (.py, .py, .pdf)

1.1

Update: Fixed RSA test cases (2.1.2014)


Network Security Challenges Results:
Ranking method:
For every challenge, the first 20 pseudonyms are selected, canonicalized (''.join([l for l in s.lower() if l in string.ascii_lowercase + string.digits])), and duplicate entries are removed.
For every challenge, every pseudonym is awarded "20 - position_in_database" points. A point multiplier per challenge of max(1, challenge_number // 2) is applied.

Final Ranking (Jan 27 2015)



Slides

Chapter

Version

1 up

1. Introduction to Network Security

1 (Oct 06)

PDF

2.1 Basic Building Blocks - Introduction to Symmetric Cryptography

1 (Oct 07)

PDF

2.2 Basic Building Blocks - Cryptographic Hash Functions

1 (Oct 14)

PDF

2.3 Basic Building Blocks - Secure Channel and Authenticated Encryption

1 (Oct 16)

PDF

2.4 Basic Building Blocks - Concept of Public Key Cryptography

1 (Oct 16)

PDF

2.4 Public Key Infrastructures Part 1

1.73205 (Nov 04)


PDF

2.4 Public Key Infrastructures Part 2

2.71828 (Nov 11)

PDF

2.4 Public Key Infrastructures Part 3

3.14159 (Nov 12)

PDF

2.5 Basic Building Blocks - Introduction to Random Number Generation

1 (Nov 18)

PDF

2.6 Basic Building Blocks - Introduction to Cryptographic Protocols

PDF

3 Kerberos

  • Needham-Schroeder Protocol
  • Kerberos

1 (Dec 01)

PDF

4 Network Layer Security

  • IPSec
  • Security Policies and Associations
  • IKE
  • VPN

3 (Dec 16)

PDF

5 Transport Layer Security

  • SSL / TLS protocol

1 (Dec 17)

PDF

ε Winter Holiday Lecture

0 (Dec 17)

PDF

6 Link Layer Security

  • CHAP, EAP, AAA, 802.1x
  • WPA2

2 (Jan 20)

PDF

7 Security Policies and Firewalls

  • Network Access Policies
  • Firewall

1 (Jan 7)

PDF

8 Application Layer Security

  • Web Security
  • Identity Federation

1 (Jan 16)

PDF

9 Attacks and Attack Detection

  • DoS, DDoS
  • Intrusion Detection, Anomaly Detection

1 (Jan 20)

PDF