Modul | Network Security (IN2101) | Course | Network Security (Netzsicherheit) | Lecturers | Prof. Dr.-Ing. Georg Carle, Dr. Heiko Niedermayer, Cornelius Diekmann, Dr. Ralph Holz | SWS | 4 (3+1) | ECTS Credits | 5.0 | Language | English | Dates | Tuesday, 14:15-15:45 h in Interims-HS 2 Wednesday, 16:00-17:30 h in Interims-HS 2
Exercises will take place at certain time slots of the lectures; these will be announced during the course. | Contents | This lecture is an introduction to the field of network security and its fundamental topics like cryptographic operations, threats, and security goals. This is used further as a starting point and requirements for the design of secure networks are discuessed. Modern security protocols in modern network protocols and architectures are presented as well as vulnerabilities in existing systems. |
---|
Reader | tbd | Registration | For the course/exam: TUMOnline. | Exams | Main Exam: Sa 14.2.2015 14:30 16:00 MW 2001 (watch TUMonline for changes!) Exam starts at 14:30, please arrive at least 30min earlier! Retake Exam: tbd
IMPORTANT: The exam is closed-book. All you need, and will be allowed to use, is a pen (not a pencil). In particular, material from the lecture (slide deck, material from tutorial/exercises) is not allowed.
| News | Added news section No lecture on 23.12.2014 Please register for the exam in TUMonline! | | | Exercises | Always watch this space for updates to exercises (in case flaws are found).
Exercise | Version | Sample solution | Remarks |
---|
exercise 1 | 1 | sample solution 1 | Discussion: Mi 8th October | exercise 2 | 1 | sample solution 2 | Discussion: Mi 22th October | exercise 3 cert archive | 1.1 (tuned shebang) | sample_solution_3 | Discussion: Mi 19th November | repetition | 0 | sample_solution | Discussion: Mi 10th December | exercise 4 | 1 | sample_solution_4 | Discussion: Mi 10th December | exercise_5 | 1 | sample_solution_5 | Discussion: Mi 14th January | exercise_6 | 1.1 (fixed solution) | sample_solution_6 | Discussion: Di 27th January | repetition | 1 | | |
Network Security Experimentation Tasks | Version | | Remarks |
---|
challenge01 | 1.0 | | Solution: `nc netsec.net.in.tum.de 20001', enter the hinted user/password | challenge02 | 1.0 | | Solution: eval(untrusted_data), always a good idea ;) | challenge03 | 1.0 | | Solution: for i in range(0,1000000): 6 digits, don't forget string.zfill | challenge04 | 1.1 | | Solution: no brute-forcing but DH MitM | challenge05 (.py, .pdf) | 1.0 | | Discussion: tbd | challenge06 (.py, .py, .pdf) | 1.1 | | Update: Fixed RSA test cases (2.1.2014) |
Network Security Challenges Results: Ranking method: For every challenge, the first 20 pseudonyms are selected, canonicalized (''.join([l for l in s.lower() if l in string.ascii_lowercase + string.digits])), and duplicate entries are removed. For every challenge, every pseudonym is awarded "20 - position_in_database" points. A point multiplier per challenge of max(1, challenge_number // 2) is applied.
Final Ranking (Jan 27 2015)
Slides
|
Chapter | Version | 1 up |
---|
1. Introduction to Network Security | 1 (Oct 06) | PDF | 2.1 Basic Building Blocks - Introduction to Symmetric Cryptography | 1 (Oct 07) | PDF | 2.2 Basic Building Blocks - Cryptographic Hash Functions | 1 (Oct 14) | PDF | 2.3 Basic Building Blocks - Secure Channel and Authenticated Encryption | 1 (Oct 16) | PDF | 2.4 Basic Building Blocks - Concept of Public Key Cryptography | 1 (Oct 16) | PDF | 2.4 Public Key Infrastructures Part 1 | 1.73205 (Nov 04) | PDF
| 2.4 Public Key Infrastructures Part 2 | 2.71828 (Nov 11) | PDF | 2.4 Public Key Infrastructures Part 3 | 3.14159 (Nov 12) | PDF | 2.5 Basic Building Blocks - Introduction to Random Number Generation | 1 (Nov 18) | PDF | 2.6 Basic Building Blocks - Introduction to Cryptographic Protocols | | PDF | 3 Kerberos - Needham-Schroeder Protocol
- Kerberos
| 1 (Dec 01) | PDF | 4 Network Layer Security - IPSec
- Security Policies and Associations
- IKE
- VPN
| 3 (Dec 16) | PDF | 5 Transport Layer Security | 1 (Dec 17) | PDF | ε Winter Holiday Lecture | 0 (Dec 17) | PDF | 6 Link Layer Security - CHAP, EAP, AAA, 802.1x
- WPA2
| 2 (Jan 20) | PDF | 7 Security Policies and Firewalls - Network Access Policies
- Firewall
| 1 (Jan 7) | PDF | 8 Application Layer Security - Web Security
- Identity Federation
| 1 (Jan 16) | PDF | 9 Attacks and Attack Detection
- DoS, DDoS
- Intrusion Detection, Anomaly Detection
| 1 (Jan 20) | PDF |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
|
|