Network Security
News
- Exceptional location on Tue 2018-10-16: Lichtenbergstr. 2b, HS 2, https://www.ph.tum.de/about/visit/roomfinder/?room=5416.01.003
Lecture
- Tue 14:15-15:45, Interim HS 2
- Thu 10:15-11:45, MI HS 1
- Exercises will take place at certain time slots of the lectures; these will be announced during the course.
- No lecture recordings
-
No compulsory attendance
- Exam: 2019-02-21 17:00-18:15
- MW 2001: Rudolf-Diesel-Hörsaal (5510.02.001)
- 102: Interims Hörsaal 2 (5620.01.102)
- Repetition exam: 2019-04-09 10:30-11:45
- MW 1801: Ernst-Schmidt-Hörsaal (5508.01.801)
Contents
This lecture is an introduction to the field of network security and its fundamental topics like cryptographic operations, threats, and security goals. This knowledge is used further as a starting point and requirements for the design of secure networks. Modern security protocols in modern network protocols and architectures are presented as well as vulnerabilities in existing systems.
Registration
Moodle
We use Moodle for course organisation and course materials.
Exercises
There will be programming assignments. We suggest that you are already familiar with Python 3. Recommended reading: Python 3 Tutorial
Exercises will be posted on Moodle.
Slides
Chapter | Version | Data |
---|---|---|
0 Course Organization | 1.1 |
00_Formalities.pdf |
1 Introduction | 1.1 |
01_Intro.pdf |
2 Language Security | 1.1 |
02_LangSec.pdf |
3 TCP Attacks | 1.1 |
03_TCPAttacks.pdf |
4 Middleboxes | 1.1 |
04_Middleboxes.pdf |
5 Symmetric Crypto | 1.1 |
05_Symmetric_Crypto.pdf |
6 Hash Functions | 1.1 |
06_Hash_Functions.pdf |
7 Random | 1.1 |
07_Random.pdf |
8 Asymmetric Crypto | 1.1 |
08_Asymmetric_Crypto.pdf |
8 Asymmetric Crypto (no handout) | 1.2 |
08_Asymmetric_Crypto_nohandout.pdf |
9 Secure Channels | 2 |
09_Secure_Channels.pdf |
10 PKI | 2 |
10_PKI.pdf |
11 Crypto Protocols | 3.1 |
11_Cryptoprot.pdf |
11 Crypto Protocols (no handout) | 3.2 |
11_Cryptoprot_nohandout.pdf |
12 IPSec | 2 |
12_IPSec.pdf |
13 Kerberos | 2 |
13_Kerberos.pdf |
14 Web Security | 1 |
14_WebSec.pdf |
15 Privacy | 1 |
15_Privacy.pdf |
15 Privacy (no handout) | 1.1 |
15_Privacy_nohandout.pdf |
Version notes
- Version
1.1
for chapter 0 to 8 is identical to version1
, except thepause
slides are all merged.
Exam
Date: see above.
Mode: Written exam, 75 Minutes.
Allowed tools: an analog dictionary English <-> Other Language without any remarks