Security Protocols and Infrastructures
|
|
- Prosper Morris
- 6 years ago
- Views:
Transcription
1 Security Protocols and Infrastructures Dr. Michael Schneider October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 1
2 1 Formalities 2 Contents, Time Table 3 Literature 4 Announcements October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 2
3 1 Formalities 2 Contents, Time Table 3 Literature 4 Announcements October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 3
4 General Remarks 1 Elective module in Master of Computer Science / JIM: Catalogue: Application systems Applicable for IT-Security track SWH: 2 lecture + 1 lab + 1 exercise 6 ECTS 2 Time schedule of lecture: Monday, 16:00-17:30 Lecture hall D14/111 Start: Monday, Who is Michael Schneider? michael.schneider@h-da.de 4 All infos about the lecture can be found here: October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 4
5 x-y-scheme (x = white y = grey) October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 5
6 Exercises Every second Monday, 14:15-15:45 Lecture hall: D14/111 Voluntary participation (preparation and participation is strongly recommended) 4-5 exercises (x-weeks) (white): : 1st exercise : 2nd exercise : 3rd exercise : 4th exercise : optional time slot October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 6
7 Lab Every (second) Monday, 17:45-19:15 Lecture hall: D15/004 You have to pass all labs!!! Starting October 23 (x-group) 5 labs: Please check the OBS for the dates October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 7
8 Exam Registration deadline Deregistration deadline Examination date - Monday, Examination time - 14:15-15:45 Room will be anounced later You need to have passed all 5 labs! October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 8
9 Teaching Cooperation with TUD Students from TUD: Please register as foreseen... Further questions regarding time table, locations,...? Exam registration: inform Michael Schneider October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 9
10 1 Formalities 2 Contents, Time Table 3 Literature 4 Announcements October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 10
11 Security Protocols (1/2) Cryptographic Primitives Security goals Cryptographic base techniques Mathematical foundations of cryptographic primitives The Diffie-Hellman key exchange scheme The RSA cryptographic scheme Zero Knowledge Proofs and Secret Sharing Shamir s secret sharing scheme October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 11
12 Security Protocols (2/2) Security Protocols for electronic ID cards Basic Access Control Extended Access Control PACE Security Protocols for the Internet: Transport Layer Security (TLS) October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 12
13 Security Infrastructures Standards for Security Infrastructures ASN.1 X.509 and RFC 5280 Public Key Cryptrographic Standard Series PKI of Machine Readable Travel Documents Revocation Mechanisms of X.509 certificates Certificate Revocation Lists Online Certificate Status Protocol Validation of Signatures and Validity Models October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 13
14 Time Table (1/3) : Chapter 0: Formalities and Contents Chapter 1: Motivation and Security Goals : Chapter 2: Cryptographic and Mathematical Foundations : Chapter 3: Diffie-Hellman Key Exchange and RSA : no lecture October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 14
15 Time Table (2/3) : Chapter 4: Introduction to Abstract Syntax Notation 1 (ASN.1) : Chapter 5: Standards for Security Infrastructures : Chapter 6: Extended Validation Certificates and Current Topics : Chapter 7: Security Protocols for Electronic ID Cards October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 15
16 Time Table (3/3) : Chapter 8: The Transport Layer Security Protocol (TLS) : Chapter 9: Status Verification of Certificates : Chapter 10: Zero Knowledge Proofs and Secret Sharing : Chapter 11: Post-Quantum Cryptography and Homomorphic Encryption October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 16
17 1 Formalities 2 Contents, Time Table 3 Literature 4 Announcements October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 17
18 Literature 1 A. Menezes, P. van Oorschoot, S. Vanstone: Handbook of Applied Cryptography, CRC Press, V. Shoup, A Computational Introduction to Number Theory and Algebra, Cambridge University Press, N.P. Smart, Cryptography, An Introduction : Third Edition, David Cooper et.al.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, Request for Comments 5280, May ICAO Document BSI Technical Report TR-03110, 7 Slides October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 18
19 1 Formalities 2 Contents, Time Table 3 Literature 4 Announcements October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 19
20 Topics for Master Theses (h_da and TUD) 1 Biometrics and Internet Security Research Group da/sec: 2 Contact Michael Schneider: michael.schneider@h-da.de or after lecture October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 20
21 Lecture Sources Most images are taken from Slides of Nicolas Buchmann (WS 2015/16) and Harald Baier (WS 2011/12) Thanks a lot! October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 21
Cryptography. Dr. Michael Schneider October 10, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 1
Cryptography Dr. Michael Schneider michael.schneider@h-da.de October 10, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 1 1 Formalities 2 Contents, Time Table 3 Literature 4 Announcements
More informationLecture Notes Cryptography Michael Nüsken b-it. Winter 2015/2016
Lecture Notes Cryptography Michael Nüsken b-it (Bonn-Aachen International Center for Information Technology) Winter 2015/2016 c 2015, 2016 Michael Nüsken Organizational Organizational Course website: https://cosec.bit.uni-bonn.de/students/teaching/15ws/15ws-crypto/
More informationC - Cryptography
Coordinating unit: 270 - FIB - Barcelona School of Informatics Teaching unit: 749 - MAT - Department of Mathematics Academic year: Degree: 2018 BACHELOR'S DEGREE IN INFORMATICS ENGINEERING (Syllabus 2010).
More informationC - Cryptography
Coordinating unit: 270 - FIB - Barcelona School of Informatics Teaching unit: 749 - MAT - Department of Mathematics Academic year: Degree: 2017 BACHELOR'S DEGREE IN INFORMATICS ENGINEERING (Syllabus 2010).
More informationNetzwerksicherheit [NetSec]
Netzwerksicherheit [NetSec] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/
More informationSecurity Protocols and Infrastructures. Winter Term 2015/2016
Security Protocols and Infrastructures Winter Term 2015/2016 Nicolas Buchmann (Harald Baier) Chapter 5: Standards for Security Infrastructures Contents Introduction and naming scheme X.509 and its core
More informationSecurity Protocols and Infrastructures
Security Protocols and Infrastructures Dr. Michael Schneider michael.schneider@h-da.de Chapter 5: Standards for Security Infrastructures November 13, 2017 h_da WS2017/18 Dr. Michael Schneider 1 1 Introduction
More informationNetzwerksicherheit [NetSec] Systemsicherheit [SysSec]
Netzwerksicherheit [NetSec] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems http://www7.informatik.uni-erlangen.de/~dressler/ dressler@informatik.uni-erlangen.de Systemsicherheit [SysSec]
More informationInternet Engineering Task Force (IETF) Category: Informational ISSN: October 2013
Internet Engineering Task Force (IETF) J. Merkle Request for Comments: 7027 secunet Security Networks Updates: 4492 M. Lochter Category: Informational BSI ISSN: 2070-1721 October 2013 Abstract Elliptic
More informationCOURSE DESCRIPTION. 3. Total estimated hours (hours per semester and didactic activities)
COURSE DESCRIPTION 1. Program Information 1.1 University Alexandru Ioan Cuza University of Iaşi 1. Faculty Faculty of Computer Science 1.3 Department Computer Science 1.4 Study Domain Computer Science
More informationCT30A8800 Secured communications
CT30A8800 Secured communications Pekka Jäppinen September 11, 2007 Pekka Jäppinen, Lappeenranta University of Technology: September 11, 2007 General Ti5318800 Secured Communications Lecturer: Pekka Jäppinen
More informationSUMMARY OF INFORMATION ON EACH COURSE
1. Name of Course Applied Cryptography 2. Course Code TAC 3121 3. Status of Course Specialisation Core for B.IT Security Technology [Applies to (cohort) ] 4. MQF Level/Stage Note : Certificate MQF Level
More informationח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms
Public Key Cryptography Kurose & Ross, Chapters 8.28.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) AddisonWesley, April 2009. Copyright 19962010,
More informationKris Gaj Research and teaching interests: ECE 646 Cryptography and Computer Network Security. Course web page: Contact: ECE 646
646 and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing Contact:
More informationDigital Signatures. Cole Watson
Digital Signatures Cole Watson Opening Activity Dr. Cusack owns a lockbox, padlock, and keys. The padlock is private and unique to him. The keys are public and they can only open Dr. Cusack s lockbox.
More informationKurose & Ross, Chapters (5 th ed.)
Kurose & Ross, Chapters 8.2-8.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) Addison-Wesley, April 2009. Copyright 1996-2010, J.F Kurose and
More informationLecture Notes 14 : Public-Key Infrastructure
6.857 Computer and Network Security October 24, 2002 Lecture Notes 14 : Public-Key Infrastructure Lecturer: Ron Rivest Scribe: Armour/Johann-Berkel/Owsley/Quealy [These notes come from Fall 2001. These
More informationEE3315 Internet Technology EE3315 Internet Technology Overview Slide 1
EE3315 Internet Technology http://www.cityu.edu.hk/ug/current/course/ee3315.htm EE3315 Internet Technology Overview Slide 1 Course Aim This course aims to provide students with the knowledge of key protocols
More informationCourse Modelling of Concurrent Systems Summer Semester 2016 University of Duisburg-Essen
Course Modelling of Concurrent Systems Summer Semester 2016 University of Duisburg-Essen Harsh Beohar LF 265, harsh.beohar@uni-due.de Harsh Beohar Course Modelling of Concurrent Systems 1 Course handler
More informationSI - Computer Security
Coordinating unit: 270 - FIB - Barcelona School of Informatics Teaching unit: 701 - AC - Department of Computer Architecture Academic year: Degree: 2017 BACHELOR'S DEGREE IN INFORMATICS ENGINEERING (Syllabus
More informationECE 646 Cryptography and Computer Network Security. Course web page: Kris Gaj Research and teaching interests: Contact: ECE web page Courses ECE 646
646 Cryptography and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing
More informationCourse Modelling of Concurrent Systems Summer Semester 2016 University of Duisburg-Essen
Course Modelling of Concurrent Systems Summer Semester 2016 University of Duisburg-Essen Harsh Beohar LF 265, harsh.beohar@uni-due.de Harsh Beohar Course Modelling of Concurrent Systems 1 Course handler
More informationECE 646 Cryptography and Computer Network Security. Kris Gaj Research and teaching interests:
646 Cryptography and Computer Network Security Course web page: Google Kris Gaj 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing
More information1) Revision history Revision 0 (Oct 29, 2008) First revision (r0)
To: INCITS Technical Committee T10 From: David L. Black, EMC Email: black_david@emc.com Date: October 29, 2008 Subject: SPC-4: Digital Signature Authentication (08-423r0) 1) Revision history Revision 0
More informationFIT5044 Network security. Unit Guide. Semester 1, 2010
FIT5044 Network security Unit Guide Semester 1, 2010 The information contained in this unit guide is correct at time of publication. The University has the right to change any of the elements contained
More informationFIT3056 Secure and trusted software systems. Unit Guide. Semester 2, 2010
FIT3056 Secure and trusted software systems Unit Guide Semester 2, 2010 The information contained in this unit guide is correct at time of publication. The University has the right to change any of the
More informationCPSC 4600 Biometrics and Cryptography Fall 2013, Section 0
CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0 Course: CPSC4600, Section 0, CRN 42532 Title: Biometrics and Cryptography Class Schedule: EMCS302, MW 2:00 pm-3:15 pm Credit: 3 Faculty: Dr. Li
More informationT Cryptography and Data Security
T-79.4501 Cryptography and Data Security Lecture 10: 10.1 Random number generation 10.2 Key management - Distribution of symmetric keys - Management of public keys Stallings: Ch 7.4; 7.3; 10.1 1 The Use
More information- 4 hours per week (2 hours lectures + 2 hours laboratory exercises)
Course title: INFORMATION SYSTEMS SECURITY Lecturers Asst.Prof. Tonimir Kišasondi, Ph.D. Language of Croatian and English instruction: Schedule: 60 teaching hours - 4 hours per week (2 hours lectures +
More informationChannel Coding and Cryptography Part II: Introduction to Cryptography
Channel Coding and Cryptography Part II: Introduction to Cryptography Prof. Dr.-Ing. habil. Andreas Ahrens Communications Signal Processing Group, University of Technology, Business and Design Email: andreas.ahrens@hs-wismar.de
More informationPKI Knowledge Dissemination Program. PKI Standards. Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore
PKI Standards Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore Under the Aegis of Controller of Certifying Authorities (CCA) Government of India 1 PKCS Why PKCS? Even
More informationECE 646 Cryptography and Computer Network Security. Kris Gaj Research and teaching interests:
646 Cryptography and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 18013-3 Second edition 2017-04 Information technology Personal identification ISO-compliant driving licence Part 3: Access control, authentication and integrity validation
More informationCryptography SSL/TLS. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea
Cryptography SSL/TLS Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 History Secure Sockets Layer was developed by Netscape in 1994 as a protocol which permitted persistent
More information2. SCQF level: Choose 3. SCQF credit value ECTS credit value: 10
Module Descriptor Part one: Module leader s section: core module details 1. Module title: Network Security and Cryptography 2. SCQF level: Choose 3. SCQF credit value 20 4. ECTS credit value: 10 5. Module
More informationCryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
More informationA SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS
A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS Ounasser Abid 1 and Omar Khadir 2 1, 2 Laboratory of Mathematics, Cryptography and Mechanics, FSTM University Hassan II of Casablanca, Morocco
More informationPublic Key Algorithms
CSE597B: Special Topics in Network and Systems Security Public Key Cryptography Instructor: Sencun Zhu The Pennsylvania State University Public Key Algorithms Public key algorithms RSA: encryption and
More informationTest Conditions. Closed book, closed notes, no calculator, no laptop just brains 75 minutes. Steven M. Bellovin October 19,
Test Conditions Closed book, closed notes, no calculator, no laptop just brains 75 minutes Steven M. Bellovin October 19, 2005 1 Form 8 questions I m not asking you to write programs or even pseudo-code
More informationFaculty of Science & Information Technology
Faculty of Science & Information Technology Department: Computer Science COURSE SYLLABUS Short Description Student s Copy One copy of this course syllabus is provided to each student registered in this
More informationCSci 4211: Data Communications and Computer Networks. Time: Monday and Wednesday 1 pm to 2:15 pm Location: Vincent Hall 16 Spring 2016, 3 Credits
CSci 4211: Data Communications and Computer Networks Time: Monday and Wednesday 1 pm to 2:15 pm Location: Vincent Hall 16 Spring 2016, 3 Credits 1 Instructor David Hung-Chang Du Email: du@cs.umn.edu Office:
More informationDiffie-Hellman. Part 1 Cryptography 136
Diffie-Hellman Part 1 Cryptography 136 Diffie-Hellman Invented by Williamson (GCHQ) and, independently, by D and H (Stanford) A key exchange algorithm o Used to establish a shared symmetric key Not for
More informationETSI TS V1.3.1 ( )
TS 101 861 V1.3.1 (2006-01) Technical Specification Time stamping profile 2 TS 101 861 V1.3.1 (2006-01) Reference RTS/ESI-000049 Keywords electronic signature, IP, security 650 Route des Lucioles F-06921
More informationAcronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector
Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National
More informationCity University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18
City University of Hong Kong offered by Department of Computer Science with effect from Semester B 2017/18 Part I Course Overview Course Title: Internet Security and E-Commerce Protocols Course Code: CS4286
More informationThe Cryptographic Sensor
The Cryptographic Sensor Libor Dostálek and Václav Novák {libor.dostalek, vaclav.novak}@prf.jcu.cz Faculty of Science University of South Bohemia České Budějovice Abstract The aim is to find an effective
More informationJustification: IT/COMP 421 is now IT421. Adjustments made so both CS and IT majors have equivalent prereqs. Corrects error in course justification.
CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL Courses must be submitted by October 15, 2013, and finalized by the end of the fall semester to make the next catalog (2014-15)
More informationSMPTE Standards Transition Issues for NIST/FIPS Requirements
SMPTE Standards Transition Issues for NIST/FIPS Requirements Contents 2010.5.20 DRM inside Taehyun Kim 1 Introduction NIST (National Institute of Standards and Technology) published a draft special document
More informationComputer Networks IT321
Computer Networks IT321 CS Program 3 rd Year (2 nd Semester) Page 1 Assiut University Faculty of Computers & Information Computer Science Department Quality Assurance Unit Computer Networks Course Specifications
More informationM.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from
M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from 2017-18 Sl. No Course No. Subject Teaching Schedule Examination
More informationCSE 127: Computer Security Cryptography. Kirill Levchenko
CSE 127: Computer Security Cryptography Kirill Levchenko October 24, 2017 Motivation Two parties want to communicate securely Secrecy: No one else can read messages Integrity: messages cannot be modified
More informationKOMAR UNIVERSITY OF SCIENCE AND TECHNOLOGY (KUST)
Programming Concepts & Algorithms Course Syllabus Course Title Course Code Computer Department Pre-requisites Course Code Course Instructor Programming Concepts & Algorithms + lab CPE 405C Computer Department
More informationNetworks and Communications MS216 - Course Outline -
Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the
More informationPKCS #3: Diffie-Hellman Key-Agreement
1 of 6 5/19/2006 1:04 PM PKCS #3: Diffie-Hellman Key-Agreement Standard An RSA Laboratories Technical Note Version 1.4 Revised November 1, 1993 * 1. Scope This standard describes a method for implementing
More informationKey Management and Distribution
Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
More informationBCA III Network security and Cryptography Examination-2016 Model Paper 1
Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct
More informationCT30A8800 Secured communications
CT30A8800 Secured communications Pekka Jäppinen October 31, 2007 Pekka Jäppinen, Lappeenranta University of Technology: October 31, 2007 Secured Communications: Key exchange Schneier, Applied Cryptography:
More informationCourse and Contact Information. Course Description. Course Objectives
San Jose State University College of Science Department of Computer Science CS157A, Introduction to Database Management Systems, Sections 1 and 2, Fall2016 Course and Contact Information Instructor: Dr.
More informationPKCS #3: Diffie-Hellman Key- Agreement Standard
PKCS #3: Diffie-Hellman Key- Agreement Standard An RSA Laboratories Technical Note Version 1.4 Revised November 1, 1993 * 1. Scope This standard describes a method for implementing Diffie-Hellman key agreement,
More informationIntroduction. Ahmet Burak Can Hacettepe University. Information Security
Introduction Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr Information Security 1 Books Textbook: Network Security: Private Communication in a Public World, 2nd Edition. C. Kaufman, R. Perlman,
More informationE-commerce security: SSL/TLS, SET and others. 4.1
E-commerce security: SSL/TLS, SET and others. 4.1 1 Electronic payment systems Purpose: facilitate the safe and secure transfer of monetary value electronically between multiple parties Participating parties:
More informationIntroduction. Cambridge University Press Mathematics of Public Key Cryptography Steven D. Galbraith Excerpt More information
1 Introduction Cryptography is an interdisciplinary field of great practical importance. The subfield of public key cryptography has notable applications, such as digital signatures. The security of a
More informationSecurity Protocols and Infrastructures. Winter Term 2014/2015
Security Protocols and Infrastructures Winter Term 2014/2015 Nicolas Buchmann (Harald Baier) Chapter 6: Extended Validation Certificates, PKCS, Current Topics Regarding PKI Contents Extended Validation
More informationSE 4472a: Information Security
Western University Faculty of Engineering Department of Electrical and Computer Engineering SE 4472a: Information Security Course Outline 2014-15 Description: This course provides an introduction to the
More informationEvolving Standards in Security. Michael Garrison Stuber
Evolving Standards in Security Michael Garrison Stuber Sad but true... Cartoon courtesy of xkcd.com Trends & Responses Evolution from unsecure to secure Acceptance of ECC Struggling with certificates Demand
More informationPUBLIC KEY CRYPTO. Anwitaman DATTA SCSE, NTU Singapore CX4024. CRYPTOGRAPHY & NETWORK SECURITY 2018, Anwitaman DATTA
PUBLIC KEY CRYPTO Anwitaman DATTA SCSE, NTU Singapore Acknowledgement: The following lecture slides are based on, and uses material from the text book Cryptography and Network Security (various eds) by
More informationTowards a more secure and scalable verifying PKI of emrtd
Journal of Computer Security 22 (2014) 1025 1049 1025 DOI 10.3233/JCS-140522 IOS Press Towards a more secure and scalable verifying PKI of emrtd Nicolas Buchmann and Harald Baier da/sec Biometrics and
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on
More informationCSC 111 Introduction to Computer Science (Section C)
CSC 111 Introduction to Computer Science (Section C) Course Description: (4h) Lecture and laboratory. Rigorous introduction to the process of algorithmic problem solving and programming in a modern programming
More informationA privacy-preserving authentication service using mobile devices
A privacy-preserving authentication service using mobile devices Mihai Togan Security Software Architect certsign Context Mobile devices Present everywhere What to consider High performance Computing power
More informationHW/Lab 3: SSL/TLS. CS 336/536: Computer Network Security DUE 11am on Nov 10 (Monday)
HW/Lab 3: SSL/TLS CS 336/536: Computer Network Security DUE 11am on Nov 10 (Monday) This HW/Lab assignment covers Lectures 7. Please review these thoroughly before starting to work on the assignment. It
More informationJaap van Ginkel Security of Systems and Networks
Jaap van Ginkel Security of Systems and Networks November 5, 2012 Part 3 Modern Crypto SSN Week 2 Hashes MD5 SHA Secret key cryptography AES Public key cryptography DES Book Chapter 1 in full Chapter 2
More informationLegal Regulations and Vulnerability Analysis
Legal Regulations and Vulnerability Analysis Bundesamt für Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security) Germany Introduction of the BSI National Authority for Information
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 9594-8 Sixth edition 2008-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information
More informationCryptography MIS
Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message
More informationECE 297:11 Reconfigurable Architectures for Computer Security
ECE 297:11 Reconfigurable Architectures for Computer Security Course web page: http://mason.gmu.edu/~kgaj/ece297 Instructors: Kris Gaj (GMU) Tarek El-Ghazawi (GWU) TA: Pawel Chodowiec (GMU) Kris Gaj George
More informationPublic Key Infrastructures
Public Key Infrastructures Certcoin Cryptography and Computer Algebra Prof. Johannes Buchmann Dr. Johannes Braun Background Blockchain Distributed database, consisting of a list of blocks Decentralized
More informationMaster Course in Computer Science Orientation day
Master Course in Computer Science Orientation day Info on the Department of Computer Science Ranked first (in its area) in 5-year Research Assessment by Ministry of University and Research 2013 e 2017
More informationThe University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus
The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus 1 Course title Computer Security 2 Course number 1901463 Credit hours (theory, practical) 3 3 Contact hours (theory, practical)
More informationProgramming 1. Outline (111) Lecture 0. Important Information. Lecture Protocol. Subject Overview. General Overview.
Programming 1 (111) Lecture 0 College of Computer Science and Engineering Taibah University S1, 1439 Outline Important Information Lecture Protocol Subject Overview General Overview Course Objectives Studying
More informationInternet Engineering Task Force (IETF) Request for Comments: 6160 Category: Standards Track April 2011 ISSN:
Internet Engineering Task Force (IETF) S. Turner Request for Comments: 6160 IECA Category: Standards Track April 2011 ISSN: 2070-1721 Abstract Algorithms for Cryptographic Message Syntax (CMS) Protection
More informationLecture 2 Applied Cryptography (Part 2)
Lecture 2 Applied Cryptography (Part 2) Patrick P. C. Lee Tsinghua Summer Course 2010 2-1 Roadmap Number theory Public key cryptography RSA Diffie-Hellman DSA Certificates Tsinghua Summer Course 2010 2-2
More informationCOURSE OUTLINE. Last Amendment Edition Procedure No. Lecturer /blog Room No. Phone No. / Name.
FACULTY OF COMPUTING Page 1 of 6 COURSE 0 PRE-REQUISITE none EQUIVALENCE CONTACT HOURS 4 Lecturer e-mail/blog Room No. Phone No. 1. Dr. Siti Hajar Othman hajar@utm.my / www.comp.utm.my/hajar 347-04, N8
More informationFundamental Algorithms
Fundamental Algorithms WS 2006/2007 Jens Ernst Lehrstuhl für Effiziente Algorithmen Institut für Informatik General Information: Audience: Students of the program Computational Science and Engineering
More informationT Cryptography and Data Security
T-79.159 Cryptography and Data Security Lecture 10: 10.1 Random number generation 10.2 Key management - Distribution of symmetric keys - Management of public keys Kaufman et al: Ch 11.6; 9.7-9; Stallings:
More informationDigital Certificates Demystified
Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates
More informationComputer Science Curriculum for International Students
Computer Science Curriculum for International Students 2011-2012 Language of instruction Although the lecturer is allowed to teach his course in Dutch, - the course notes, handbook and/or other information
More informationIntroduction to Programming
Introduction to Programming Summer Term 2014 Dr. Adrian Kacso, Univ. Siegen adriana.dkacsoa@duni-siegena.de Tel.: 0271/740-3966, Office: H-B 8406 State: April 9, 2014 Betriebssysteme / verteilte Systeme
More informationPROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Telecommunications and Networks Award MSc School School of Engineering and Mathematical Sciences Department or equivalent School
More informationLecture 1 Course Introduction
UMass Lowell Computer Science 91.580.201 Geometric Modeling Prof. Karen Daniels Spring, 2009 Lecture 1 Course Introduction Course Introduction What is Geometric Modeling? Adapted from: Geometric Modeling
More informationAcademic Course Description
BEC601 - COMPUTER COMMUNICATION AND NETWORKS Course (catalog) description Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication
More informationCollege Algebra. Cartesian Coordinates and Graphs. Dr. Nguyen August 22, Department of Mathematics UK
College Algebra Cartesian Coordinates and Graphs Dr. Nguyen nicholas.nguyen@uky.edu Department of Mathematics UK August 22, 2018 Agenda Welcome x and y-coordinates in the Cartesian plane Graphs and solutions
More informationCrypto Background & Concepts SGX Software Attestation
CSE 5095 & ECE 4451 & ECE 5451 Spring 2017 Lecture 4b Slide deck extracted from Kamran s tutorial on SGX, presented during ECE 6095 Spring 2017 on Secure Computation and Storage, a precursor to this course
More informationInternet Engineering Task Force (IETF) Request for Comments: 7192 Category: Standards Track April 2014 ISSN:
Internet Engineering Task Force (IETF) S. Turner Request for Comments: 7192 IECA Category: Standards Track April 2014 ISSN: 2070-1721 Abstract Algorithms for Cryptographic Message Syntax (CMS) Key Package
More informationCSci 4211: Introduction to Computer Networks. Time: Monday and Wednesday 2:30 to 3:45 pm Location: Smith Hall 231 Fall 2018, 3 Credits
CSci 4211: Introduction to Computer Networks Time: Monday and Wednesday 2:30 to 3:45 pm Location: Smith Hall 231 Fall 2018, 3 Credits 1 Instructor David Hung-Chang Du Email: du@cs.umn.edu Office: Keller
More informationB.C.A (5 th Semester) Assessment Policy
Theory Parameters B.C.A (5 th Semester) 030010514: DSE6 Fundamentals of Web Application Development Policy Assessm ent Code Type Duration Number of questions Marks of each Weightage in CIE of 40 marks
More informationSoftware Engineering II
Software Engineering II Introduction and Organization Software Engineering II WS 2018/19 Ralf Teusner ralf.teusner@hpi.de Prof. Plattner, Dr. Uflacker Enterprise Platform and Integration Concepts Group
More informationDesigning and Managing a Windows Public Key Infrastructure
Designing and Managing a Windows Public Key Infrastructure Key Data Course #: 2821A Number of Days: 4 Format: Instructor-Led Certification Track: Exam 70-214: Implementing and Managing Security in a Windows
More informationDERIVED UNIQUE TOKEN PER TRANSACTION
SESSION ID: ASEC-W04 DERIVED UNIQUE TOKEN PER TRANSACTION Jeff Stapleton VP Security Architect Wells Fargo X9F4 workgroup chair Application Security Solution: tokenization technology Substitute sensitive
More informationKey Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings
Key Exchange References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings Outlines Primitives Root Discrete Logarithm Diffie-Hellman ElGamal Shamir s Three Pass
More information