Course Contents

Main content

Cryptography Foundations (252-0407-00)

course description

Learning Objectives

After this course, you will be able to

  • 
understand the basic concepts and scientific thinking in cryptography;
  • understand and apply some core cryptographic techniques;
  • 
do simple security proofs for cryptographic schemes; and you will
  • 
be prepared and motivated to dive into the scientific literature

Content Description

Fundamentals and applications of cryptography. Topics include

  • cryptographic thinking (reductions, simulation-based security, composition, security proofs)
  • one-way functions, pseudo-randomness, hash functions
  • symmetric encryption and authentication systems,
  • public-key encryption systems,
  • digital signature schemes,
  • some cryptographic protocols,
  • some cryptanalytic techniques,
  • some applications and case studies.

ECTS: 7 CP (as of AS 2010)

Prerequisites

Familiarity with the basic cryptographic concepts as treated for example in the core course "Information Security" is helpful but can in principle also be acquired in parallel to attending the course.

Cryptographic Protocols (252-0408-00)

course description

Learning Objectives

The course presents a selection of hot research topics in cryptography. The choice of topics varies and may include provable security, interactive proofs, zero-knowledge protocols, secret sharing, secure multi-party computation, e-voting, etc.

Indroduction to a very active research area with many gems and paradoxical results. Spark interest in fundamental problems.

Content Description

Latest Topics in Cryptography will be discussed

ECTS: 5 CP

Prerequisites

A basic understanding of fundamental cryptographic concepts (as taught for example in the course Information Security or in the course Cryptography) is useful, but not required.

System Security (252-1414-00)

, course description

Learning Objectives

After this course you will be able to

  • classify and describe vulnerabilities and protection mechanisms of secure hardware (smartcards, crypto-coprocessors), operating systems and software systems and
  • analyze / reason about basic protection mechanisms for modern OSs, software and hardware systems.

Content Description

The lecture covers the security of individual computer systems, including personal computers, smart cards, and dedicated platforms. The course starts with considerations of cryptosystem implementations and side channel attacks, security of widely used computer platforms and tamper-resistant hardware. The course continues with the examination of operating system and application-related security mechanisms, from their security architectures to malware; this part also covers virtualization and sandboxing mechanisms and modern virtualization platforms. Finally, the course ends with a set of selected security topics like biometrics and computer forensics.

ECTS: 5 CP

Network Security (227-0577-00)

, , , course description

Learning Objectives

  • Students are aware of current threats that Internet services and networked devices face and can explain appropriate countermeasures.
  • Students can identify and assess known vulnerabilities in a software system that is connected to the Internet.
  • Students know fundamental network security concepts.
  • Students have an in-depth understanding of important security technologies.
  • Students know how to configure a real firewall and know some penetration testing tools from their own experience.

Content Description

Risk management and the vulnerability lifecycle of software and networked services are discussed. Threats like denial of service, spam, worms, and viruses are studied in-depth. Fundamental security related concepts like identity, availability, authentication and secure channels are introduced. State of the art technologies like secure shell, network and transport layer security, intrusion detection and prevention systems, cross-site scripting, secure implementation techniques and more for securing the Internet and web applications are presented. Several case studies illustrate the dark side of the Internet and explain how to protect against current threats. A hands-on computer lab that accompanies the lecture gives a deep dive on firewalls, penetration testing and intrusion detection. This lecture is intended for students with an interest in securing Internet services and networked devices. Students are assumed to have knowledge in networking as taught in the Communication Networks lecture.

This lecture and the oral exam are held in English.

ECTS: 5 CP

Security of Wireless Networks (251-1411-00)

course description

Learning Objectives

After this course you will be able to:

  • describe and classify security goals and attacks in wireless networks,

  • describe security architectures of the following wireless systems and networks: 802.11 (WiFi), GSM/UMTS, RFID, ad hoc/sensor networks,
  • reason about security protocols for wireless networks, and

  • implement mechanisms to secure 802.11 (WiFi) networks.

Content Description

This course covers attacks and protection mechanisms for wireless networks: wireless electronic warfare: jamming and target tracking, secure localization, time synchronization mechanisms; security protocols in cellular (GSM/UMTS), WLAN and multi-hop networks; security of multi-hop (sensor and ad-hoc) networks; RFID security and privacy.

ECTS: 4 CP

Formal Methods for Information Security (263-4600-00)

, , course description

Learning Objectives

The students will learn the key ideas and theoretical foundations of formal modelling and analysis of security protocols and authorization policies. The students will complement their theoretical knowledge by solving practical exercises and using various related tools.

Content Description

The lecture treats formal and cryptographic methods for modelling and analysis of security-critical systems. The first and main part of the lecture will concentrate on cryptographic protocols. Cryptographic protocols such as SSL/TLS, SSH, Kerberos and IPSec form the basis for secure communication and business processes. Numerous attacks on published protocols, such as public-key Kerberos, show that the design of these protocols is extremely error-prone. A rigorous analysis of these protocols is therefore indispensable. Besides an overview of existing analysis methods and tools the lecture will convey the theoretical basis and functioning of some selected methods and tools. The tutorials offer the possibility of applying some tools on concrete protocols. The second part of the lecture focuses on formal methods for modelling and analysing authorization and access control systems. We will cover the foundations of authorization logics in distributed systems, and study a few notable existing formal logics developed in the past, such as SecPal and DKAL.

ECTS: 4 CP

Applied Security Laboratory (251-0811-00)

, course description

Learning Objectives

to develop practical skills in securing systems and applications and to deepen one's knowledge of Information Security by applying theoretical knowledge acquired in other courses to different practical problems.

Content Description

The students will study a number of topics in a hands-on fashion and carry out experiments in order to better understand the need for secure implementation and configuration of IT systems and to assess the effectivity and impact of security measures.

The students will also complete an independent project: based on a set of functional requirements, they will design and implement a prototypical IT system. In addition, they will conduct a thorough security analysis and devise appropriate security measures for their systems. Finally, they will carry out a technical and conceptual review of another system. All project work will be performed in teams and must be properly documented. 

The Applied Security Laboratory addresses two major topics: Operating system security (hardening, vulnerability scanning, access control, logging) and application security with an emphasis on web applications (web server setup, common web exploits, authentication, session handling, code security).

ECTS: 8 CP

Prerequisites

The lab covers a variety of different techniques. Thus, participating students must have a solid foundation in the following areas: information security, operating system administration (especially Unix/Linux), and networking.

  • Students are expected to have a basic understanding of Perl and PHP, because several example applications are implemented in one of these languages.
  • Students must be prepared to spend more than three hours per week to complete the lab assignments and the project. This applies particularly to students who do not meet the requirements given above.
  • Participants must be able to understand both German and English.
  • All participants must sign the lab's charter and usage policy.

Laboratory: Computer-Aided Modelling and Reasoning (263-4630-00)

, , course description

Learning Objectives

The "computer-aided modelling and reasoning" lab is a hands-on course about using an interactive theorem prover to construct formal models of algorithms, procotols, and programming languages and to reason about their properties. The lab will have two parts: The first introduces various modelling and proof techniques. The second part consists of a project in which the students apply these techniques.

The students learn to effectively use a theorem prover to create unambiguous models and rigorously analyse them. They learn how to write precise and concise specifications and to exploit the proof assistant as a tool for checking and analysing such models and for taming their complexity.

Content Description

The "computer-aided modelling and reasoning" lab is a hands-on course about using an interactive theorem prover to construct formal models of algorithms, procotols, and programming languages and to reason about their properties. The focus is on applying logical methods to concrete problems supported by a theorem prover. The course will demonstrate the challenges of formal rigor, but also the benefits of machine support in modelling, proving and validating.

The lab will have two parts: The first introduces basic and advanced modelling techniques (functional programs, inductive definitions, modules) and the associated proof techniques (term rewriting, resolution, induction, proof automation). In the second, the students work in teams of 2-3 on a project in which they apply these techniques to a given topic: they build a formal model and prove its desired properties. The topic will be taken from the area of programming languages, model checking, or  information security.

ECTS: 8 CP

Seminar: Current Topics in Information Security (252-4601-00)

, , , course description

Learning Objectives

The main goals of the seminar are the independent study of scientific literature and assessment of its contributions as well as learning and practicing presentation techniques.

Content Description

The seminar covers various topics in information security, including network security, cryptography and security protocols. The participants are expected to read a scientific paper and present it in a 35-40 min talk. At the beginning of the semester a short introduction to presentation techniques will be given. Selected Topics:

  • security protocols: models, specification & verification
  • trust management, access control and non-interference
  • side-channel attacks
  • identity-based cryptography
  • host-based attack detection
  • anomaly detection in backbone networks
  • key-management for sensor networks

Actively contributing participants receive 2 CP.

Seminar on Cryptography (252-0932-00)

, , course description

Content Description

Latest Topics in Cryptography will be discussed. Learn about current topics in the area of Cryptography.

Prerequisites

The knowlegde gained in Information Security and in Cryptography.

Actively contributing participants receive 2 CP.

Seminar: Quantum Information and Cryptography (252-4800-00)

, course description

Content Description

This seminar will cover different topics in the border area between quantum physics, information theory and cryptography.

Actively contributing participants receive 2 CP.

 
 
Page URL: http://www.infsecmaster.ethz.ch/Course_selection/course_contents.html
26.04.2017
© 2017 Eidgenössische Technische Hochschule Zürich