Network Security [NetSec]

Summer 2011

Contents

This course introduces various aspects of network security. Starting with a discussion of threats and possible attacks, requirements for the design of secure networks will be introduced. We study basic cryptographic algorithms and protocols and, most importantly, their use and integration into state-of-the-art network protocols and architectures. Furthermore, attacks and possible countermeasures will be discussed.

The basic introduction to cryptography and cryptographic protocols follows the recommendations of the Mustercurriculum Kryptologie of the "Fachgruppe für Angewandte Kryptologie der Gesellschaft für Informatik".

    • Cryptography
      Basics, symmetric cryptography, asymmetric cryptography
    • Cryptographic Techniques
      Modification check values, random number generation
    • Security Protocols
      Cryptographic protocols, integrating security services into communication architectures
    • Security of Communication Protocols
      Medium access (PPP, 802.1x, WLAN), network layer (IPSec), transport/session layer (SSL, TLS)
    • Security in Mobile Networks
      Location privacy, pseudonyms, mix networks
    • Attack Detection and Countermeasures
      Attack detection and prevention, IP traceback

Learning Outcome

The learning objective is to unserstand the fundamental concepts of network security. Students understand these concepts and are able to apply this knowledge.

General Information / Methods

This master course will be held in English and all the course material is available in English. Oral exams can be organized in English as well as in German.

  • Lecture, 2 SWS, 4 ECTS
  • Proseminar, 3 SWS, 6 ECTS

Instructors

Schedule

  • Lecture (LV 703779)
    Vorbesprechung: 7.3.2011, 10:15, 3W04
    Wednesday, 8:30am - 10:00am, HS 11
    Thursday, 12:15pm - 1:45pm, HS 11
  • Proseminar (LV 703780)
    Wednesday, 10:15am - 11:45am, RR 22
    Thursday, 10:15am - 11:45am, RR 22

Exams

There will be oral exams for the lecture. We will provide more information at the end of the summer term. The grading of proseminar will be based on the assignments and the discussion of the home work.

Oral examination is by appointment.

Evaluation

Many thanks for the critical and helpful evaluation! In total, we received feedback from 16 students for the lecture and from 20 students for the proseminar.

Literature

  • Günter Schäfer, Netzsicherheit: Algorithmische Grundlagen und Protokolle, Heidelberg, dpunkt.verlag, 2003. [BibTeX, Details...]
  • William Stallings, Cryptography and Network Security: Principles and Practice, ed. old edition, Upper Saddle River, Pearson Prentice Hall, 2005. [BibTeX, Details...]

Lecture

  • Course Organization
    Organization - PDF (Version 1, 1.5.2011, 242kB)
    Introduction - PDF (Version 1, 1.5.2011, 415kB)
  • Cryptography
    Basics of Crytography - PDF (Version 1, 1.5.2011, 165kB)
    Symmetric Cryptography - PDF (Version 2, 11.5.2011, 357kB)
    Asymmetric Cryptography - PDF (Version 2, 11.5.2011, 239kB)
  • Cryptographic Techniques
    Modification Check Values - PDF (Version 1, 10.5.2011, 279kB)
    Random Number Generation - PDF (Version 1, 10.5.2011, 172kB)
  • Security Protocols
    Cryptographic Protocols - PDF (Version 2, 24.5.2011, 532kB)
    Integrating Security Services into Communication Architectures - PDF (Version 1, 15.5.2011, 361kB)
  • Security in Communication Protocols
    Medium Access - PDF (Version 1, 19.5.2011, 295kB)
    Security of Wireless LAN - PDF (Version 1, 19.5.2011, 188kB)
    IPSec Security Architecture for the Internet Protocol - PDF (Version 1, 29.5.2011, 537kB)
    Security Protocols of the Transport Layer - PDF (Version 1, 29.5.2011, 208kB)
  • Security in Mobile Networks
    Location Privacy, Pseudonyms, Mix Networks - PDF (Version 1, 9.6.2011, 238kB)
  • Attack Detection and Countermeasures
    Denial of Service - PDF (Version 1, 9.6.2011, 869kB)
    Attack Detection - PDF (Version 1, 9.6.2011, 1121kB)
    Attack Mitigation and Countermeasures - PDF (Version 1, 9.6.2011, 1301kB)

Proseminar

  • Exercise #1 (11.05.2011) - Introduction (PDF)
    assignment00 - Hello World (PDF, Template)
  • Exercise #2 (12.05.2011) - Enigma (PDF)
    assignment01 - Enigma (PDF, Template)
  • Exercise #3 (18.05.2011) - RSA (PDF)
    assignment02 - RSA (PDF, Template)
  • Exercise #4 (19.05.2011) - Operation Modes (PDF)
    assignment03 - Operation Modes (PDF, Template)
  • Exercise #5 (25.05.2011) - Birthday Attacks (PDF)
    assignment04 - Birthday Attacks (PDF, Template)
  • Exercise #6 (26.05.2011) - Rainbow Tables (PDF)
    assignment05 - Crypto Challenge (PDF, Template)
  • Exercise #7 (01.06.2011) - Pseudo Random Number Generators
    assignment06 - Weak SSH Keys (PDF, Template)
  • Exercise #8 (08.06.2011) - Web Security (PDF)
    assignment07 - Web Challenge (PDF, Template)
  • Exercise #8 (15.06.2011) - TLS (PDF)
    assignment08 - TLS (PDF, Template)
  • Exercise #9 (22.06.2011) - ARP Spoofing (PDF)
    assignment09 - Mix Network (PDF, Template)
  • Exercise #10 (29.06.2011) - RC4 and WEP (PDF)
    assignment10 - RC4 and WEP (PDF, Template)
  • Exercise #11 (30.06.2011) - Netfilter (PDF, PDF)