Winter
2013/14

Electronic Identity
[32259] SE  (2 SWS, Dipl. 3 SP / Ba. 3 SP),
Fr 9:15-10:45 RUD25, 3'113
Instructor: Dr. Wolf Müller

 


Computer Science Department
Systems Architecture Group

 

 
Abstract: The Internet was built without a way to know who and what you are connecting to. This limits what we can do with it and exposes us to growing dangers. If we do nothing, we will face rapidly proliferating episodes of theft and deception that
will cumulatively erode public trust in the Internet. [Kim Cameron, identityblog]


©xkcd
Synopsis:
  • Seminar, Praktische Informatik
  • 2h each week, 2 SWS
  • Students will present a selection of papers that will help you understand which threats exist, judge their significance and learn methods to defend your system against hackers. In addition you will explore the mathematical underpinnings of today's most common security tools and protocols.

Credits:

  In order to obtain credits for this seminar, participants are expected to:

  • Is possible for Bachelor, Diplom (degree of difficulty)
  • This seminar can be combined with "VL IT-Sicherheit Grundlagen" "Modul mit Seminar (BSEM)" zur Studienordnung Bachelor Informatik (Mono-Bachelor) [link]
  • Dipl. 3 SP / Ba. 3 SP
  • Attend regularly (at least 90%).
  • Read each paper before the seminar, to be adequately prepared for discussion.
  • Research an assigned subject; present major findings (45 min presentation; 30 min discussion).
  • Presentations will be evaluated by two members of the audience at the end of each class (Bewertungskriterien-Seminarvortrag.pdf).
  • Presenters summarize their in a term paper (German or English).
  • Presentations may be given in German or English. All documents are in English (exceptions may be granted).

Prerequisites:

  • This seminar is suitable for students of all technical science disciplines who have previously completed courses PI 1,2 or equivalent.

Wiki:

Topics

  • ---Private or Anonymous Communication: Tools, Building blocks & Limits---
  • Survay "Was ist noch sicher" [html][BSI pdf, TLS pdf]
  • ECC elliptic curve cryptograpy [pdf][pdf][pdf]
  • TOR the onion router [pdf][Attack: pdf][Datagram: pdf]
  • JAP "Revocable Anonymity" [http][pdf]
  • openPGP [RFC][Handbook GNUpg pdf]
  • TrueCrypt [http]
  • Zerocoin [http]
  • ---Authentication: Techniques and Tokens---
  • HASH-basierte Signaturen [https]
  • Mozilla Persona [http][persona.org]
  • oAuth2 [oauth.net/2 ]
  • W3C Web Cryptography API [http]
  • On Breaking SAML: Be Whoever You Want to Be [https]
  • OpenID 2.0 [http] and OpenID Connect [http]
  • U-Prove (Technology Overview) [https]
  • IDEMIX, Identity Mixer [http]
  • ---German electronic IDs---
  • DE-Mail [https]
  • ePASS [ICAO]
  • nPA: PACE, EAC [TR-03110]
  • Domain-Specific Pseudonymous Signatures for nPA [pdf]
  • ... (further topics are possible, also own interesting suggestions are welcome)

Syllabus:

 

Date Presenters Topic Slides
18.10.13 Dr. Wolf Müller bootstrap / assignment of topics -
25.10.13 - optional - preparation / research / (re-)assignment of topics -
01.11.13 all elevator speech  
08.11.13 Erik N.
Lena-Luise S.
ECC elliptic curve cryptograpy
JAP "Revocable Anonymity"
[pdf]
[pdf]
15.11.13 Dominique H.
Jürgen K.
TOR [pdf]
[pdf]
22.11.13 --- Kein Seminar (externer Termin)  
29.11.13 Oliver W.
Sebastian M.
$(Alternative zu TOR)
TrueCrypt
[pdf]
[pdf]
06.12.13 Ole R.
Sebastian G.
openPGP [pdf]
13.12.13 Markus W.
Björn G.
Zerocoin [pdf]
20.12.13 Peter W.
Sergej G.
HASH-basierte Signaturen
OpenID 2.0

[pdf]
10.01.14 Andreas S.
Alexander B.
Mozilla Persona [odp]
[pdf]
17.01.14 Jan B.
Sinisa B.
GSM [pdf]
24.01.14 Alexander K.
Stefan K.
De-Mail [pdf]
31.01.14 Joanne C.
Eva H.
ePass [pdf]
07.02.14 Kai W.
Denny H.
NFC-Relay
nPA: PACE, EAC
 
14.02.14      


Recent / Incoming:

Further Readings (Research@SAR & Books):cover

 Links
Cambridge
Ross Anderson's home page
Bruce Schneier
home page
Safe Personal Computing
(DE)
NIST
Computer Security Resource Center
NIST
Federal Information Processing Standards Publications (FIPS)
CERT
cert.org
BSI
Bundesamt für Sicherheit in der Informationstechnik
Biometrics
The Biometric Consortium
Overview (german)
OS specific
Windows-Security
Linux-Security
e-Learning
CrypTool (de)

Legal disclaimer. .  © 2024 Humboldt-Universität zu Berlin, Computer Science Department, Systems Architecture Group. Contact: sar@informatik.hu-berlin.de .