Synopsis:- Seminar, Praktische Informatik
- 2h each week, 2 SWS
- Students will present a selection of papers that will help you understand which threats exist, judge their significance and learn methods to defend your system against hackers. In addition you will explore the mathematical underpinnings of today's most common security tools and protocols.
Credits: In order to obtain credits for this seminar, participants are expected to: - Is possible for Bachelor.
- This seminar can be combined with "VL IT-Sicherheit Grundlagen" "Modul mit Seminar (BSEM)" zur Studienordnung Bachelor Informatik (Mono-Bachelor) [link]
- Attend regularly (at least 80%).
- Read each paper before the seminar, to be adequately prepared for discussion.
- Research an assigned subject; present major findings (30 min presentation; 15 min discussion).
- Presentations will be evaluated by two members of the audience at the end of each class (Bewertungskriterien-Seminarvortrag.pdf).
- Presenters summarize their in a term paper (German or English).
The paper should have 6 .. 10 pages (without counting the references), and should contain, abstract, motivation, related work, presentation of topic, conclusion and references. - Presentations may be given in German or English.
Prerequisites: - This seminar is suitable for students of all technical science disciplines who have previously completed courses "GdP" and "algorithms and data structures" or equivalent.
Topics (11/20 assigned): - ---Post Quantum Cryptography---
- Motivation und Survey (Grover, Shor, Timeline, Recommendations, Challenge) [pdf][NIST]
- Quantum Cryptography [pdf:Kapitel 4][pdf]
- HASH-based Signatures [https][pdf]
- NIST FIPS205 "Stateless Hash-Based Digital Signature Standard" [pdf]
- NIST FIPS204 "Module-Lattice-Based Digital Signature Standard" [pdf]
- NIST FIPS203 "Module-Lattice-Based Key-Encapsulation Mechanism Standard" [pdf] Jonas
---Private or Anonymous Communication: Tools, Building blocks & Limits--- - Password Hashing [html][git][pdf] Daniel
- One-TIME-Passwords [RFC6238][RFC4226][https]
- TOR the onion router [pdf][Attack: pdf][Datagram: pdf] Lena
- OTR Off-the-Record Messaging Protocol (version 3) [https]
- Telegramm [html][html][html][pdf] Diana
- Signal [https][https][git] Max
- Kryptografie mit elliptischen Kurven, ECDSA [pdf]
- Dragonfly Key Exchange [RFC] Nils
- VeraCrypt [https][Probleme]
---Authentication: Techniques and Tokens--- - Mozilla Sync 1.5 API (Theory and Praxis) [https][https]
- WebAuthn / FIDO2 / U2F / [W3C][Video][https][WireShark-dissector][Demo]
- Direct Anonymous Attestation (DAA) [pdf]
- ---German electronic IDs---
- ePASS [ICAO]
- nPA: PACE, EAC [TR-03110] Johan
---Network--- - WLAN WPA-2 KRACK [https][pdf]
- Bluetooth Pairing / KNOB-Attack [Specification / 4.2 Security, 4.2.2 Pairing] [https] Anna
- TLS 1.3 [blog][RFC]
- TLS Revocation Mechanismen (CRL, OCSP, OCSP-stapling) in Theorie & Praxis [https]
- OpenVPN [pdf][https][https][https] Roberto
- WireGuard [pdf] Pirmin
- I2P Oskar
- --- (further topics are possible, also own interesting suggestions are welcome) ---
Syllabus: (draft) Date | Presenters | Topic | Slides | 17.10.24 | | bootstrap / assignment of topics | [pdf] | 24.10.24 | (optional) | consultation (fine tuning of topics) | | 31.10.24 | all | elevator speeches (3 min) | | 07,11.24 | | | | 14.11.24 | Daniel | Password Hashing | [pdf] | 21.11.24 | Pirmin | WireGuard | | 28.11.24 | Diana | Telegramm | | 05.12.24 | Max | Signal | | 12.12.24 | Nils | Dragonfly Key Exchange | | 19.12.24 | Oskar | I2P | | 09.01.25 | Johan | nPA: PACE, EAC | | 16.01.25 | Anna | Bluetooth Pairing / KNOB-Attack | | 23.01.25 | Roberto | OpenVPN | | 30.01.25 | Lena | TOR the onion router | | 06.02.25 | Jonas | NIST FIPS203 KEM | | 12.02.25 | | reserved | |
Recent / Incoming:
- BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses [pdf]
- Bluetooth-Lücke: Tastenanschläge in Android, Linux, iOS und macOS einschleusbar [html]
- Unsiche Implementierung PhotoTAN [https]
- Tails -The Amnesic Incognito Live System [https]
- Email 3.0 [http]
- TOR Hardware:SpOnionPi [Spiegel]
- Verschlüsselungssoftware TrueCrypt: Ein Zweifel weniger [heise]
- NFC-Smartphones als sichere Chipkartenleser [http]
- Browser Fingerprinting [Golem][Diplomarbeit]
Further Readings (Research@SAR & Books): | |