Winter
2024/25

Electronic Identity

[3313019] SE  (2 SWS)
Do. 13:15-14:45, RUD26, 1306
Instructor: Dr. Wolf Müller

 


Computer Science Department
Systems Architecture Group

 

 
Abstract: The Internet was built without a way to know who and what you are connecting to. This limits what we can do with it and exposes us to growing dangers. If we do nothing, we will face rapidly proliferating episodes of theft and deception that
will cumulatively erode public trust in the Internet. [Kim Cameron, identityblog]


©xkcd
  
Synopsis:
  • Seminar, Praktische Informatik
  • 2h each week, 2 SWS
  • Students will present a selection of papers that will help you understand which threats exist, judge their significance and learn methods to defend your system against hackers. In addition you will explore the mathematical underpinnings of today's most common security tools and protocols.

Credits:

  In order to obtain credits for this seminar, participants are expected to:

  • Is possible for Bachelor.
  • This seminar can be combined with "VL IT-Sicherheit Grundlagen" "Modul mit Seminar (BSEM)" zur Studienordnung Bachelor Informatik (Mono-Bachelor) [link]
  • Attend regularly (at least 80%).
  • Read each paper before the seminar, to be adequately prepared for discussion.
  • Research an assigned subject; present major findings (30 min presentation; 15 min discussion).
  • Presentations will be evaluated by two members of the audience at the end of each class (Bewertungskriterien-Seminarvortrag.pdf).
  • Presenters summarize their in a term paper (German or English).
    The paper should have 6 .. 10 pages (without counting the references), and should contain, abstract, motivation, related work, presentation of topic, conclusion and references.
  • Presentations may be given in German or English.

Prerequisites:

  • This seminar is suitable for students of all technical science disciplines who have previously completed courses "GdP" and "algorithms and data structures" or equivalent.

Topics (11/20 assigned):

  • ---Post Quantum Cryptography---
  • Motivation und Survey (Grover, Shor, Timeline, Recommendations, Challenge) [pdf][NIST]
  • Quantum Cryptography [pdf:Kapitel 4][pdf]
  • HASH-based Signatures [https][pdf]
  • NIST FIPS205 "Stateless Hash-Based Digital Signature Standard" [pdf]
  • NIST FIPS204 "Module-Lattice-Based Digital Signature Standard" [pdf]
  • NIST FIPS203 "Module-Lattice-Based Key-Encapsulation Mechanism Standard" [pdf] Jonas
    ---Private or Anonymous Communication: Tools, Building blocks & Limits---
  • Password Hashing [html][git][pdf] Daniel
  • One-TIME-Passwords [RFC6238][RFC4226][https]
  • TOR the onion router [pdf][Attack: pdf][Datagram: pdf] Lena
  • OTR Off-the-Record Messaging Protocol (version 3) [https]
  • Telegramm [html][html][html][pdf] Diana
  • Signal [https][https][git] Max
  • Kryptografie mit elliptischen Kurven, ECDSA [pdf]
  • Dragonfly Key Exchange [RFC] Nils
  • VeraCrypt [https][Probleme]
    ---Authentication: Techniques and Tokens---
  • Mozilla Sync 1.5 API (Theory and Praxis) [https][https]
  • WebAuthn / FIDO2 / U2F / [W3C][Video][https][WireShark-dissector][Demo]
  • Direct Anonymous Attestation (DAA) [pdf]
  • ---German electronic IDs---
  • ePASS [ICAO]
  • nPA: PACE, EAC [TR-03110] Johan
    ---Network---
  • WLAN WPA-2 KRACK [https][pdf]
  • Bluetooth Pairing / KNOB-Attack [Specification / 4.2 Security, 4.2.2 Pairing] [https] Anna
  • TLS 1.3 [blog][RFC]
  • TLS Revocation Mechanismen (CRL, OCSP, OCSP-stapling) in Theorie & Praxis [https]
  • OpenVPN [pdf][https][https][https] Roberto
  • WireGuard [pdf] Pirmin
  • I2P Oskar
  • --- (further topics are possible, also own interesting suggestions are welcome) ---

Syllabus: (draft)

DatePresentersTopicSlides
17.10.24 bootstrap / assignment of topics[pdf]
24.10.24(optional)consultation (fine tuning of topics) 
31.10.24allelevator speeches (3 min)
07,11.24   
14.11.24DanielPassword Hashing[pdf]
21.11.24PirminWireGuard 
28.11.24DianaTelegramm 
05.12.24MaxSignal 
12.12.24NilsDragonfly Key Exchange 
19.12.24OskarI2P 
09.01.25JohannPA: PACE, EAC 
16.01.25AnnaBluetooth Pairing / KNOB-Attack 
23.01.25RobertoOpenVPN 
30.01.25LenaTOR the onion router 
06.02.25JonasNIST FIPS203 KEM 
12.02.25 reserved 


Recent / Incoming:

  • BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses [pdf]
  • Bluetooth-Lücke: Tastenanschläge in Android, Linux, iOS und macOS einschleusbar [html]
  • Unsiche Implementierung PhotoTAN [https]
  • Tails -The Amnesic Incognito Live System [https]
  • Email 3.0 [http]
  • TOR Hardware:SpOnionPi [Spiegel]
  • Verschlüsselungssoftware TrueCrypt: Ein Zweifel weniger [heise]
  • NFC-Smartphones als sichere Chipkartenleser [http]
  • Browser Fingerprinting [Golem][Diplomarbeit]

Further Readings (Research@SAR & Books):

 Links
Cambridge
Ross Anderson's home page
Bruce Schneier
home page
Safe Personal Computing
NIST
Computer Security Resource Center
NIST
Federal Information Standards (FIPS)
CERT
cert.org
 

Legal disclaimer. .  © 2024 Humboldt-Universität zu Berlin, Computer Science Department, Systems Architecture Group. Contact: sar@informatik.hu-berlin.de .