Synopsis:
- Seminar, Praktische Informatik, Hauptstudium.
- 2h each week, over one semester (2 SWS).
- Students will present a selection of papers that
will help you understand which threats exist, judge their
significance and learn methods to defend your system against
hackers. In addition you will explore the mathematical underpinnings
of today's most common security tools and protocols. But most of all
you will learn that there is no absolute security - i.e. your will
have to learn ways to detect security breaches and recover from
them.
Credits:
In order to obtain credits for this seminar,
participants are expected to:
- Attend regularly (at least 90%).
- Read each paper before the seminar, to be adequately prepared for
discussion.
- Research an assigned subject; present
major findings (45 min presentation; 30 min
discussion).
- Presentations will be evaluated by two members of
the audience at the end of each class (Bewertungskriterien-Seminarvortrag.pdf).
- Presenters summarize their presentation and relevant
discussion on the Seminar's WIKI page within 2 weeks.
- Presentations may be given in English or German. All documents are in
English (exceptions may be granted).
Prerequisites:
- This seminar is suitable for students of all
technical science disciplines who have previously completed courses PI 1,2,3
or equivalent.
Wiki:
Syllabus:
|
SSL/TLS |
|
|
|
Anonymization |
|
|
|
WLAN
WEP, WPA |
|
|
|
Anonymization of Networks |
|
-
Freeheaven Project
-
Freenet
-
Tarzan
-
TOR
|
Presentation assignments:
Usually 60 minutes talk + 30
minutes discussion except if 2 talks are scheduled then 2 x (40 minutes
talk + 5 min discussion)
Please use the PowerPoint [pot]
or the OpenOffice [otp] template for your
presentation!
Date |
Presenters |
Topic |
Slides |
17.04.07 |
Dr. Wolf Müller |
bootstrap / assignment of topics |
|
24.04.07 |
|
preparation of elevator speech |
|
01.05.07 |
|
holiday |
|
08.05.07 |
All of you |
elevator speeches, 6 min per team |
|
15.05.07 |
D. Oepen, D. Reinert |
Comparison SSL/TLS, TLS for multiple virtual
hosts |
pdf,odp |
22.05.07 |
D. Uhlig, E. Neumann |
Secret Handshakes |
pdf,odp |
29.05.07 |
C. Krause, M. Chiousemoglou |
RSA, DSA Signatures, Elliptic Curve
Cryptography |
pdf,odp |
J. Rycko, W. Wojcikiewicz |
Blinding Signatures |
pdf,odp |
05.06.07 |
M. Fuessel, D. Schneider |
Receiver Anonymity |
pdf,odp |
12.06.07 |
R. Rehak, R. Scherer |
Breaking 104 bit WEP in less than 60 seconds |
pdf,odp |
T. J. Hartmann, Burghard Güther |
Aircrack-ptw-DEMO, 802.11i, WPA-Design |
pdf,odp |
19.06.07 |
C. Rudolf, G. Wittchen |
Freeheaven Project |
pdf,odp |
26.06.07 |
H. Pirk, B. Pollex |
Freenet |
pdf |
03.07.07 |
|
IBM Mainframes Summit
|
|
10.07.07 |
D. Sait, M. Schulze |
Tarzan |
pdf,odp |
17.07.07 |
A. Hormozdiary, E. Redlin |
TOR |
pdf,odp |
Further Readings (Books):
|
|