Srdjan Capkun: Katalogdaten im Frühjahrssemester 2016

NameHerr Prof. Dr. Srdjan Capkun
LehrgebietInformatik
Adresse
Institut f. Informationssicherheit
ETH Zürich, CNB F 102.2
Universitätstrasse 6
8092 Zürich
SWITZERLAND
Telefon+41 44 632 71 90
Fax+41 44 632 11 72
E-Mailsrdjan.capkun@inf.ethz.ch
URLhttp://www.syssec.ethz.ch/people/capkun
DepartementInformatik
BeziehungOrdentlicher Professor

NummerTitelECTSUmfangDozierende
252-0014-00LDigitaltechnik Information 6 KP3V + 2US. Capkun, F. K. Gürkaynak
KurzbeschreibungDie Vorlesung bietet einen Einstieg in das Gebiet der Digitaltechnik. Zunächst wird auf die technische Realisierung von digitalen Schaltungen eingegangen. Eine Einführung in Hardware-Beschreibungssprachen und deren konkrete Anwendung im Entwurfsprozess schliesst sich an.
LernzielDie Vorlesung bietet einen Einstieg in das Gebiet der Digitaltechnik. Zunächst wird auf die technische Realisierung von digitalen Schaltungen eingegangen. Eine Einführung in Hardware-Beschreibungssprachen und deren konkrete Anwendung im Entwurfsprozess schliesst sich an.
InhaltDie Vorlesung bietet einen Einstieg in das Gebiet der Digitaltechnik. Zunächst wird auf die technische Realisierung von digitalen Schaltungen eingegangen. Die sich daraus ergebenden physikalischen Randbedingungen bestimmen massgeblich die vorgestellten Entwurfsmethoden von kombinatorischer und sequentieller Logik. Eine Einführung in Hardware-Beschreibungssprachen und deren konkrete Anwendung im Entwurfsprozess schliesst sich an.
252-0211-00LInformation Security Information 8 KP4V + 3UD. Basin, S. Capkun
KurzbeschreibungThis course provides an introduction to Information Security. The focus
is on fundamental concepts and models, basic cryptography, protocols and system security, and privacy and data protection. While the emphasis is on foundations, case studies will be given that examine different realizations of these ideas in practice.
LernzielMaster fundamental concepts in Information Security and their
application to system building. (See objectives listed below for more details).
Inhalt1. Introduction and Motivation (OBJECTIVE: Broad conceptual overview of information security) Motivation: implications of IT on society/economy, Classical security problems, Approaches to
defining security and security goals, Abstractions, assumptions, and trust, Risk management and the human factor, Course verview. 2. Foundations of Cryptography (OBJECTIVE: Understand basic
cryptographic mechanisms and applications) Introduction, Basic concepts in cryptography: Overview, Types of Security, computational hardness, Abstraction of channel security properties, Symmetric
encryption, Hash functions, Message authentication codes, Public-key distribution, Public-key cryptosystems, Digital signatures, Application case studies, Comparison of encryption at different layers, VPN, SSL, Digital payment systems, blind signatures, e-cash, Time stamping 3. Key Management and Public-key Infrastructures (OBJECTIVE: Understand the basic mechanisms relevant in an Internet context) Key management in distributed systems, Exact characterization of requirements, the role of trust, Public-key Certificates, Public-key Infrastructures, Digital evidence and non-repudiation, Application case studies, Kerberos, X.509, PGP. 4. Security Protocols (OBJECTIVE: Understand network-oriented security, i.e.. how to employ building blocks to secure applications in (open) networks) Introduction, Requirements/properties, Establishing shared secrets, Principal and message origin authentication, Environmental assumptions, Dolev-Yao intruder model and
variants, Illustrative examples, Formal models and reasoning, Trace-based interleaving semantics, Inductive verification, or model-checking for falsification, Techniques for protocol design,
Application case study 1: from Needham-Schroeder Shared-Key to Kerberos, Application case study 2: from DH to IKE. 5. Access Control and Security Policies (OBJECTIVES: Study system-oriented security, i.e., policies, models, and mechanisms) Motivation (relationship to CIA, relationship to Crypto) and examples Concepts: policies versus models versus mechanisms, DAC and MAC, Modeling formalism, Access Control Matrix Model, Roll Based Access Control, Bell-LaPadula, Harrison-Ruzzo-Ullmann, Information flow, Chinese Wall, Biba, Clark-Wilson, System mechanisms: Operating Systems, Hardware Security Features, Reference Monitors, File-system protection, Application case studies 6. Anonymity and Privacy (OBJECTIVE: examine protection goals beyond standard CIA and corresponding mechanisms) Motivation and Definitions, Privacy, policies and policy languages, mechanisms, problems, Anonymity: simple mechanisms (pseudonyms, proxies), Application case studies: mix networks and crowds. 7. Larger application case study: GSM, mobility
252-4810-00LZISC Information Security Colloquium Information
Findet dieses Semester nicht statt.
0 KP2KS. Capkun, D. Basin, U. Maurer, A. Perrig
KurzbeschreibungSeries of invited lectures about current topics in information security. Schedule according to announcement on the lecture web page.
Lernzielsee above