Duration:
1 Semester | Turnus of offer:
each winter semester | Credit points:
6 |
Course of studies, specific field and terms: - Master IT-Security 2019 (optional subject), IT Security and Privacy, 1st, 2nd, or 3rd semester
- Master Medical Informatics 2014 (optional subject), major subject informatics, 1st or 2nd semester
|
Classes and lectures: - Modeling and Analysing Security (exercise, 1 SWS)
- Modeling and Analysing Security (practical course, 1 SWS)
- Modeling and Analysing Security (lecture, 3 SWS)
| Workload: - 20 Hours exam preparation
- 85 Hours private studies and exercises
- 75 Hours in-classroom work
| |
Contents of teaching: | - Modelling and formalizing protocols and security properties
- Adversaries and models of attacks, security pitfalls
- Symbolic methods and automatic verification of security properties
- Consistency and synchronization
| |
Qualification-goals/Competencies: - The students can comprehensively elaborate on algorithmic basics for IT security.
- They can report on security properties.
- They can recite complex methods for IT security and apply them.
- They are able to specify, analyse and verify protocols and security properties.
- They can describe techniques for automatic verification of security properties.
|
Grading through: |
Requires: |
Responsible for this module: Teachers: |
Literature: - V. Cortier, S. Kremer, editors: Formal Models and Techniques for Analyzing Security Protocols - Cryptology and Information Security Series 5, IOS Press, 2011
- C. P. Pfleeger, S. L. Pfleeger: Security in Computing - Prentice-Hall, 2007
- A. Joux: Algorithmic Cryptanalysis - CRC Press 2009
- J. Katz, Y. Lindell: Introduction to Modern Cryptography - Chapman & Hall 2008
- S. Loepp, W. Wootters: Protecting Information - Cambridge Univ. Press 2006
|
Language: - English, except in case of only German-speaking participants
|
Notes:Admission requirements for taking the module: - None (the competencies under |
Letzte Änderung: 2.10.2023 |
für die Ukraine