Latest News
- 03.11.2015: Room for tutorial 2 has changed!
- 02.11.2015: Added 5th tutorial slot
- 14.10.2015: Information on exam dates, tutorial slots, and lecture topics
- 14.10.2015: The website is online
Description
Students learn the basics of cryptography, system security, network security and privacy-preserving mechanisms. They learn to define security goals and are familiarized with the most common attack scenarios.
Topics
- Basics of cryptography
- Basics of system security
- Basics of network security
- Basics of privacy-preserving mechanisms
Mailing List
There is a mailing list that you can use for general discussions and to ask questions. The mailing list’s address is:
cysec14(aeht)mail-infsec.cs.uni-saarland.de
You will get subscribed to the mailing list upon registering for the lecture.
Tutorials
ID | Day | Time | Room | TA |
---|---|---|---|---|
1 | Wed | 14-16 | SR 107 (E1 3) | Joshua Steffensky |
2 | Mon | 12-14 | U 11 (E2 5) | Peter Axt |
3 | Fri | 12-14 | SR 016 (E1 3) | Marius Steffens |
4 | Wed | 16-18 | SR 107 (E1 3) | Alexander Rassier |
5 | Fri | 14-16 | SR 014 (E1 3) | Christian Thiel |
Assignments and Grading
There will be both theoretical exercise sheets and practical projects. For passing the course, the following minimal amount of points is needed:
- 50% of the points from the theoretical exercise sheets; and
- 50% of the points from the practical projects; and
- 50% of the points from the final exam.
To be admitted to the exam, you need at least 50% of the points from the theoretical exercise sheets and 50% of the points from the practical projects.
The final exam will take place on 24 February 2016 , 9:00-12:00 , in the Günter-Hotz-Hörsaal , building E2 2. The backup exam will take place 30 March 2016 , 9:00-12:00 , in the Günter-Hotz-Hörsaal , building E2 2.
Your final grade (in percent) G is calculated by
- G = 0.2P + 0.2T + 0.6 max{F,B}
where P is the final percentage from your practical projects, T is the final percentage from your theoretical exercises, F is the final percentage from your final exam and B is the final percentage from your backup exam.
Lecture Notes
Date | Slides | Theoretical exercise | Practical project | Material and remarks |
---|---|---|---|---|
29.10.2015 | Welcome lecture & Cryptography: Introduction and History |
Exercise sheet 1
(due: 5 Nov 2015)
Solution of exercise sheet 1 |
Slide set 1
Slide set 1 (three on one) Lecture Notes |
|
5.11.2015 | System Security: Security Principles & Authentication |
Exercise sheet 2
(due: 12 Nov 2015)
Solution of exercise sheet 2 |
Slide set 2
Slide set 2 (three on one) |
|
12.11.2015 | System Security: Access Control & Malware |
Exercise sheet 3
(due: 19 Nov 2015)
Solution of exercise sheet 3 |
Slide set 3
Slide set 3 (three on one) |
|
19.11.2015 | System Security: Control-flow hijacking |
Exercise sheet 4
(due: 03 Dec 2015)
buffer.ova Solution of exercise sheet 4 |
Slide set 4
Slide set 4 (three on one) Transcript Exploit Demo |
|
26.11.2015 | Network Security: Basic Network Security and Defenses |
Exercise sheet 5
(due: 10 Dec 2015)
Trace file Solution of exercise sheet 5 |
Slide set 5
Slide set 5 (three on one) |
|
3.12.2015 | no lecture | |||
10.12.2015 | Network Security: Web Application Security |
Exercise sheet 6
(due: 17 Dec 2015)
Solution of exercise sheet 6 |
Slide set 6
Slide set 6 (three on one) |
17.12.2015 | Cryptography: Symmetric Cryptography |
Exercise sheet 7
(due: 07 Jan 2016)
Solution of exercise sheet 7 |
Slide set 7
Slide set 7 (three on one) Lecture Notes |
24.12.2015 | no lecture | Christmas vacation | ||
31.12.2015 | no lecture | Christmas vacation | ||
7.1.2016 | Cryptography: MACs and Hashes |
Exercise sheet 8
(due: 14 Jan 2016)
Solution of exercise sheet 8 |
Slide set 8
Slide set 8 (three on one) Lecture Notes |
|
14.1.2016 | Cryptography: Mathematical Foundations and Asymmetric Cryptography I |
Exercise sheet 9
(due: 21 Jan 2016)
Solution of exercise sheet 9 |
Slide set 9
Slide set 9 (three on one) Lecture Notes |
|
21.1.2016 | Cryptography:Asymmetric Cryptography II; Privacy: Network Anonymity |
Exercise sheet 10
(due: 28 Jan 2016)
Solution of exercise sheet 10 |
Slide set 10
Slide set 10 (three on one) Lecture Notes |
|
28.1.2016 | no lecture | Lecture Cancelled | ||
4.2.2016 | Privacy: Network Anonymity and Database Privacy |
Exercise sheet 11
(due: 11 Feb 2016)
Solution of exercise sheet 11 |
Exercise sheet 11b
(due: 15 Feb 2016, 2pm)
MD.sig MD.sml Solution of exercise sheet 11b good evil |
Slide set 11
Slide set 11 (three on one) |
11.2.2016 | Special lecture |