Opportunity of a post-exam review
07.04.2015 / 08.04.2015
9:30 – 12:30
S4|14 room 4.3.04
Just send me an email until 01.04.2015 to register for the exam review and propose a time/date. Otherwise your exam will not be present for review!
Exam
10.02.2015 12:00-13:30 D14/303
Registration deadline: 11.01.2015
For further details visit schedule for examinations (no login needed)
Slides
00: Formalities and Contents (2014-10-09)
01: Motivation and Security Goals (2014-10-09)
02: Cryptographic and Mathematical Foundations (2014-10-14)
03: Diffie-Hellman Key Exchange and RSA (2014-10-23)
04: Introduction to Abstract Syntax Notation 1 – ASN.1 (2014-10-30)
05: Standards for Security Infrastructures (2014-11-06)
06: Extended Validation Certificates, PKCS, Current Topics Regarding PKI (2014-11-06, 2014-11-13)
07: Security Protocols for Electronic ID Cards (2013-11-20 & 2013-11-27)
08: Transport Layer Security Protocol (2014-12-04 & 2014-12-11)
09: Status Verification of Certificates (2014-12-18)
10: Validity Models of Electronic Signatures (2015-01-15)
Schedule
Lecture
Thursday: 16:00-17:30 D14/3.03
2014-10-09
2014-10-14 (lecture instead of exercise – 12:00-13:30 D14/1.03)
2014-10-23
2014-10-30
2014-11-06
2014-11-13
2014-11-20
2014-11-27
2014-12-04
2014-12-11
2014-12-18
2015-01-15
2015-01-22
Exercise
Tuesday: 12:00-13:30 D14/1.03
2014-10-28: 1st exercise
2014-11-11: 2nd exercise
2014-11-25: 3rd exercise
2014-12-09: 4th exercise
2015-01-13: optional time slot (does not take place, content will be integrated into the next lecture, as discussed in the lecture)
x- Group lab
Wednesday: 10:15-11:45 D14/3.03
2014-10-22: 1st lab
2014-11-05: 2nd lab
2014-11-19: 3rd lab
2014-12-03: 4th lab
2014-12-17: 5th lab
2015-01-21: optional time slot – (no physical meeting, if you have further questions contact Lisa)
y- Group lab
Wednesday: 10:15-11:45 D14/3.03
2014-10-29: 1st lab
2014-11-12: 2nd lab
2014-11-26: 3rd lab
2014-12-10: 4th lab
2015-01-14: 5th lab
2015-01-21: optional time slot– (no physical meeting, if you have further questions contact Lisa)
For further details check the lecture timetable, the OBS or the x-y-Scheme.
Exercise files
Exercise 1 (2014-10-28)
Exercise 2 (2014-11-11)
Exercise 3 (2014-11-25)
Exercise 4 (2014-12-09)
Lab files
Lab 1 (X: 2014-10-22, Y: 2014-10-29)
Lab 2 (X: 2014-11-05, Y: 2014-11-12)
Lab 3 (X: 2014-11-19, Y: 2014-11-26)
Lab 3 extra: sniffed-data, hints
Lab 4 (X: 2014-12-03 Y: 2014-12-10 )
Lab 4 extra: passport-LDS-data, CSCA certificate
Lab 5 (X: 2014-12-17, Y: 2015-01-14, Optional: 2015-01-21)
Lab 5 extra: capture files
References
- A. Menezes, P. van Oorschoot, S. Vanstone: Handbook of Applied Cryptography, CRC Press, 1997
- V. Shoup, A Computational Introduction to Number Theory and Algebra, Cambridge University Press, 2008
- N.P. Smart, Cryptography, An Introduction : Third Edition, 2013
- David Cooper et.al.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, RFC 5280, May 2008
- T. Dierks and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2, RFC 5246, August 2008
- ICAO Document 9303
- BSI Technical Report TR-03110