Lehrinhalte
a) Hardware Security
More and more powerful electronical devices and their applications, from mobiles, car infotainment, e-banking, electronic cash, internet via PC, mobile, gaming consoles or televisions to machine to machine communication are pervading our lives. In that context the requirements to these systems to ensure a secure and reliable program execution even in malicious environments are constantly increasing. These requirements can often be fulfilled with special hardware only. Modern CPUs and platforms provide with e.g. La Grande (Intel) and Trustzone (ARM) hardware extensions which make construction of such systems feasible. This lecture deals with existing modern security hardware and discusses their functions and principles.
b) Cryptography for Security
Over the past 30 years cryptography has been transformed from a mysterious art into a mathematically rigorous science. Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. This course provides a rigorous yet accessible treatment of modern cryptography, with a focus on definitions, precise assumptions, and rigorous proofs. We introduce the core principles of modern cryptography, including the modern, computational approach to security that overcomes the limitations of perfect secrecy. An extensive treatment of private key encryption and message authentication follows. We illustrate design principles for block ciphers, such as the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES), and present provably secure constructions of block ciphers from lower-level primitives. The second half focuses on public key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, El Gamal, and other cryptosystems. After exploring public key encryption and digital signatures, this lecture concludes with a discussion of the random oracle model and its applications. This course presents the necessary tools to fully understand this fascinating subject.
c) Quantum Computing
This course provides an introduction to quantum computation. Topics covered include physics of information processing, quantum logic, quantum algorithms including Shor's factoring algorithm, the prime factorization algorithm and Grover's search algorithm, mathematical models of quantum computation, and quantum error correcting codes. Certainly it would be useful to have had a previous course on quantum mechanics, though this is not essential. It would also be useful to know something about (classical) information theory, (classical) coding theory, and (classical) complexity theory, since a central goal of the course will be to generalize these topics to apply to quantum information. But we will review this material when we get to it, so you don't need to worry if you haven't seen it before.
d) Computer Security Seminar
The Computer Security Seminar offered each semester deals with most recent subjects in respect of the latest state of research regarding Computer Security focusing on Internet Security, Cryptography, Hardware Security, Software Security, Quantum Computing and Telecommunication Security.