Class 1:
 Introduction

 Information Characteristics and Privacy

 Encryption  symmetric and asymmetric

 Vulnerabilities

 Security and Cryptography

 Number theory 
Class 2:
 Trend in internet crime/hacking

 Vulnerabilities  viruses, spam, id theft, buffer overflow

 Countermeasures and Security Procedures

 Trust and software,
Ken Thompson
lecture 
Class 3:
 Information Security  confidentiality and integrity

 Coin tossing on Telephone (hashing)

 Cryptography Basics (encryption, XOR) 
 Brute Force breaking

 Hashing, Random Numbers

 Cryptographic Functions (authentication, access control,
signatures, certificates, secret sharing, zero knowledge proofs,
secure elections, digital cash) 
Class 4:
 RFID and weak challenge response in DST cards (see)

 DES brute force cracking

 Ceaser cipher, Affine Cipher, Vigenere Cipher 
 KASISKI Attack 
 Cryptananalysis (several approaches) 
Class 5:
 CIA Kryptos, and
MS Word
vulnerability

 Coin tossing with hash functions and the Birthday Attack
vulnerability

 PrivacyIntegrityAuthenticationNon
RepudiationCertificationSignatures

 Identities, Message Authentication Codes, Challenge
response (symmetric and public keys) 
Class 6:
 Key Strength 
 Key Management 
 Crypto protocols

 Attacks against protocols

 Merkles Puzzles 
Class 7:
 Merkles Puzzles, cont. 
 Diffie Helman Key exchange 
 Hash functions 
Class 8:
 Hash Functions

 Large number  properties

 Random numbers

 CSPRNG  how to? 
 Authentication (shared secret) 
Class 9:
 Symmetric Encryption Algorithms

 Lucifer, DES, 3DES, IDEA, AES, Skipjack, Clipper 
 Backdoor in Clipper 
Class 10:
 Authentication  public keys

 Messaging  public keys

 Key Exchange  symmetric keys

 Key Exchange  public Keys

 Integrating authenticationa nd message integrity  public
and symmetric keys 
 MITM attacks 
Class 11:
 MITM Attacks 
 Digital Signatures

 Digital Certificates 
Class 12:
Class 13:
 Project preliminaries (get a certificate from cacert.org or
trustcenter.de and verify the correctness of the certificate). 
 How Certificate Authorities work 
 SSL 


