Google Search
Prof. Dr.-Ing. Günter Schäfer
Head of Department
Technische Universität Ilmenau
Fakultät für Informatik und Automatisierung
Institut für Praktische Informatik und Medieninformatik
Fachgebiet Telematik/Rechnernetze
Helmholtzplatz 5
98693 Ilmenau
Zusebau, Raum 3042
Tel.: +49 3677 69-4574
Prof. Dr.-Ing. Günter Schäfer, Department of Telematics/Computer Networks Ilmenau University of Technology Room Z 3042 Tel.: 03677 694576 Email: guenter.schaefer[at]tu-ilmenau.de Homepage: http://www.tu-ilmenau.de/telematik/mitarbeiter/prof-guenter-schaefer
This class gives an introduction to the area of network security. Starting from existing threats and the security requirements resulting from these threats, basic security services and mechanisms will be introduced and their integration in network procols and architectures will be discussed.
This class is suitable for students in their graduate studies who have already followed a basic networking class like Telematics 1.
Wednesday, even week, 09:00 - 10:30, Sr K 2077
Thursday, 09:00 - 10:30, Sr K 2003B
Please note that all obligatory information is located primarily in the respective Moodle course.
When using the materials provided below for preparation of your exam, please be aware that the spoken text of the lectures is authoritative. Video Recordings of the Lecture can be accessed in an English and a German version.
PDF-File | Content | |
---|---|---|
00 - Course Advertisement | Course Advertisement | |
01 - Intro | Introduction and Overview | |
02 - CryptoBasics | Basics of Cryptography | |
03 - SymmetricCrypto | Symmetric Cryptography | |
04 - AsymmetricCrypto | Asymmetric Cryptography | |
05 - ModificationCheck | Modification Check Values | |
06 - RandomNumbers | Random Number Generation | |
07 - CryptoProtocols | Cryptographic Protocols | |
08 - SecureGroupCommunication | Secure Group Communication | |
09 - AccessControl | Access Control | |
10 - Integration | Integrating Security Services into Communications Architectures | |
11 - LinkLayerSecurity | Security Protocols of the Data Link Layer | |
12 - IPsec | The IPsec Architecture for the Internet Protocol | |
13 - TransportLayerSecurity | Security Protocols of the Transport Layer | |
14 - MobileSecurity | Security Aspects of Mobile Communications | |
15 - WlanSecurity | Security of Wireless Local Area Networks | |
16 - GsmUmts | Security of GSM and UMTS Networks |
The book [SR14] and [SR16] (english translation) is the main textbook for this course.
[Amo94] | E. G. Amorosi. Fundamentals of Computer Security Technology. Prentice Hall. 1994.Provides an easy-to-read introduction to basic computing system security concepts, but does not address network security much; now out of print in bookstores. | |
[Cha00] | Brent Chapman and Elizabeth Zwicky. Building Internet Firewalls Second Edition. O'Reilly, 2000.One of the standard works on firewalls. | |
[Dor00a] | N. Doraswamy, D. Harkins. IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks. 216 pages, Prentice Hall, 1999.The book gives an overview of the IPSec security architecture for the Internet protocol architecture; for people who don't like to read RFCs; however, these cannot be replaced by the book, especially since it explains some details carelessly. | |
[For94b] | Warwick Ford. Computer Communications Security - Principles, Standard Protocols and Techniques. 494 pages, Prentice Hall. 1994.good book introducing the basics of network security, unfortunately no longer up to date and out of print in bookstores. | |
[Gar96] | Simson Garfinkel and Gene Spafford. Practical Internet & Unix Security, O'Reilly, 1996.One of the standard works on Unix security. | |
[KPS95] | C. Kaufman, R. Perlman and M. Speciner. Network Security - Private Communication in a Public World. Prentice Hall. 1995.some basic concepts and algorithms of network security are well introduced. | |
A. J. Menezes, P. C. Van Oorschot, S. A. Vanstone. Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997.A very carefully written and comprehensive reference work on cryptography; as the book series indicated suggests, the book demands the reader's full attention. A click on the hyperlink is worthwhile... :o) | ||
[Sch96] | B. Schneier. Applied Cryptography Second Edition: Protocols, Algorithms and Source Code in C. 758 pages, John Wiley & Sons, 1996.Very comprehensive work on cryptography; easier to read, but not as accurate and detailed as [Men97a]. | |
G. Schäfer. network security. dpunkt.verlag, 676 pages, softcover 49 Euro, July 2014.The book adapted to this lecture. | ||
G. Schäfer. security in fixed and wireless networks. John Wiley & Sons, 624 pages, hardcover 90 Euro, October 2016.the English edition of [SR14]. | ||
[Sta98a] | W. Stallings. Cryptography and Network Security: Principles and Practice, Hardcover, 569 pages, Prentice Hall, 2nd ed, 1998.Very good introduction to the field. | |
[Sta00a] | W. Stallings. Network Security Essentials: Applications and Standards. 366 pages, Prentice Hall, 2000. Essentiallyan abridged version of [Sta98a], which introduces cryptography relatively briefly in one chapter, and instead provides a chapter on network management security with a short new section on SNMPv3. |
Oral Exam