Security Protocols in Computer Networks
Prof. Dr. M. Damm
Contents
80% lectures, 20% exercises
- Cryptography: Symmetric Cyphers, Asymmetric Cryptography, Hash Functions, electronic signatures
- Protocols: password authentication, challenge response, one-time passwords, Kerberos, HTTP, SSH, SSL, WLAN
- Implementation: prime numbers, exponentation with large numbers, ASN.1, PKCS standards