Security Protocols in Computer Networks

Prof. Dr. M. Damm

Contents

80% lectures, 20% exercises

  • Cryptography: Symmetric Cyphers, Asymmetric Cryptography, Hash Functions, electronic signatures
  • Protocols: password authentication, challenge response, one-time passwords, Kerberos, HTTP, SSH, SSL, WLAN
  • Implementation: prime numbers, exponentation with large numbers, ASN.1, PKCS standards