|
After the course the student will
- have knowledge of and understand some key advanced network security technologies, and their main advantaged, disadvantages, and consequences when applying them in practice,
- understand in particular how privacy and availability can be increased when designing networks and networking services,
- have a basic understanding of algorithmics: the theory and practice of modeling and designing (distributed) algorithms, and how to prove them correct.
|
|
The Advanced Network Security course builds on the bachelor course on Network Security. Where the bachelor course is quite hands on, this master course is of a more theoretical nature. Moreover, instead of focusing on the traditional objectives of confidentiality, integrity and authenticity, the master course shows how to deal with faults to increase availability, and how to build privacy friendly network services.
The course covers the following topics.
- A brief overview of distributed systems, how to model them, and some basic distributed algorithms like leader election and mutual exclusion
- A selection of fault-tolerant distributed algorithms (from byzantine agreement to self-stabilisation) as an alternative approach to availability.
- We will present TLS in detail and discuss advanced attacks on it (such as Lucky13, BEAST, POODLE, and DROWN)
- We will discuss some well-known methods to provide anonymous communication, such as mix-nets, DC-nets and onion routing.
- We will discuss the workings of state-of-the-art anonymous communication systems, e.g., Tor, Vuvuzela, Riffle and cMix, as well as their advantages and disadvantages.
|
 |
|
|
|
 Literature will provided during the course, and will consist of key scientific publications and overview articles covering the material covered in class. |
• 32 hours lecture • 108 hours individual study period Extra information teaching methods: The course will consist of traditional lectures, supplemented with take home excercises. |
For more information refer to the course website http://www.cs.ru.nl/~jhh/ans.html |
The course covers the following topics.
- Refresher: a brief overview of current networking technologies and protocols, and traditional security approaches taken.
- A selection of fault-tolerant distributed algorithms (from byzantine agreement to self-stabilisation) as an alternative approach to availability.
- Security and privacy in peer-to-peer networking.
- Designs for privacy preserving networks, like Tor, Mixnets, I2P, or DC nets.
- Future internet architectures: how breaking away from the Internet legacy allows us to solve security problems in a more fundamental and efficient way. |
Bachelor network security or equivalent. Cryptology or equivalent |
| | Required materialsArticlesLiterature will provided during the course, and will consist of key scientific publications and overview articles covering the material covered in class. |
 |
| Instructional modes Course Attendance Mandatory |  | Yes |
 GeneralThe course will consist of traditional lectures, supplemented with take home excercises.
 | Lecture Attendance Mandatory |  | Yes |

 | Zelfstudie 
 |
| Tests TentamenTest weight |  | 1 |
Opportunities |  | Block KW4, Block KW4 |
 |
|
| |