Official course description:

Full info last published 10/03-21
Course info
Language:
English
ECTS points:
7.5
Course code:
KSSECU21KU
Participants max:
40
Offered to guest students:
yes
Offered to exchange students:
yes
Offered as a single subject:
yes
Price for EU/EEA citizens (Single Subject):
10625 DKK
Programme
Level:
MSc. Master
Programme:
MSc in Computer Science
Staff
Course manager
Full Professor
Teacher
Assistant Professor
Teacher
Postdoc
Course semester
Semester
Forår 2021
Start
1 February 2021
End
14 May 2021
Exam
Exam type
ordinær
Internal/External
ekstern censur
Grade Scale
7-trinsskala
Exam Language
GB
Abstract
This course provides the necessary tools for analysing systems and security protocols.
Description

In security I, you learned about the adversarial environment and how difficult it is to secure IT systems. In security II, you learn about the foundations of cryptography and security protocols and ways to analyze their security.  You will learn how security properties are not compositional; that security is not absolute, that is, any "secure" system leaves residual assumptions, especially about trust.
Specifically, this course provides the theoretical and practical foundation for understanding and working the area of Cybersecurity: 

  • cryptography
  • security protocol design techniques
  • tool-based practical verification, e.g., using Proverif 
  • formal techniques in computational and symbolic models
  • security policies and properties, including IndCPA and IndCCA security 
  • case studies 

Formal prerequisites

Security I (7,5 ECTS), elective course on the MSc in Software Design

Discrete Mathematics (7,5 ECTS), mandatory course on the MSc in Software Design

Introduction to Programming (15 ECTS), mandatory course on the MSc in Software Design

Intended learning outcomes

After the course, the student should be able to:

  • Design and analyze cryptographic protocols for adversarial environments
  • Analyze basic cryptographic protocol designs in the computational model
  • Explain and apply proofs by reduction to prove the security of cryptographic constructions
  • Explain cryptanalysis and differential privacy
Learning activities

The course comprises lectures, lab sessions. In parallel, a project runs throughout the course. There will be 12 weeks of lectures, 2 weeks of project work only.

Mandatory activities
Quizzes:
There will be six quizzes on Learn-IT. To be eligible for the exam you must reach at least a 50% average (of all quizzes total).

Project:
At the end of the course, you must submit as a group a project to Learn-IT, which will be evaluated pass/fail. To be eligible for the exam, you must pass the project.

The student will receive the grade NA (not approved) at the ordinary exam, if the mandatory activities are not approved and the student will use an exam attempt.

Course literature

The course literature is published in the course page in LearnIT.

Student Activity Budget
Estimated distribution of learning activities for the typical student
  • Preparation for lectures and exercises: 15%
  • Lectures: 25%
  • Exercises: 25%
  • Assignments: 15%
  • Exam with preparation: 10%
  • Other: 10%
Ordinary exam
Exam type:
C: Submission of written work, External (7-point scale)
Exam variation:
C22: Submission of written work – Take home
Exam submission description:
Exam duration: 4 hour take home exam - Please, disregard the 1 day duration below.
Random fraud control with Zoom will be conducted right after the submission.
Student Affairs and Programmes will randomly select 20 % of students who will have to show up in Zoom to check authorship of submitted solutions.
The selection of students for fraud control will be published in LearnIT right after the exam together with a link to the Zoom meeting.
Take home duration:
1 day

Time and date