Secure Application Design (SS 2022)
Building Secure Applications
Table of Content
Content
The lecture will give a recap on the core properties of cryptographic primitives, which will themselves be regarded as a black box: e.g. an RSA-based signature algorithm or an ECC-based signature algorithm achieve the same results from an application’s point of view regardless of the huge differences in their mathematical or structural nature (hint: if you are interested in how ECC, RSA or the AES algorithm actually works, there are other lecture for that). After having a clear view on the available building blocks and their protective functions the lecture will focus on the primary task on how to build secure functions and applications by considering all aspects: key delivery, key storage and usage, trust-models, or high-level crypto protocols. To do so the lecture will focus on real world examples, whose cryptographic functions will be built up from scratch dealing with all required aspects. The practical assignments will focus on the actual usage and deployment of cryptographic primitives and their associated keys.COVID-19 Info
For the second half of the semester, the lecture (VO) is in person in HS i11. Recordings will be made available. VO exams will be conducted in person near the end of the semester. The exercises (KU) are virtual.Contact
For live updates and announcements, please join the IAIK Discord and enable the SEAD channels in#getting-started
.
Also, please feel free to send more private questions via email to sead@iaik.tugraz.at
. Further, please use this email address to submit your team's KU concept of Phase One, as described in the KU description below, and also to contact your mentor.
Material
Previous Lecture Exams
Date | Exam Questions |
---|---|
29.06.2022 |
Practicals
Date | Material |
---|---|
16.03.2022 | KU Description v1.0 |
Link for Team Registration | |
24.03.2022 | Update: KU Description v1.1 |
03.06.2022 | Update: KU Description v2.0 |
Administrative Information
Previous Knowledge
Knowledge on how cryptography works (RSA, ECC, AES, hashes etc.)Prerequisites Curriculum
See position in the curriculumObjective
Understanding on how to arrange cryptographic primitives to higher level functions and how to deal with auxiliary functions (e.g. key-management, trust-relationships, secure key storage/usage) in applications.Language
EnglishTeaching Method
Emphasis on a strong interaction between the students and the teacherHow to get a grade
Registration
https://online.tugraz.at/tug_online/sa.gruppen_einteilung?clvnr=254074&corg=983