Clemens H. Cap (Part 2)
The talks will revise some computer security basics in order to establish a
common terminology and knowledge for the next courses to build up.
Part 2 will describe the classical defence methods used in computer security to
counteract the describe attack vectors and establish the desired protection goals.
We will talk about symmetric and asymmetric encryption, hash functions and need
for randomization. In addition to a repetition of basic notions we will deal with
aspects which are of particular importance for small devices, such as processor
performance or limited entropy pools.
Moreover we will address challenges posed by light-weight protocols. We will
outline why the established security technology from classical networking often
fails in IoT and SCADA environments.
The slides are available as PDF.
Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code
in C. 20th edition, 2015. Blackwell Publishing.