course: Network Security 1

teaching methods:
lecture with tutorials
Moodle, computer based presentation
responsible person:
Prof. Dr. Jörg Schwenk
Prof. Dr. Jörg Schwenk (ETIT), Dipl.-Math. Marcus Brinkmann (ETIT)
offered in:
winter term

dates in winter term

  • start: Friday the 30.10.2020
  • lecture Fridays: from 12:15 to 13.45 o'clock in Online
  • tutorial Fridays: from 14:15 to 15.45 o'clock in Online


Die Angaben zu den Prüfungsmodalitäten (im WiSe 2020/2021 | SoSe 2021) erfolgen vorbehaltlich der aktuellen Situation. Notwendige Änderungen aufgrund universitärer Vorgaben werden zeitnah bekanntgegeben.
Form of exam:written
Registration for exam:FlexNow
Room : HGD 10


After successful completion of the module, students have a comprehensive understanding of the technical aspects of network security. They have recognized that cryptography alone is not sufficient to solve security problems. They have acquired a comprehensive understanding of complex IT systems. By independently thinking about improving network security, students prepare themselves for their role in professional life. They can analyse new problems and develop new solutions. They are able to argue the benefits of the solutions they have developed. They understand that non-technical factors such as questions of liability and the resulting costs have a significant influence on decisions regarding IT security.


When cryptography is used in a technical environment such as a computer, data or telephone network, security depends not only on purely cryptographic factors but also on the technical embedding of the encryption and signature algorithms. Prominent examples (for faulty embeddings) are EFAIL (, attacks on the WLAN encryption systems WEP and WPA (KRACK) and various attacks on TLS (Bleichenbacher, POODLE, DROWN, ROBOT). The module "Network Security 1" deals with concrete networks for data transmission and examines them from all sides with regard to their security. It comprises the following parts:

  • Introduction: Internet
  • Introduction: confidentiality
  • Introduction: Integrity
  • Introduction: Cryptographic Protocols
  • PPP security (esp. PPTP), EAP protocols
  • WLAN security (WEP, WPA, Wardriving, KRACK)
  • GSM and UMTS mobile radio (authentication and encryption)
  • IPSec (ESP and AH, IKEv1 and v2, attacks on IPSec)
  • File encryption with OpenPGP (data format, Efail, climate-pink)
  • E Mail encryption with S/MIME (SMTP, data format, Efail, POP3, IMAP)

In addition to the systems themselves, published attacks on these systems are also discussed; the students themselves make scientific considerations on how to improve security.



recommended knowledge

Basic knowledge of TCP/IP, basic knowledge of security problems of computer networks at the level of popular journals (e.g. c't).


  1. Schwenk, Jörg "Sicherheit und Kryptographie im Internet", Vieweg, 2014


Distribution onto rooms during the exam: HGB 10: Last Name A - J HGD 10: Last Name K - Z