Seminar: Practical Cryptographic SystemsSeminar in Summer Semester 2014
|Instructor:||Dr. Aniket Kate|
|Time and Place:||Friday 10:15 to 12:00, E1 7 (MMCI), room 0.01|
|Teaching Assistant:||Tim Ruffing|
|Contact Email and Registration:||email@example.com|
- Presentation Schedule
- Requirement for Obtaining Credit Points
- Presentation Schedule
- Course Structure
- Useful Links
Over the last thirty years, the cryptographic protocols have become an indispensable part for our day-to-day life. We use cryptography when we unlock our cell-phones, perform our banking transactions, and even when we vote during an election.
However, not all of the employed cryptographic constructions have been designed and incorporated in the practical systems with at most care, and every so often we come across much-publicized attacks on the cryptographic systems; e.g., flaws in random number generators, the WEP protocol or satellite phone encryption, side-channel attacks, credit card PIN cracking, and many more. Some of these breaks have severe physical, psychological and economical consequences, and it is important that we learn the lessons from them as we do not want to make similar mistakes while amending to the broken systems, or while designing the new protocols.
In this seminar, we will study some of these practical cryptographic systems used in daily life. We will choose some interesting cryptographic systems from a variety of areas ranging from trusted computing to bitcoins.
Every student presents one paper. Furthermore, every student is required to to review the presented paper plus four additional papers (details). The presenter and the reviewers are indicated below the respective paper.
Note that attending the presentations is mandatory.
- [09/05/2014] Anonymity and Censorship Evasion
S&P 2013Lukas WedekingChristopher Schommer, Tobias Theobald, Rafaella Antonyan, Nicholas Merritt
CSS 2013Sascha GroßMarc Schweig, Aastha Mehta, Christian Haupt, Inken Hagestedt
- [16/05/2014] Crypto Currencies 1
Christopher SchommerUzair Mahmood, Rafaella Antonyan, Muhammad Bilal Zafar, Nicholas Merritt
ACM IMC 2013Tobias TheobaldLukas Wedeking, Sascha Groß, Artem Perlov, Umidjon Urunov
- [23/05/2014] Crypto Currencies 2
IEEE S&P 2013Marc SchweigChristian Haupt, Muhammad Bilal Zafar, Umidjon Urunov, Nicholas Merritt
IEEE S&P 2014Artem PerlovLukas Wedeking, Sascha Groß, Inken Hagestedt, Satrajit Ghosh
- [30/05/2014] Social Networks and Payment Networks
USENIX Security 2012Uzair MahmoodLukas Wedeking, Tobias Theobald, Muhammad Bilal Zafar, Inken Hagestedt
USENIX NSDI 2011Rafaella AntonyanChristopher Schommer, Aastha Mehta, Christian Haupt, Umidjon Urunov
- [06/06/2014] Randomness and Guest Lecture
ACM CCS 2013Aastha MehtaSascha Groß, Artem Perlov, Uzair Mahmood, Satrajit Ghosh
Guest Lecture: CoinShuffle: Practical Decentralized Coin Mixing for BitcoinTechnical ReportPedro Moreno-Sanchez (Guest Lecturer)(no reviews)
- [13/06/2014] Project Idea Discussion
We will arrange small discussion slots next week to guide you regarding your projects.
Please send us an email that introduces your group and your project topic area by 08/06/2014 (one email per group). Note that we do not expect the exact project title, but just a hint towards the topic in a few sentences. This will help us to avoid possible conflicts.
- [20/06/2014] Crypto Implementations (room 3.23 instead of the usual room!)
ACM SIGCOMM 2013Inken HagestedtChristopher Schommer, Uzair Mahmood, Rafaella Antonyan, Umidjon Urunov
Technical Report, IACR ePrint ArchiveSatrajit GhoshLukas Wedeking, Marc Schweig, Artem Perlov, Christian Haupt
- [27/06/2014] Certificate Infrastructures
S&P 2013Umidjon UrunovChristopher Schommer, Tobias Theobald, Marc Schweig, Inken Hagestedt
NDSS 2014Nicholas MerrittUzair Mahmood, Aastha Mehta, Muhammad Bilal Zafar, Satrajit Ghosh
- [04/07/2014] Cloud Security
Guest Lecture: Verifiable Delegation of Computation on Outsourced DataACM CCS 2013Raphael M. Reischuk (Guest Lecturer)Rafaella Antonyan, Satrajit Ghosh, Nicholas Merrit
IEEE S&P 2014Muhammad Bilal ZafarSascha Groß, Tobias Theobald, Artem Perlov, Aastha Mehta
- [11/07/2014] Project proposal talks (10 min + 5 min discussion each)
Implementation of lattice-based one-way authenticated key exchange protocol LatticeORSatrajit Ghosh, Umidjon Urunov
Scalable DissentAastha Mehta, Nicholas Merrit
Designing recommendation systems for private OSNsUzair Mahmood, Muhammad Bilal Zafar
Browser fingerprinting – an attack on privacySascha Groß, Rafaella Antonyan
How does Tor choose entry nodes?Inken Hagestedt, Lukas Wedeking
A distributed secure instant messaging chat networkChristopher Schommer, Tobias Theobald
Requirement for Obtaining Credit Points (Short Summary)
- Prepare and give a 30-minute presentation for your selected paper.
- Write reviews for at least five pre-assigned papers.
- Attend and actively participate in the paper discussions moderated by the presenters. If you are ill, let us know in advance.
- Prepare a short proposal and 5-page report for your project.
- Prepare and give a 10-minute presentation for your project.
Note that for project ideas possibly leading to publications with more efforts, it is possible to extend them for an additional master practical training (6 credit points). We expect to generate at least two-three workshop-quality publications from the course, and encourage students to put more efforts towards their projects.
Course StructureThe seminar will primarily consist of reading, reviewing, and presenting research papers and working on a small research project. Your grade in the course depends upon the following four task:
Paper PresentationTwo papers will be assigned to each class period; each paper will be presented to the class by one student, in a 30-minute presentation. The student presenting the paper will then lead the class in a discussion of the paper, taking 45 minutes for the presentation and discussion in total for each paper. We will also save 2-3 minutes during these 45 minutes to give a constructive feedback to the presenter. All students are encouraged to read both of the papers before the class.
ReviewsEvery student is required to review the presented paper plus four additional papers. The reviews are due two days before the corresponding paper is presented. A conference style review system will be available.
ProjectsStudents are expected to work in pairs on an original research project on some topic related to cryptographic systems. Each pair will submit a proposal to the instructor by a pre-decided date. Students will be provided some feedback on their proposals in two weeks after that. At the end of class period, they will present their proposal/work to the class with a 10-minute presentation.
In addition, by the end of the semester, they will produce a 5-page report describing their project. It is also possible to make a group of different sizes; however, the expectations may vary accordingly.
Bonus PointsYou can also earn bonus points by performing better than expected in class discussions, your paper-reviews or your project. They will improve your grade in the following ways. One bonus point corresponds to a third mark in the German grading system. therefore, three bonus points will improve your final grade by a full mark, e.g., from 2.7 (C+) to 1.7 (B+).
- For every two above expectation paper-reviews, you will be awarded one bonus point.
- For an excellent project (with an emphasis on novelty), you will be awarded one bonus point.
- For the best participation in classroom discussions, two students will be awarded one bonus point each.