Hasso-Plattner-InstitutSDG am HPI
Hasso-Plattner-InstitutDSG am HPI
  
Login
 

Identity Management for End Users (Sommersemester 2021)

Lecturer: Prof. Dr. Anja Lehmann (Cyber Security - Identity Management)

General Information

  • Weekly Hours: 2
  • Credits: 3
  • Graded: yes
  • Enrolment Deadline: 18.03.2021 - 09.04.2021
  • Teaching Form: Seminar
  • Enrolment Type: Compulsory Elective Module
  • Course Language: English
  • Maximum number of participants: 10

Programs & Modules

Cybersecurity MA
IT-Systems Engineering MA
Digital Health MA
  • HDAS-Concepts and Methods
  • HDAS-Technologies and Methods
  • HDAS-Specialization
Data Engineering MA

Description

Although many secure cryptographic methods for authentication exist, and have been known for a long time, secure identity management for end users is still a largely unsolved problem. Compared with authentication of servers or devices, the secure authentication of end users comes with two additional challenges: First, end users struggle with the task of securely managing keys that are needed for any „classic“ cryptographic operation. Second, authentication and identity management for end users must not interfere with their right to privacy.

Topics

In this seminar, we will explore three main approaches to IdM for end users, their respective advantages and disadvantages, and investigate their progress in current cryptographic research:

  • Password-based authentication (How to minimize the risk and impact of password breaches? Standardization of Password-Authenticated Key Exchange protocols)
  • Single Sign-On (How to avoid a single point of failure and privacy bottleneck? Privacy-enhancing technologies for SSO)
  • New (key-based) approaches, e.g., FIDO, WebAuthn, DID, VC

Each of the three topics will be investigated in small groups, looking at recent advances in research or standardization efforts. The findings are collected in a brief report and presented at the end of the semester.

Timeline & Work Mode

  • Weak 1: Kick-off lecture introducing the different problem statements and relevant literature
  • Weak 2: Topic assignment
  • Mid-term: Brief presentations on progress
  • End of semester: full presentation and discussion (each group 45min), hand in written report

The course is limited to max. 10 participants. Priority is given to Cybersecurity students.

Reading Material & Moodle

The detailed list of research topics as well as the Zoom details are in the course Moodle: https://moodle.hpi.de/course/view.php?id=157 (Key: Crypto4IdM)

Requirements

Basic knowledge in cryptography.

Examination

The grade will be based on a presentation of the project results at the end of the semester (50%), the accompanying report (40%) and active participation in the seminar (10%).

Zurück