Cryptography and Society (Sommersemester 2022)
Lecturer:
Prof. Dr. Anja Lehmann
(Cyber Security - Identity Management)
General Information
- Weekly Hours: 2
- Credits: 3
- Graded:
yes
- Enrolment Deadline: 01.04.2022 - 30.04.2022
- Examination time §9 (4) BAMA-O: 29.08.2022
- Teaching Form: Seminar
- Enrolment Type: Compulsory Elective Module
- Course Language: English
- Maximum number of participants: 20
Programs, Module Groups & Modules
- CYAD: Cyber Attack and Defense
- HPI-CYAD-K Konzepte und Methoden
- CYAD: Cyber Attack and Defense
- HPI-CYAD-T Techniken und Werkzeuge
- CYAD: Cyber Attack and Defense
- HPI-CYAD-S Spezialisierung
- IDMG: Identity Management
- HPI-IDMG-K Konzepte und Methoden
- IDMG: Identity Management
- HDI-IDMG-T Techniken und Werkzeuge
- IDMG: Identity Management
- HPI-IDMG-S Spezialisierung
- ISAE: Internet, Security & Algorithm Engineering
- HPI-ISAE-T Techniken und Werkzeuge
- ISAE: Internet, Security & Algorithm Engineering
- HPI-ISAE-K Konzepte und Methoden
- ISAE: Internet, Security & Algorithm Engineering
- HPI-ISAE-S Spezialisierung
- DSEC: Data Security
- DSEC-Konzepte und Methoden
- DSEC: Data Security
- DSEC-Techniken und Werkzeuge
- DSEC: Data Security
- HDAS: Health Data Security
- HPI-HDAS-C Concepts and Methods
- HDAS: Health Data Security
- HPI-HDAS-T Technologies and Methods
- HDAS: Health Data Security
- HPI-HDAS-S Specialization
Description
In this seminar, we will discuss current advances in cryptography as well as their impact on society. After an introduction of the overall area and the goal of the seminar, small groups of 2-3 students will select an individual topic and prepare a technical presentation (~45min) as well as lead a discussion (~45min) on the societal benefits, risks and trade-offs of the presented technologies. At the end of the seminar, a report (6-10 pages, double column format) summarizing the selected topic and the discussion must be handed in.
Topics include:
- Cryptocurrencies
- Smart contracts, NFTs and Web3.0
- Self-Sovereign Identity & European Digital Identity
- „Crypto wars“: end-to-end encryption vs. surveillance
- Apple‘s CSAM detection
- Privacy-preserving analytics
- Privacy-preserving contact tracing & privacy-preserving analytics for GAEN
- Cryptography for #MeToo / Callisto protocol
Students are also invited to propose their own topics.
A more detailed overview of topics and reading suggestions is given in our Moodle.
Requirements
Basic knowledge of cryptography. Attendance of the Cryptography lecture (every winter term) is beneficial but not necessary.
Examination
The grade will be based on the presentation and discussion (60%), the accompanying report (30%) and active participation in the seminar (10%).
Dates
The seminar takes place on Monday 13:30-15:00 at G3.E15 (currently, no hybrid/online option is planned)
Tentative schedule:
25.4 | Introduction, presentation of topics & goal of seminar |
2.5 | Topic selection, Introduction to scientific reading, writing and presentations |
30.5-18.7 | Weakly presentations |
1.8 | Deadline reports |
Zurück