Hasso-Plattner-Institut25 Jahre HPI
Hasso-Plattner-Institut25 Jahre HPI
 

Identity Management for End Users (Sommersemester 2021)

Dozent: Prof. Dr. Anja Lehmann (Cyber Security - Identity Management)

Allgemeine Information

  • Semesterwochenstunden: 2
  • ECTS: 3
  • Benotet: Ja
  • Einschreibefrist: 18.03.2021 - 09.04.2021
  • Lehrform: Seminar
  • Belegungsart: Wahlpflichtmodul
  • Lehrsprache: Englisch
  • Maximale Teilnehmerzahl: 10

Studiengänge, Modulgruppen & Module

Cybersecurity MA
  • CYAD: Cyber Attack and Defense
    • HPI-CYAD-K Konzepte und Methoden
  • CYAD: Cyber Attack and Defense
    • HPI-CYAD-T Techniken und Werkzeuge
  • CYAD: Cyber Attack and Defense
    • HPI-CYAD-S Spezialisierung
  • IDMG: Identity Management
    • HPI-IDMG-K Konzepte und Methoden
  • IDMG: Identity Management
    • HDI-IDMG-T Techniken und Werkzeuge
  • IDMG: Identity Management
    • HPI-IDMG-S Spezialisierung
IT-Systems Engineering MA
Digital Health MA
Data Engineering MA

Beschreibung

Although many secure cryptographic methods for authentication exist, and have been known for a long time, secure identity management for end users is still a largely unsolved problem. Compared with authentication of servers or devices, the secure authentication of end users comes with two additional challenges: First, end users struggle with the task of securely managing keys that are needed for any „classic“ cryptographic operation. Second, authentication and identity management for end users must not interfere with their right to privacy.

Topics

In this seminar, we will explore three main approaches to IdM for end users, their respective advantages and disadvantages, and investigate their progress in current cryptographic research:

  • Password-based authentication (How to minimize the risk and impact of password breaches? Standardization of Password-Authenticated Key Exchange protocols)
  • Single Sign-On (How to avoid a single point of failure and privacy bottleneck? Privacy-enhancing technologies for SSO)
  • New (key-based) approaches, e.g., FIDO, WebAuthn, DID, VC

Each of the three topics will be investigated in small groups, looking at recent advances in research or standardization efforts. The findings are collected in a brief report and presented at the end of the semester.

Timeline & Work Mode

  • Weak 1: Kick-off lecture introducing the different problem statements and relevant literature
  • Weak 2: Topic assignment
  • Mid-term: Brief presentations on progress
  • End of semester: full presentation and discussion (each group 45min), hand in written report

The course is limited to max. 10 participants. Priority is given to Cybersecurity students.

Reading Material & Moodle

The detailed list of research topics as well as the Zoom details are in the course Moodle: https://moodle.hpi.de/course/view.php?id=157 (Key: Crypto4IdM)

Voraussetzungen

Basic knowledge in cryptography.

Leistungserfassung

The grade will be based on a presentation of the project results at the end of the semester (50%), the accompanying report (40%) and active participation in the seminar (10%).

Zurück