ATG: Information Security & Cryptography – Fundamentals and Applications June 12−14, 2023 Zurich, Switzerland Lecturers: Prof. David Basin, ETH Zurich Prof. Ueli Maurer, ETH Zurich


Starting 09:00 on Monday June 12 and ending at 17:00 on June 14, 2023.

Information Security: An Overview

Information at Risk: Threats, Security Objectives, and Security Measures

Classification of the Fundamental Information Security Problems

Course Overview

Cryptography: Basic Concepts

Some History

Types and Models of Cryptographic Systems

Cryptographic Functions, Hash Functions

Secrecy, Authenticity, and their Duality and Independence

Symmetric Cryptography: Block Ciphers, Stream Ciphers, MACs, etc.

Randomness and Pseudo-Randomness

Cryptanalytic Attacks, Assumptions, Security Definitions

Public-Key Encryption and Secret-Key Agreement

Digital Signatures, Certificates

Cryptography Foundations

Discrete Mathematics Basics, Groups, Fields

Theoretical Foundations of Cryptography

Discrete Logarithms, Factoring, and other Hard Problems

Design and Analysis of Cryptographic Systems

RSA: Workings and Security Analysis

Diffie-Hellman Protocol: Workings and Security Analysis

Elliptic Curve Cryptography

Modes of Operation for Cryptographic Systems

Security Proofs, Indistinguishability, Reductions

Constructive Cryptography and Universal Composability

System and Network Security

Networking Essentials

Trade-offs in Securing Network Layers

Security Protocols including Kerberos, SSL, IPsec

Security Architectures

Firewalls and Intrusion Detection

PKI and Key Management

Key Management Challenges

PKI Certificates, Architectures, and Standards

Key Revocation and Recovery

Trust Models (Direct, Cross, Hierarchical, Web of Trust)

X.509 and PGP

Alternative PKIs: Client, CA, and Domain-Centric Options

Certificate Handling in Web Browsers

Authentication, Authorization, and Access Control

AAA Architectures: Authentication, Authorization, and Access Control

Authentication: Passwords, Biometrics, and Token-based

Policies and Models

Access Control Matrix Model

DAC and MAC Models

BLP, Biba, and Chinese Wall Models


Single Sign-on

Identity Management

Privacy and Usage Control

Data Protection, GDPR, and Control of Intellectual Property

Anonymity and Privacy-enhancing Technologies

Proxies, Mix Networks, and other Anonymity Approaches

Usage Control Architectures

Digital Rights Management and Trusted Computing

Security Engineering and Web-Application Security

Security Engineering in the Software Engineering Life Cycle

Common Vulnerability Classes including: Session Management,

Injection Attacks, Cross-Site Scripting, and Race Conditions

Security Standards and Certification

Advanced Topics in Cryptography

Zero-Knowledge Protocols

Secure Multi-Party Computation


Quantum Cryptography

Blockchains and Digital Payment Systems

Classification of Digital Payment Systems, E-Cash

Blockchains and Distributed Ledgers

Smart Contracts

Crypto-Currencies, Bitcoin



David Basin

David Basin is a full professor of Computer Science at ETH Zurich. He received his Ph.D. in Computer Science from Cornell University in 1989 and his Habilitation in Computer Science from the University of Saarbrucken in 1996. From 1997–2002 he held the chair of Software Engineering at the University of Freiburg in Germany. His research areas are Information Security and Software Engineering. He is the founding director of the ZISC, the Zurich Information Security Center, which he led from 2003-2011. He served as Editor-in-Chief of the ACM Transactions on Privacy and Security (2015-2020) and of Springer-Verlag’s book series on Information Security and Cryptography (2008-present). He has co-founded three security companies, is on the board of directors of Anapaya Systems AG as well as various management and scientific advisory boards, and has consulted extensively for IT companies and government organizations. He is an IEEE Fellow and an ACM Fellow.

Ueli Maurer

Ueli Maurer is a full professor of Computer Science at ETH Zurich. His research interests include the theory and applications of cryptography and information security. He served as the Editor-in-Chief of the Journal of Cryptology from 2001 to 2010, and Editor-in-Chief of Springer Verlag’s book series in Information Security and Cryptography from 1997 to 2012. Maurer holds several patents for cryptographic systems. He serves on several management and scientific advisory boards, has consulted extensively for the financial industry, the IT industry, and government organisations, and has co-founded several companies, including the blockchain project Concordium. He is an IEEE Fellow, an ACM Fellow, an IACR Fellow, and recipient of the 2013 Vodafone Innovation Award for Mobile Communications and the 2016 RSA Award for Excellence in the Field of Mathematics.

Seminar goals

Information Security and Cryptography are of vital importance today, with applications in communication and information systems, cyberphysical systems, and more generally, in the digitalization of businesses and services. Our 2023 seminar covers complementary topics and is aimed at different target audiences, providing an in-depth coverage of Information Security and Cryptography from both a conceptual and an application-oriented viewpoint. At the same time, the mathematical, algorithmic, protocol-specific, and system-oriented aspects are explained in a way understandable to a wide audience. This includes the foundations needed to understand the different approaches, a critical look at the state-of-the-art, and a perspective on future security technologies.

The seminar is aimed at all professionals who need up-to-date knowledge and expertise in this area. This includes system designers and engineers, security experts, IT-professionals, instructors, project managers, consultants, law enforcement professionals, and professional cryptographers.

The material is presented at three different levels. At the highest level, the basic concepts are presented in detail, but abstractly (e.g., as black boxes), without mathematics. No background is required to follow at this level. At an intermediate level, the most important concrete schemes, models, algorithms, and protocols are presented as well as their applications. Here some minimal mathematical and systems background is assumed. At the deepest level, which is not required to understand the higher levels, different special topics, requiring some mathematical background, are discussed.


The seminar will take place at the Marriott Courtyard Zurich North, Max-Bill-Platz 19, CH-8050 Zurich, Switzerland. The seminar hotel is conveniently located between downtown Zurich and the airport, easily accessible from both with public transportation.