Researcher

Nils Kopal , M. Sc.

Brief CV

09/2012

Master of science in applied computer science

09/2010

Bachelor of sciencein in applied computer science

10/2007 - 09/2012

Study of applied computer science, University of Duisburg-Essen                   


since 10/2012

Researcher with the "Applied Information Security" group at the University of Kassel

03/2011 - 09/2012             

Research assistant with the "Distributed Systems" group at the University of Duisburg-Essen

01/2011 - 03/2011

Student research assistant with the "Distributed Systems" group at the University of Duisburg-Essen

10/2008 - 03/2011

Student research assistant with the "Software Engineering" group at the University of Duisburg-Essen

08/2007 - 12/2010

Software engineer with Havi Logistics IS (former amigon GmbH)

01/2007 - 07/2007

Software engineer with the amigon GmbH

09/2004 - 01/2007

Apprenticeship as qualified IT specialist for software engineering with amigon GmbH in Duisburg

Research Interests

I am working for the CrypTool 2.0 project since 2009. During my bachelor thesis I developed a data model and a fast execution engine for the new CrypTool 2.0 editor. I am interested in the development of distributed systems for distributing tasks in computer networks. In my master thesis I analysed two new distribution algorithms which distribute results of a given task in an unstructured peer-to-peer-network. My research interests are therefore focused on distributed computing and on its security mechanisms. I am also interested in software engineering and the development of reliable and secure software systems.


Teaching

  • Bachelor-/Master seminar: Advanced Topics in Secure Distributed Computing (Winter term 2015/2016)
  • Bachelor project: Meta-heuristic (Crypt-)Analysis of Classic Ciphers with GPU and CUDA (Winter term 2015/2016)
  • Master project: Efficient Simulation of P2P-based Distribution Algorithms / Implementation of P2P-based based Distribution Algorithms in CrypTool 2 (Winter term 2015/2016)
  • Bachelor project: Performance-Evaluation of up-to-date Cryptographic Algorithms (Winter term 2014/2015)
  • Bachelor project: Image Processing for CrypTool 2 (Summer term 2014)
  • Bachelor seminar: IT-Security in our Daily Life (Winter term 2013/2014)
  • Bachelor project: One and Two Dimensional Codes for CrypTool 2.0 (Winter term 2012/2013)
  • Bachelor seminar: Symmetric Algorithms and Attacks (Summer term  2013)


Talks

  • A Self-Organized Decentralized Reservation Algorithm for Volunteer Computing, Organic Computing Doctoral Dissertation Colloquium 2016 (OC-DDC16), 02nd - 03rd June 2016, Duisburg
  • Classical Cryptology in CrypTool 2, 2nd European Historic Ciphers Colloquium (Euro-HCC 2016), 06th May 2016, Kassel
  • Simulating Cheated Results Dissemination for Volunteer Computing, 3rd International Conference on Future Internet of Things and Cloud (FiCloud 2015), 24th - 26th August, 2015, Rome
  • An Architecture for Creating a Secure Unstructured Peer-To-Peer-Based Volunteer Computing Cloud, Organic Computing Doctoral Dissertation Colloquium 2015 (OC-DDC15), 08th - 10th June, 2015, Augsburg
  • Self-Organized Volunteer Computing, Organic Computing Doctoral Dissertation Colloquium 2014 (OC-DDC14), 22th - 23th May, 2014, Kassel


05/09/16

Publications

  • Lasry, G., Rubin, M., Kopal, N., Wacker, A.: Cryptanalysis of Chaocipher and Solution of Exhibit 6. Cryptologia. 1-28 (2016).
     
  • Lasry, G., Kopal, N., Wacker, A.: Cryptanalysis of the Columnar Transposition Cipher with Long Keys. Cryptologia. 1-25 (2016).
     
  • Lasry, G., Niebel, I., Kopal, N., Wacker, A.: Deciphering ADFGVX Messages from World War I Eastern Front. Cryptologia. 1-36 (2016).
     
  • Calma, A., Jänicke, M., Kantert, J., Kopal, N., Siefert, F., Tomforde, S.: Horizontal Integration of Organic Computing and Control Theory Concepts. In: Sick, B. and Tomforde, S. (eds.) Organic Computing: Doctoral Dissertation Colloquium 2015. Kassel University Press GmbH (2015).
     
  • Liguori, A., Benedetto, F., Giunta, G., Kopal, N., Wacker, A.: Analysis and Monitoring of Hidden TCP Traffic Based on an Open-Source Covert Timing Channel. 1st IEEE Workshop on Security and Privacy in Cybermatics (SPiCy 2015), held in conjunction with 3rd International Conference on Communications and Network Security (IEEE CNS 2015). pp. 667-674. IEEE (2015).
     
  • Kopal, N.: An Architecture for Creating a Secure Unstructured Peer-To-Peer-Based Volunteer Computing Cloud. In: Sick, B. and Tomforde, S. (eds.) Organic Computing: Doctoral Dissertation Colloquium 2015. Kassel University Press GmbH. (2015).
     
  • Kieselmann, O., Kopal, N., Wacker, A.: "Löschen" im Internet. Ein neuer Ansatz für die technische Unterstützung des Rechts auf Löschen. Datenschutz und Datensicherheit (DuD). 31-36 (2015).
     
  • Liguori, A., Benedetto, F., Giunta, G., Kopal, N., Wacker, A.: SoftGap: a Multi Independent Levels of Security Cross-Domain Solution. 1st International Workshop on Signal Processing for Secure Communications (SP4SC-2015), held in conjunction with 3rd International Conference on Future Internet of Things and Cloud (FiCloud 2015). IEEE, Rome, Italy (2015).
     
  • Kieselmann, O., Kopal, N., Wacker, A.: A Novel Approach to Data Revocation on the Internet. 10th DPM International Workshop on Data Privacy Management (DPM 2015), co-located with 20th European Symposium on Research in Computer Security (ESORICS 2015). p. 134--149. , Vienna, Austria (2015).
     
  • Lasry, G., Kopal, N.I., Wacker, A.: Ciphertext-Only Cryptanalysis of Hagelin M-209 Pins and Lugs. Cryptologia. 1-36 (2015).
     
  • Kopal, N., Kieselmann, O., Wacker, A.: Simulating Cheated-Results-Dissemination for Volunteer Computing. 1st International Workshop on Signal Processing for Secure Communications (SP4SC-2015), held in conjunction with 3rd International Conference on Future Internet of Things and Cloud (FiCloud 2015). IEEE, Rome, Italy (2015).
     
  • Lasry, G., Kopal, N., Wacker, A.: Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages. Cryptologia. 1-21 (2015).
     
  • Lasry, G., Kopal, N., Wacker, A.: Solving the Double Transposition Challenge with a Divide and Conquer Approach. Cryptologia. 38, 197-214 (2014).
     
  • Kopal, N., Kieselmann, O., Wacker, A., Esslinger, B.: CrypTool 2.0. Open-Source Kryptologie für Jedermann. Datenschutz und Datensicherheit (DuD). 701 - 708 (2014).
     
  • Kopal, N., Kieselmann, O., Wacker, A.: Self-Organized Volunteer Computing. In: Sick, B. and Tomforde, S. (eds.) Organic Computing: Doctoral Dissertation Colloquium 2014. pp. 129-139. Kassel University Press GmbH. (2014).
     
  • Kieselmann, O., Kopal, N., Wacker, A.: Ranking Cryptographic Algorithms. In: David, K., Geihs, K., Leimeister, J.M., Roßnagel, A., Schmidt, L., Stumme, G., and Wacker, A. (eds.) Socio-technical Design of Ubiquitous Computing Systems. pp. 151-171. Springer, Berlin (2014).
     
  • Kieselmann, O., Kopal, N., Wacker, A.: Interdisziplinäre Sicherheitsanalyse. 10. Berliner Werkstatt Mensch-Maschine-Systeme - Grundlagen und Anwendungen der Mensch-Maschine-Interaktion. , Berlin (2013).
     
  • Hähner, J., Rudolph, S., Tomforde, S., Fisch, D., Sick, B., Kopal, N., Wacker, A.: A Concept for Securing Cyber-Physical Systems with Organic Computing Techniques. 1st International Workshop on „Self-optimisation in organic and autonomic computing systems“ (SAOS13), held in conjunction with 26th International Conference on Architecture of Computing Systems (ARCS 2013). , Prague, Czech Republic (2013).