Network Security

MORI, Takuo
  Elective  2 credits
【Human Information Systems・1st semester】
14-1-0497

1.
Objectives
This course aims at understanding the following topics on cryptosystems and information security;
Elementary number theory
Secret-key cryptosystems
Public-key cryptosystems
Digital Signatures and hash functions
Cryptographic protocols and network protocols
How to evaluate security of cryptosystems and related information systems.

Throughout this course, we learn how to survey the fields of crypto-systems and information security in general.
2.
Outline
Information security techniques are becoming one of the indispensable techniques and are becoming much more important as an infrastructure of networked societies.
The term "information security" covers very broad fields, from basic theories such as elementary number theory, algebraic systems, cryptography, and computer science to cryptographical protocols or network protocols in general.

In this course, we mainly deal with the latter fields.
However, to understand protocols dealt with in this course, it is required to understand basic mathematics and computer science mentioned above.

Thus, we learn the following theoretical topics briefly at first;
Elementary number theory
Algebraic Systems
Computer Science
Cryptosystems

Then, we deal with the following topics;
Cryptographic protocols
Zero-knowledge proof and it's application to the social systems
Network security
Internet Security
Illegal access
Information Hiding
Bio metrics
Security Evaluations

In each lecture, we deal with some of topics above, then do some exercises. Reports or quizzes will be given if necessary.