Network Security |
MORI, Takuo |
|
【Human Information Systems・1st semester】
14-1-0497 |
1. |
Objectives |
|
This course aims at understanding the following topics on cryptosystems and information security; Elementary number theory Secret-key cryptosystems Public-key cryptosystems Digital Signatures and hash functions Cryptographic protocols and network protocols How to evaluate security of cryptosystems and related information systems.
Throughout this course, we learn how to survey the fields of crypto-systems and information security in general.
|
2. |
Outline |
|
Information security techniques are becoming one of the indispensable techniques and are becoming much more important as an infrastructure of networked societies. The term "information security" covers very broad fields, from basic theories such as elementary number theory, algebraic systems, cryptography, and computer science to cryptographical protocols or network protocols in general.
In this course, we mainly deal with the latter fields. However, to understand protocols dealt with in this course, it is required to understand basic mathematics and computer science mentioned above.
Thus, we learn the following theoretical topics briefly at first; Elementary number theory Algebraic Systems Computer Science Cryptosystems
Then, we deal with the following topics; Cryptographic protocols Zero-knowledge proof and it's application to the social systems Network security Internet Security Illegal access Information Hiding Bio metrics Security Evaluations
In each lecture, we deal with some of topics above, then do some exercises. Reports or quizzes will be given if necessary.
|
|