Network Security

MORI, Takuo
  Elective  2 credits
【Information and Electronics Engineering・1st semester】
17-1-0497-2349

1.
Outline
Information security techniques are becoming one of the indispensable techniques and are becoming much more important as an infrastructure of networked societies.
The term "information security" covers very broad fields, from basic theories such as elementary number theory, algebraic systems, cryptography, and computer science to cryptographic protocols or network protocols in general. In this course, we mainly deal with the latter fields.
2.
Objectives
This course aims at understanding the following topics on cryptosystems and information security;
elementary number theory and basic algebraic systems;
secret-key crypto-systems;
public-key crypto-systems;
digital signatures and hash functions;
cryptographic protocols;
network protocols;
how to evaluate security of crypto-systems and related information systems.

Throughout this course, we learn how to survey the fields of cryptosystems and information security in general.
1.
Outline
Information security techniques are becoming one of the indispensable techniques and are becoming much more important as an infrastructure of networked societies.
The term "information security" covers very broad fields, from basic theories such as elementary number theory, algebraic systems, cryptography, and computer science to cryptographic protocols or network protocols in general. In this course, we mainly deal with the latter fields.
2.
Objectives
This course aims at understanding the following topics on cryptosystems and information security;
elementary number theory and basic algebraic systems;
secret-key crypto-systems;
public-key crypto-systems;
digital signatures and hash functions;
cryptographic protocols;
network protocols;
how to evaluate security of crypto-systems and related information systems.

Throughout this course, we learn how to survey the fields of cryptosystems and information security in general.
3.
Grading Policy




4.
Textbook and Reference




5.
Requirements (Assignments)




6.
Note




7.
Schedule
1.



2.



3.



4.



5.



6.



7.



8.



9.



10.



11.



12.



13.



14.



15.