1. |
Outline |
|
This course strictly models and defines problems dealt in cryptographic protocols at first. Then, we explain their security and related topics through mathematical proofs.
This course relates to the diploma policy 2 of the division of the integrated science and engineering, graduated school of Teikyo University.
|
2. |
Objectives |
|
In the modern society which is networked rapidly, information security technology has become indispensable and its importance has been getting higher.
In this course, we model and define the cryptographic protocols and related concepts strictly. Then we aim at understanding their security through mathematicall proofs with information theory and complexity theory.
|
1. |
Outline |
|
This course strictly models and defines problems dealt in cryptographic protocols at first. Then, we explain their security and related topics through mathematical proofs.
This course relates to the diploma policy 2 of the division of the integrated science and engineering, graduated school of Teikyo University.
|
2. |
Objectives |
|
In the modern society which is networked rapidly, information security technology has become indispensable and its importance has been getting higher.
In this course, we model and define the cryptographic protocols and related concepts strictly. Then we aim at understanding their security through mathematicall proofs with information theory and complexity theory.
|
3. |
Grading Policy |
|
A grade is evaluated in two reports(50%, 50%). In the case that the number of days attended is less than 10, the student will be unqualified for this course. As for reports submitted through LMS, feedback information will be given through LMS.
|
4. |
Textbook and Reference |
|
Reference: Oded Goldreich, "Modern Cryptography, Probabilistic Proofs and Pseudorandomness, (Algorithms and Combinatorics)" Springer, 1998. ISBN-13:978-3642084324
Reference: Hans Delfs, Helmut Knebl, "Introduction to Cryptography: Principles and Applications (Information Security and Cryptography), " Springer Berlin Heidelberg, 2007. ISBN-13: 978-3540492436
Reference: Hans Delfs, Helmut Knebl, "Introduction to Cryptography: Principles and Applications(Information Security and Cryptography) [Kindle], " Springer Berlin Heidelberg, 2007.
|
5. |
Requirements (Assignments) |
|
This course requires the knowledge of algebraic systems, the elementary number theory, the probabilistic theory, the information theory and the complexity theory while these theories will be reviewed in the introductory phase.
This course is highly professional and requires more profound understanding mathematically compared with courses in the undergraduate school.
|
6. |
Note |
|
Each is given as a lecture. Necessary materials will be published through LMS.
|
7. |
Schedule |
|
1. Algebraic Systems |
2. Elementary number theory |
3. Probabilistic theory |
4. Information theory |
5. Complexity theory |
6. Probabilistic computation |
7. Introduction to the modern cryptography1 -Secret-Key Cryptography- |
8. Introduction to the modern cryptography2 -Public-Key Cryptography- |
9. Cryptographic protocols |
10. Probabilistic Proofs1 -Zero-Knowledge Proof- |
11. ProbabilisticProofs2 -Probabilistic Checkable Proof- |
12. One-way function -Basic assumptions- |
13. One-way function2 -Bit bit security- |
14. Provable security1 |
15. Provable security2 |
|
|