Teachers | MORI, Takuo | |
---|---|---|
Grade, Semester | Year 2 1st semest [Department of Information and Electronic Engineering, Faculty of Science and Engineering] | |
Category | Special Subjects | |
Elective, Credits | Elective 2credit | |
Syllabus Number | 3C221 |
In the modern information society, the information security technique is one of the indispensable technique. Cryptography is the basis of the information security technique.
This course aims at understanding the RSA cryptosystem, which is the first public key cryptosystem in the world, learning the basis of number theory and abstract algebra, which are the fundamentals of the RSA cryptosystem. This course aims at not only understanding mathematical theorems through their proofs, but also understanding them as algorithms or programs. To that end, this course aims at understanding them from the algorithmic point of view.
To describe algorithms, we use the Ruby language, by which large integers used in the cryptography can be easily managed.
This course relates to the diploma policy DP3, DP4C and DP4M.
The goal of this course is that students master the following abilities;
Students can read and execute programs written by ruby.
Students can write programs of simple algorithms by ruby.
Students can explain the Euclidean algorithm and the extended Euclidean algorithm.
Students can explain the definition and the fundamental properties of prime numbers, and explain the relation between prime numbers and pseudoprimes.
Students can implement algorithms of basic factorization and primality tests.
Students can explain the definition of modular arithmetics and calculate four arithmetics operations including remainder operation and power residue operation with respect to modular arithmetics.
Students can explain the Chinese Remainder theorem, solve basic systems of linear congruences.
Students can explain the definition and basic properties of Groups, subgroups and cyclic subgroups.
Students can explain the process of key generation, encryption and decryption of the RSA cryptosystem.
Grading policy: Midterm report(50%), Examination(50%).
The way of feedback: Answers for questions or feedback for the contents of each class, and examination will be given in a class, through LMS or in office hours.
Kind | Title | Author | Publisher |
---|---|---|---|
Textbook | 暗号の数学的基礎 | S. C. コウチーニョ 著、林彬訳 | 丸善出版、ISBN- 13: 978- 4621062869 |
Textbook | The Mathematics of Ciphers: Number Theory and RSA Cryptography | S.C. Coutinho | A K Peters/CRC Press, ISBN-13: 978-0367447601 |
References | ゼロからわかる Ruby 超入門 (かんたんIT基礎講座) | 五十嵐邦明、松岡 浩平著 | 技術評論社、ISBN- 13: 978- 4297101237 |
Before each class, materials related to the class will be published through LMS. Students should download them to their own devices or print them to make it possible to refer to or to take notes.
Students should read these materials and grasp what they do not understand and they understand in an hour.
After each class, student should review the class through tests on the LMS in half an hour.
Students can hardly earn credits not submitting the mid-term report. Thus, it is expected for students to observe the deadline.
As for the self-learning support, students are expected to utilize materials, such as slides, handouts and quizzes on the LMS.
In each class, students should concentrate on not taking notes but understanding explanations and solving exercises.
Before taking this course, students should take the following courses;
Mathematical Logic, Programming 1, Linear Algebra, Programming 2 and Exercises in Programming 1
At the same semester with this course, students should take take the following courses;
Computer Science Programming 1, Exercises in Programming 2 and Data Structure and Algorithms.
After taking this course, students should take the following courses;
Information Theory and Information Security.
1 | What this class aims at achieving, , Ruby |
2 | Fundamental Algorithms |
3 | Unique factorization |
4 | Prime Numbers |
5 | Modular Arithmetic |
6 | Induction and Felmat |
7 | Pseudoprimes |
8 | Systems of Congruences |
9 | Power again, Secret Sharing, Quadratic Residue |
10 | Groups |
11 | Cyclic Subgroups |
12 | Mersenne and Felmat |
13 | Primality Tests and Primitive Roots |
14 | The RSA Cryptosystem |
15 | Summary and Examination |