Academic Year |
2024Year |
School/Graduate School |
Graduate School of Advanced Science and Engineering (Master's Course) Division of Advanced Science and Engineering Informatics and Data Science Program |
Lecture Code |
WSN20401 |
Subject Classification |
Specialized Education |
Subject Name |
Cryptography |
Subject Name (Katakana) |
クリプトグラフィ |
Subject Name in English |
Cryptography |
Instructor |
NAKANISHI TOORU |
Instructor (Katakana) |
ナカニシ トオル |
Campus |
Higashi-Hiroshima |
Semester/Term |
1st-Year, Second Semester, 4Term |
Days, Periods, and Classrooms |
(4T) Mon3-4,Weds3-4:ENG 101 |
Lesson Style |
Lecture |
Lesson Style (More Details) |
|
Lecture, online (see the details in Bb9) |
Credits |
2.0 |
Class Hours/Week |
|
Language of Instruction |
E
:
English |
Course Level |
5
:
Graduate Basic
|
Course Area(Area) |
25
:
Science and Technology |
Course Area(Discipline) |
02
:
Information Science |
Eligible Students |
|
Keywords |
encryptions, authentications, information security, network security |
Special Subject for Teacher Education |
|
Special Subject |
|
Class Status within Educational Program (Applicable only to targeted subjects for undergraduate students) | |
---|
Criterion referenced Evaluation (Applicable only to targeted subjects for undergraduate students) | |
Class Objectives /Class Outline |
The target is to understand basics and applications in cryptography to protect the security in computer networks. In this class, symmetric-key encryptions, public-key encryptions, message authentications, and digital signatures are introduced as the basics, and PKI and SSL are introduced as the applications. |
Class Schedule |
lesson1: Guidance lesson2: Symmetric-key encryptions (1) lesson3: Symmetric-key encryptions (2) lesson4: Public-key encryptions (1) lesson5: Public-key encryptions (2) lesson6: Public-key encryptions (3) lesson7: Public-key encryptions (4) lesson8: Authentications (1) lesson9: Authentications (2) lesson10: Authentications (3) lesson11: Security evaluations lesson12: PKI lesson13: Security protocols lesson14: Network security lesson15: Advanced topics |
Text/Reference Books,etc. |
Handouts Reference: A. Menezes, P. Van Oorschot, S. Vanstone,“Handbook of Applied Cryptography”,CRC Press. |
PC or AV used in Class,etc. |
|
(More Details) |
Projector |
Learning techniques to be incorporated |
|
Suggestions on Preparation and Review |
Review the exercises. |
Requirements |
|
Grading Method |
Evaluated on the exercises and reports. |
Practical Experience |
|
Summary of Practical Experience and Class Contents based on it |
|
Message |
|
Other |
|
Please fill in the class improvement questionnaire which is carried out on all classes. Instructors will reflect on your feedback and utilize the information for improving their teaching. |