| Academic Year |
2026Year |
School/Graduate School |
Graduate School of Advanced Science and Engineering (Master's Course) Division of Advanced Science and Engineering Informatics and Data Science Program |
| Lecture Code |
WSN20401 |
Subject Classification |
Specialized Education |
| Subject Name |
Cryptography |
Subject Name (Katakana) |
クリプトグラフィ |
Subject Name in English |
Cryptography |
| Instructor |
NAKANISHI TOORU |
Instructor (Katakana) |
ナカニシ トオル |
| Campus |
Higashi-Hiroshima |
Semester/Term |
1st-Year, Second Semester, 4Term |
| Days, Periods, and Classrooms |
(4T) Mon3-4,Weds3-4:ENG 102 |
| Lesson Style |
Lecture |
Lesson Style (More Details) |
Face-to-face |
| Face-to-face Lecture (see the details in Bb9) |
| Credits |
2.0 |
Class Hours/Week |
4 |
Language of Instruction |
E
:
English |
| Course Level |
5
:
Graduate Basic
|
| Course Area(Area) |
25
:
Science and Technology |
| Course Area(Discipline) |
02
:
Information Science |
| Eligible Students |
|
| Keywords |
encryptions, authentications, information security, network security |
| Special Subject for Teacher Education |
|
Special Subject |
|
Class Status within Educational Program (Applicable only to targeted subjects for undergraduate students) | |
|---|
Criterion referenced Evaluation (Applicable only to targeted subjects for undergraduate students) | |
Class Objectives /Class Outline |
The target is to understand basics and applications in cryptography to protect the security in computer networks. In this class, symmetric-key encryptions, public-key encryptions, message authentications, and digital signatures are introduced as the basics, and PKI and SSL are introduced as the applications. |
| Class Schedule |
lesson1: Guidance lesson2: Symmetric-key encryptions (1) lesson3: Symmetric-key encryptions (2) lesson4: Public-key encryptions (1) lesson5: Public-key encryptions (2) lesson6: Public-key encryptions (3) lesson7: Public-key encryptions (4) lesson8: Authentications (1) lesson9: Authentications (2) lesson10: Authentications (3) lesson11: Security evaluations lesson12: PKI lesson13: Security protocols lesson14: Network security lesson15: Advanced topics |
Text/Reference Books,etc. |
Handouts Reference: A. Menezes, P. Van Oorschot, S. Vanstone,“Handbook of Applied Cryptography”,CRC Press. |
PC or AV used in Class,etc. |
Handouts, Microsoft Teams, moodle |
| (More Details) |
Projector |
| Learning techniques to be incorporated |
Quizzes/ Quiz format, Post-class Report |
Suggestions on Preparation and Review |
Review the exercises. |
| Requirements |
|
| Grading Method |
Evaluated on the quizzes, exercises, and reports. |
| Practical Experience |
|
| Summary of Practical Experience and Class Contents based on it |
|
| Message |
|
| Other |
|
Please fill in the class improvement questionnaire which is carried out on all classes. Instructors will reflect on your feedback and utilize the information for improving their teaching. |