2021 Cryptographic Technology and Network Security

Font size  SML

Register update notification mail Add to favorite lecture list
Academic unit or major
Undergraduate major in Information and Communications Engineering
Ogata Wakaha  Kitaguchi Yoshiaki 
Course component(s)
Lecture    (ZOOM)
Day/Period(Room No.)
Tue5-6(H103)  Fri5-6(H103)  
Course number
Academic year
Offered quarter
Syllabus updated
Lecture notes updated
Language used
Access Index

Course description and aims

The first half of this course focuses on cryptographic technologies. The functions and mechanisms of cryptographic technologies such as cryptosystems and authentication scheme that are used in the Internet are explained. The latter half focuses on network security. Various attack techniques, Web security, DNS/Email security, and techniques for defense are explained.
Threat to communication networks grows every year, and a variety of security technologies are investigated to defend networks. Still, they are not defended completely. Learning the security technologies, students are expected to be able to investigate and analyze appropriately the situation.

Student learning outcomes

At the end of this course, students will be able to :
1) have an understanding of fundamental knowledge to defend networks from threat,
2) appropriately investigate and analyze the situation of networks,
3) select and use appropriate security technologies.


Cryptosystem, authentication, digital signature, PKI, access control, malicious software, port scan, DoS attack, firewall, Anti-Virus Software

Competencies that will be developed

Specialist skills Intercultural skills Communication skills Critical thinking skills Practical and/or problem-solving skills

Class flow

In the first half, mainly the lecturer introduces various techniques using slides.
The latter half includes practical training using computers.

Course schedule/Required learning

  Course schedule Required learning
Class 1 History of cryptosystem and private-key cryptosystem In daily life, have an interest in security and the technology used there .
Class 2 Message authentication
Class 3 DH Key exchange and public-key cryptosystem
Class 4 Digital signature and Public-key infrastructure
Class 5 User authentication
Class 6 Other cryptographic technologies
Class 7 Summary of first half and intermediate examination
Class 8 Overview of network security 1 : vulnerability, outline of attacks and access control
Class 9 Overview of network security 1 : vulnerability and malicious softwares
Class 10 Various attack techniques 1: port scanning, DoS attack, etc.
Class 11 Various attack techniques 1: session hijacking,, social engineering, etc.
Class 12 Security on Web
Class 13 Security on DNS and Email
Class 14 Defence techniques 1 : firewall, Anti-Virus Software, etc.
Class 15 Summary of second half and final examination

Out-of-Class Study Time (Preparation and Review)

To enhance effective learning, students are encouraged to spend approximately 100 minutes preparing for class and another 100 minutes reviewing class content afterwards (including assignments) for each class.
They should do so by referring to textbooks and other course material.



Reference books, course materials, etc.

The teaching materials will be distributed in each class.

Assessment criteria and methods

Students will be assessed on their understanding of fundamental concepts and usage of cryptographic techniques and network security, and their ability to investigate and analyse current security situation.
Their scores are based on intermediate exam (50%) and final exam (50%). (The assessment method may change depending on the situation.)

Related courses

  • ICT.C305 : Network Architecture and Control

Prerequisites (i.e., required knowledge, skills, courses, etc.)

No prerequisites.

Page Top