2019 Modern Cryptography

Font size  SML

Register update notification mail Add to favorite lecture list
Academic unit or major
Graduate major in Information and Communications Engineering
Instructor(s)
Ogata Wakaha 
Class Format
Lecture     
Media-enhanced courses
Day/Period(Room No.)
Mon3-4(S513)  Thr3-4(S513)  
Group
-
Course number
ICT.C401
Credits
2
Academic year
2019
Offered quarter
1Q
Syllabus updated
2019/4/4
Lecture notes updated
-
Language used
English
Access Index

Course description and aims

Models, security definitions, and security proofs of cryptographic techniques such as encryption schemes, message authentication, digital signature, secret sharing, are explained.
Cryptography deals not only encryption system but also message authentication,digital signature, user authentication, etc. The security of these techniques is guaranteed by mathematics, especially number theory. Students are expected to learn the theory behind their techniques.

Student learning outcomes

At the end of this course, students will be able to
1) explain the mechanism of fundamental cryptographic technology,
2) explain the security background of cryptographic techniques,
3) explain the difference between computational security and information theoretical security,
4) distinguish what we can achieve by using modern cryptograph.

Keywords

Symmetric encryption, public-key encryption, message authentication, digital signature, secret sharing, zero-knowledge proof, security model

Competencies that will be developed

Specialist skills Intercultural skills Communication skills Critical thinking skills Practical and/or problem-solving skills

Class flow

A fill-in-the-blank textbook is used. Each student fills in them in class.

Course schedule/Required learning

  Course schedule Required learning
Class 1 Basic of security notions in cryptography Understand the model and security notion of cryptosystems.
Class 2 Symmetric encryption, mode of operation Before coming to class, review the previous lesson.
Class 3 Public-key encryption 1 : model and ElGamal cryptosystem Understand the model and security definition of public key cryptosystems.
Class 4 Public-key encryption 2 : RSA cryptosystem and Rabin cryptosystem Before coming to class, review the previous lesson.
Class 5 Diffie-Hellman key exchange and security of ElGamal cryptosystem Before coming to class, review ElGamal cryptosystem.
Class 6 Message authenticaion Understand the model and security notion of message authenticaion.
Class 7 Digital signature 1: Model and RSA signature Before coming to class, review the contents in Section 2 of the course textbook.
Class 8 Digital signature 2: DSA and others Before coming to class, review the previous lesson.
Class 9 Zero-knowledge proof 1: Model and definition Understand the concept of ZKIP and its definition.
Class 10 Zero-knowledge proof 2 : applications Before coming to class, review the previous lesson.
Class 11 Secret sharing 1 : Model and definition Understand the concept of secret sharing and its definition.
Class 12 Secret sharing 2 : applications Before coming to class, review the previous lesson.
Class 13 Elliptic curve encryption Before coming to class, review ElGamal cryptosystem.
Class 14 Hash function Before coming to class, review digital signature.
Class 15 Pseudorandom generator

Textbook(s)

None required.

Reference books, course materials, etc.

All materials used in class can be found on OCW-i.

Assessment criteria and methods

Students' achievement of "student learning outcome" are evaluated based on the final exam.

Related courses

  • ICT.C315 : Cryptographic Technology and Network Security

Prerequisites (i.e., required knowledge, skills, courses, etc.)

No prerequisites.

Page Top