Subject Title
  情報セキュリティ特論
   Advanced Information Security
Subject Code
4203
Instructor
  Ichi Takumi
The subject reflating work experience
O
Department and Grade Year
  Graduate School of Engineering (Master's Program) Faculty of Engineering, 1st-year,
Subject Category
  Major
Credit
1
Semester/Day/Period
  Third Quater/Monday/7-8
Classtype
Lecture
Class Method
  ☑Face to face   ☐On demand  ☐Live interactive
Relations to Policy on Degree Certification and Awarding Degree
☐ 1. The ability to understand and observe human, cultural, and social problems from a technical perspective
☑ 2. A wide range of engineering knowledge and mathematical understanding
☐ 3. The communication skills to be able to exchange ideas with other researchers and engineers
☑ 4. The problem-solving skills to plan an appropriate approach to solving a problem, and actually solve the problem
☑ 5. Advanced engineering knowledge and technology, and the ability to apply these to solving real-world problems
Subject Description and Objectives

Purpose

To learn that the set of finite number integers and the constrained operations defined on the set give a difficulty of inverse operation for several types of operations. The one-directional difficulty leads a cryptography. When the constraint becomes severe;  a field to a group, the difficulty of decrypting the encryption is also strengthened. And to learn about block chain system as an application of cryptography.

 
Goal

1. We verify the operation and function defined on the finite field and establish the ability to explain the cryptographic algorithm using the function which is difficult to reverse operation.

2. We get the ability to explain the concept of an elliptic curve and  the ability to explain cryptographic algorithms on elliptic curves.

3. We get the ability to explain basic concepts of block chain system and its usage.

4. We get to know current security technology and application from an engineer in industry.

 

Contents

1. Addition, subtraction, multiplication and division on a finite field GF(p)

2. Discrete Logarithm and Quadratic Residue

3. Public key cryptography

4. Elliptic curves and lattice points

5. Operation defined on elliptic curve and Difficulty of the inverse operation

6. Block-chain system; its concept, merit and problem.  

7. Lattice-based cryptography

8. Complex authentication methods

 

Evaluation Method

Quality of discussion in the class room 30%
Report 70%

View points of the report
1. Can explain the difficulty of decrypting public key cryptographic algorithms by using addition, subtraction, multiplication and division defined on a finite field?
2. Can enumerate the lattice points on the elliptic curve? Can define additive operations on it?
3. Can discuss the capability of block chain system?

 

Evaluation Criteria
S 100-90 Beyond the goal
A 89-80 Reached the goal enough
B 79-70 Reached the goal
C 69-60 Reached the goal in general
D 59 or below Not reached the goal

Must be present more than 5 times of lecture.

Self Preparation and Review, and Other Instructions

Student must know about Discrete Mathematics etc. as the basis for each lecture. Therefore, the following studies are necessary.

Prior learning : To read the handout on the Moodle and learn the basic knowledge in the paper. (takes 120 min.) 

Learning after each lecture: To review Moodle the handout on the Moodle and brash up your lecture note with information from related paper and Internet. And to do a task given at lecture or answer questions on Moodle.(120 分)

Textbook
References
Office Hour

You are welcome at any time, but the prior appointment by email or Teams is necessary.

Back to Syllabus Search