Subject Title | 情報セキュリティ特論 Advanced Information Security | Subject Code | 4203 | ||||
Instructor | Ichi Takumi | The subject reflating work experience | O | ||||
Department and Grade Year | Graduate School of Engineering (Master's Program) Faculty of Engineering, 1st-year, | ||||||
Subject Category | Major | Credit | 1 | ||||
Semester/Day/Period | Third Quater/Monday/7-8 | Classtype | Lecture | ||||
Class Method |  ☑Face to face  ☐On demand  ☐Live interactive | ||||||
Relations to Policy on Degree Certification and Awarding Degree ☐ 1. The ability to understand and observe human, cultural, and social problems from a technical perspective ☑ 2. A wide range of engineering knowledge and mathematical understanding ☐ 3. The communication skills to be able to exchange ideas with other researchers and engineers ☑ 4. The problem-solving skills to plan an appropriate approach to solving a problem, and actually solve the problem ☑ 5. Advanced engineering knowledge and technology, and the ability to apply these to solving real-world problems Subject Description and Objectives Purpose To learn that the set of finite number integers and the constrained operations defined on the set give a difficulty of inverse operation for several types of operations. The one-directional difficulty leads a cryptography. When the constraint becomes severe; a field to a group, the difficulty of decrypting the encryption is also strengthened. And to learn about block chain system as an application of cryptography. 1. We verify the operation and function defined on the finite field and establish the ability to explain the cryptographic algorithm using the function which is difficult to reverse operation. 2. We get the ability to explain the concept of an elliptic curve and the ability to explain cryptographic algorithms on elliptic curves. 3. We get the ability to explain basic concepts of block chain system and its usage. 4. We get to know current security technology and application from an engineer in industry.
Contents 1. Addition, subtraction, multiplication and division on a finite field GF(p) 2. Discrete Logarithm and Quadratic Residue 3. Public key cryptography 4. Elliptic curves and lattice points 5. Operation defined on elliptic curve and Difficulty of the inverse operation 6. Block-chain system; its concept, merit and problem. 7. Lattice-based cryptography 8. Complex authentication methods
Evaluation Method Quality of discussion in the class room 30% View points of the report
Evaluation Criteria S 100-90 Beyond the goal A 89-80 Reached the goal enough B 79-70 Reached the goal C 69-60 Reached the goal in general D 59 or below Not reached the goal Must be present more than 5 times of lecture. Self Preparation and Review, and Other Instructions Student must know about Discrete Mathematics etc. as the basis for each lecture. Therefore, the following studies are necessary. Prior learning : To read the handout on the Moodle and learn the basic knowledge in the paper. (takes 120 min.) Learning after each lecture: To review Moodle the handout on the Moodle and brash up your lecture note with information from related paper and Internet. And to do a task given at lecture or answer questions on Moodle.(120 分) Textbook References Office Hour You are welcome at any time, but the prior appointment by email or Teams is necessary. |