2.0 Credits, 1, 2 Year, SprAB Mon1,2
Takashi Nishide
Course Overview
We learn the fundamental techniques for cryptography and its related mathematics. We review the basics of algebra and number theory and study how the cryptographic primitives such as
public key encryption, key agreement, and authentication work and why they are secure.
Remarks
If you already obtained the course credit for Advanced Course on Information Security (01CF207, 01CH206), you cannot take this course.
Identical to 01CH219.
Relationship with Major Educational Goals
This lecture is related mainly to "1. The basic theory for analyzing and assessing risk," partly to "2. The data processing skills for analyzing and assessing risk," "3. The real world problems that are the target of risk engineering" and "4. The ability to approach risk engineering from a wide range of perspectives."
Relationship with Student Achievement Assessment Attributes
For students majoring in this field, the lecture is related mainly to "1) Knowledge of fundamental/basic theory in the major field," and partly to "3) Understanding of real world problems" and "4) Ability in recognizing problems from a broad perspective."
For students majoring in other fields, this lecture is related mainly to "2) Knowledge of fundamental/basic theory of related fields," and partly to "3) Understanding of real world problems" and "4) Ability in recognizing problems from a broad perspective."
Text
暗号と情報セキュリティ(リスク工学シリーズ8巻) コロナ社 (in Japanese)
necessary supplemental class materials are distributed via manaba
References
1. 「公開鍵暗号の数理」森山大輔,西巻陵,岡本龍明著 共立出版
2. 「現代暗号の誕生と発展」岡本龍明著 近代科学社
3. 「現代暗号の基礎数理」黒澤馨,尾形わかは著 コロナ社
4. 「暗号理論入門」 岡本栄司著 共立出版
5. 「現代暗号」 岡本龍明,山本博資著 産業図書
6. "Introduction to Modern Cryptography", Jonathan Katz, Yehuda Lindell, Chapman and Hall/CRC
7. "Foundations of Cryptography: Volume 1, Basic Tools", Oded Goldreich, Cambridge University Press
8. "Foundations of Cryptography: Volume 2, Basic Applications", Oded Goldreich, Cambridge University Press