シラバス参照

公式版のシラバスを表示  
最終更新日:2019/12/10  
筑波大学 教育課程編成支援システム(EN)

01CF902 Topics in Risk Engineering in Master's Program (Security)

1.0 Credits, 1, 2 Year, Sum Vac Intensive
Masahiro Mambo

Course Overview

Cryptography is a multidisciplinary field that encompasses theoretical foundations (number theory, computer arithmetic, complexity theory, etc.) and practical considerations (computer architecture, hardware and software design, etc.). A poor implementation of a strong cryptographic primitive can for instance leak information about the secret key. Therefore, a course in cryptography should not only focus on theory, but also describe software and hardware realizations. The successful cryptographic engineer should be able to design, implement, and verify or validate her cryptosystems.

Remarks

Identical to 02CF902.
9/28,9/29

Course Type

lectures

Field

Cyber Risk

Relationship with Major Educational Goals

This lecture is related mainly to "1. The basic theory for analyzing and assessing risk," partly to "2. The data processing skills for analyzing and assessing risk," "3. The real world problems that are the target of risk engineering" and "4. The ability to approach risk engineering from a wide range of perspectives."

Course Highlight

Understanding security, authenticity, privacy protection etc. provided by applied cryptography and related security technologies.

Calendar

1)Cryptographic protocols(e.g. electronic money/electronic election/electronic auction)   
2)Privacy protection   
3)Authentication methods(e.g. authentication/biometrics/PUF)   

etc.

Outcomes

1) Understanding the mechanism of cryptographic protocols: Applied cryptography
2) Understanding related authentication technologies
3) Understanding related privacy protection technologies

Grading

Evaluation based on exam, exercises and report
Pass level is over 60% in overall evaluation

Relationship with Student Achievement Assessment Attributes

For students majoring in this field, the lecture is related mainly to "1) Knowledge of fundamental/basic theory in the major field," and partly to "3) Understanding of real world problems" and "4) Ability in recognizing problems from a broad perspective."
For students majoring in other fields, this lecture is related mainly to "2) Knowledge of fundamental/basic theory of related fields," and partly to "3) Understanding of real world problems" and "4) Ability in recognizing problems from a broad perspective."

Text

Handouts

References

1. 岡本栄司, 西出隆志,『暗号と情報セキュリティ』 コロナ社 (2016)
2. 岡本龍明・山本博資,『現代暗号』 産業図書 (1997)
3. 岡本栄司・満保雅浩,『電子マネー』 岩波 科学ライブラリー 53 (1997)

Office Hour

Upon request

Prerequisites

This lecture requires no specific advance knowledge but it is recommended to attend other related lectures such as Advanced Course on Cryptography and Advanced Course on Cyber Security.

Other Information

Students are encouraged to obtain deep understanding of this class by taking other classes related to this class.

Related Courses

01CF201 Advanced Course in Authentication Systems
01CF204 Advanced Course in Network Security I
01CF205 Advanced Course in Network Security II
01CF206 Advanced Course in Cyber Risk
01CF207 Advanced Course on Information Security

Self-study

Students are encouraged to review the class material and note, and study the reference books if necessary.