Cryptography and Information Security

Course Purpose
The goal of this course is to acquire basic knowledge on cryptography and information security from an engineering perspective.
Learning Goals
Students should understand
- the fundamentals of cryptography, including common key cryptosystems, public key cryptosystems, information theoretic security, and public key infrastructure, and
- information security including malware, vulnerabilities and related attacks in network security, perimeter defense, zero-trust security, biometrics authentication, information security management systems, and security incident response.
Topic
Session 1Introduction to information security technology
Session 2Common key cryptography / Personal authentication / Biometrics
Session 3Message authentication / Malware, ransomware
Session 4Hash function / Unauthorized access and border defense
Session 5Blockchain / Denial of Service Attack
Session 6Information-theoretic security / Vulnerability, vulnerability information, targeted attacks
Session 7Quantum cryptography / Network security (1): Application layer
Session 8Public key authentication infrastructure and its concepts / Network security (2): Application layer and lower layer
Session 9Elementary number theory / SSL/TLS
Session 10Discrete logarithm problem-based cryptography / Zero trust security
Session 11RSA encryption / Information security management, CSIRT
Session 12Post-quantum cryptography / Physics and control security, e-mail and wireless security
Session 13Digital signatures / Recent security incidents
Session 14Information security overview
**This content is based on April 1, 2025. For the latest syllabus information and details, please check the syllabus information inquiry page provided by the university.**