Cryptography and Information Security
| Course Purpose |
|---|
| The goal of this course is to acquire basic knowledge on cryptography and information security from an engineering perspective. |
| Learning Goals |
| Students should understand - the fundamentals of cryptography, including common key cryptosystems, public key cryptosystems, information theoretic security, and public key infrastructure, and - information security including malware, vulnerabilities and related attacks in network security, perimeter defense, zero-trust security, biometrics authentication, information security management systems, and security incident response. |
| Topic | |
|---|---|
| Session 1 | Introduction to information security technology |
| Session 2 | Common key cryptography / Personal authentication / Biometrics |
| Session 3 | Message authentication / Malware, ransomware |
| Session 4 | Hash function / Unauthorized access and border defense |
| Session 5 | Blockchain / Denial of Service Attack |
| Session 6 | Information-theoretic security / Vulnerability, vulnerability information, targeted attacks |
| Session 7 | Quantum cryptography / Network security (1): Application layer |
| Session 8 | Public key authentication infrastructure and its concepts / Network security (2): Application layer and lower layer |
| Session 9 | Elementary number theory / SSL/TLS |
| Session 10 | Discrete logarithm problem-based cryptography / Zero trust security |
| Session 11 | RSA encryption / Information security management, CSIRT |
| Session 12 | Post-quantum cryptography / Physics and control security, e-mail and wireless security |
| Session 13 | Digital signatures / Recent security incidents |
| Session 14 | Information security overview |