Cryptography and Information Security
Course Purpose |
---|
The goal of this course is to acquire basic knowledge on cryptography and information security from an engineering perspective. |
Learning Goals |
Students should understand - the fundamentals of cryptography, including common key cryptosystems, public key cryptosystems, information theoretic security, and public key infrastructure, and - information security including malware, vulnerabilities and related attacks in network security, perimeter defense, zero-trust security, biometrics authentication, information security management systems, and security incident response. |
Topic | |
---|---|
Session 1 | Introduction to information security technology |
Session 2 | Common key cryptography / Personal authentication / Biometrics |
Session 3 | Message authentication / Malware, ransomware |
Session 4 | Hash function / Unauthorized access and border defense |
Session 5 | Blockchain / Denial of Service Attack |
Session 6 | Information-theoretic security / Vulnerability, vulnerability information, targeted attacks |
Session 7 | Quantum cryptography / Network security (1): Application layer |
Session 8 | Public key authentication infrastructure and its concepts / Network security (2): Application layer and lower layer |
Session 9 | Elementary number theory / SSL/TLS |
Session 10 | Discrete logarithm problem-based cryptography / Zero trust security |
Session 11 | RSA encryption / Information security management, CSIRT |
Session 12 | Post-quantum cryptography / Physics and control security, e-mail and wireless security |
Session 13 | Digital signatures / Recent security incidents |
Session 14 | Information security overview |