課程名稱 |
(中文) 密碼學 (英文) Cryptology |
開課單位 | 資訊工程研究所 | ||
課程代碼 | I5320 | ||||
授課教師 | 張薰文 | ||||
學分數 | 3.0 | 必/選修 | 選修 | 開課年級 | 研究所 |
先修科目或先備能力: | |||||
課程概述與目標:This course aims to introduce various cipher systems and their mathematical foundation. In addition, the existing standards in encryption and network security will be explained. Our goal is to provide enough knowledge for students to understand these basics and be able to use them as tools in their future applications. | |||||
教科書 | B. A. Forouzan, Cryptography and Network Security, McGraw Hill | ||||
參考教材 | W. Stallings, Cryptography and Network Security- Principles & Practices, Pearson. |
課程大綱 | 學生學習目標 | 單元學習活動 | 學習成效評量 | 備註 | ||
週 | 單元主題 | 內容綱要 | ||||
1 | Introduction | Security goals Attacks Services and mechanism Techniques |
Security goals Attacks Services and mechanism Techniques |
|
||
2 | Mathematics of Cryptography (I) | Integer arithmetic Modular arithmetic Matrices Linear congruence |
Integer arithmetic Modular arithmetic Matrices Linear congruence |
|
||
3 | Traditional Symmetric-Key Ciphers | Substitution ciphers Cryptanalysis |
Substitution ciphers Cryptanalysis |
|
|
|
4 | Traditional Symmetric-Key Ciphers | Transposition ciphers Stream and block ciphers |
Transposition ciphers Stream and block ciphers |
|
||
5 | Mathematics of Cryptography (II) | Groups, Ring, Field Galois Fields |
Groups, Ring, Field Galois Fields |
|
||
6 | Introduction to Modern Symmetric-Key Ciphers | Modern block ciphers Attack on block ciphers |
Modern block ciphers Attack on block ciphers |
|
|
|
7 | Introduction to Modern Symmetric-Key Ciphers | Modern stream ciphers Synchronous/Nonsynchronous |
Modern stream ciphers Synchronous/Nonsynchronous |
|
||
8 | Data Encryption Standard | Data Encryption Standard (DES) | Data Encryption Standard (DES) |
|
||
9 | Advanced Encryption Standard | Advanced Encryption Standard (AES) | Advanced Encryption Standard (AES) |
|
||
10 | Advanced Encryption Standard | Advanced Encryption Standard (AES) | Advanced Encryption Standard (AES) |
|
|
|
11 | Mathematics of Cryptography (III) | Primality testing Factorization Chinese remainder theorem |
Primality testing Factorization Chinese remainder theorem |
|
||
12 | Mathematics of Cryptography (III) | Quadratic congruence Exponentiation and logarithm |
Quadratic congruence Exponentiation and logarithm |
|
||
13 | Asymmetric-Key Cryptography | RSA cryptosystem ElGamal cryptosystem Elliptic curve cryptosystem |
RSA cryptosystem ElGamal cryptosystem Elliptic curve cryptosystem |
|
|
|
14 | Asymmetric-Key Cryptography | RSA cryptosystem ElGamal cryptosystem Elliptic curve cryptosystem |
RSA cryptosystem ElGamal cryptosystem Elliptic curve cryptosystem |
|
||
15 | message integrity | Cryptographic Hash Functions digital signature |
Cryptographic Hash Functions digital signature |
|
|
|
16 | message integrity | Cryptographic Hash Functions digital signature |
Cryptographic Hash Functions digital signature |
|
||
17 | Key Management | public-key distribution | public-key distribution |
|
||
18 | Review | Review | Review |
|
教學要點概述: |