課程大綱 Syllabus |
學生學習目標 Learning Objectives |
單元學習活動 Learning Activities |
學習成效評量 Evaluation |
備註 Notes |
序 No. | 單元主題 Unit topic |
內容綱要 Content summary |
1 | Introduction |
Security goals
Attacks
Services and mechanism
Techniques |
Security goals
Attacks
Services and mechanism
Techniques |
|
|
|
2 | Mathematics of Cryptography (I) |
Integer arithmetic
Modular arithmetic
Matrices
Linear congruence |
Integer arithmetic
Modular arithmetic
Matrices
Linear congruence |
|
|
|
3 | Traditional Symmetric-Key Ciphers |
Substitution ciphers
Cryptanalysis |
Substitution ciphers
Cryptanalysis |
|
|
|
4 | Traditional Symmetric-Key Ciphers |
Transposition ciphers
Stream and block ciphers |
Transposition ciphers
Stream and block ciphers |
|
|
|
5 | Mathematics of Cryptography (II) |
Groups, Ring, Field
Galois Fields |
Groups, Ring, Field
Galois Fields |
|
|
|
6 | Introduction to Modern Symmetric-Key Ciphers |
Modern block ciphers
Attack on block ciphers |
Modern block ciphers
Attack on block ciphers |
|
|
|
7 | Introduction to Modern Symmetric-Key Ciphers |
Modern stream ciphers
Synchronous/Nonsynchronous |
Modern stream ciphers
Synchronous/Nonsynchronous |
|
|
|
8 | Data Encryption Standard |
Data Encryption Standard (DES) |
Data Encryption Standard (DES) |
|
|
|
9 | Advanced Encryption Standard |
Advanced Encryption Standard (AES) |
Advanced Encryption Standard (AES) |
|
|
|
10 | Advanced Encryption Standard |
Advanced Encryption Standard (AES) |
Advanced Encryption Standard (AES) |
|
|
|
11 | Mathematics of Cryptography (III) |
Primality testing
Factorization
Chinese remainder theorem |
Primality testing
Factorization
Chinese remainder theorem |
|
|
|
12 | Mathematics of Cryptography (III) |
Quadratic congruence
Exponentiation and logarithm |
Quadratic congruence
Exponentiation and logarithm |
|
|
|
13 | Asymmetric-Key Cryptography |
RSA cryptosystem
ElGamal cryptosystem
Elliptic curve cryptosystem |
RSA cryptosystem
ElGamal cryptosystem
Elliptic curve cryptosystem |
|
|
|
14 | Asymmetric-Key Cryptography |
RSA cryptosystem
ElGamal cryptosystem
Elliptic curve cryptosystem |
RSA cryptosystem
ElGamal cryptosystem
Elliptic curve cryptosystem |
|
|
|
15 | message integrity |
Cryptographic Hash Functions
digital signature |
Cryptographic Hash Functions
digital signature |
|
|
|
16 | message integrity |
Cryptographic Hash Functions
digital signature |
Cryptographic Hash Functions
digital signature |
|
|
|
17 | Key Management |
public-key distribution |
public-key distribution |
|
|
|
18 | Review |
Review |
Review |
|
|
|