トップページへ

2024 Faculty Courses School of Engineering Undergraduate major in Information and Communications Engineering

Cryptographic Technology and Network Security

Academic unit or major
Undergraduate major in Information and Communications Engineering
Instructor(s)
Wakaha Ogata / Sumiko Miyata
Class Format
Lecture (Face-to-face)
Media-enhanced courses
-
Day of week/Period
(Classrooms)
5-6 Tue / 5-6 Fri
Class
-
Course Code
ICT.C315
Number of credits
200
Course offered
2024
Offered quarter
4Q
Syllabus updated
Mar 14, 2025
Language
Japanese

Syllabus

Course overview and goals

The first half of this course focuses on cryptographic technologies. The functions and mechanisms of cryptographic technologies such as cryptosystems and authentication scheme that are used in the Internet are explained. The latter half focuses on network security. Various attack techniques, Web security, DNS/Email security, and techniques for defense are explained.
Threat to communication networks grows every year, and a variety of security technologies are investigated to defend networks. Still, they are not defended completely. Learning the security technologies, students are expected to be able to investigate and analyze appropriately the situation.

Course description and aims

At the end of this course, students will be able to :
1) have an understanding of fundamental knowledge to defend networks from threat,
2) appropriately investigate and analyze the situation of networks,
3) select and use appropriate security technologies.

Keywords

Cryptosystem, authentication, digital signature, PKI, access control, malicious software, port scan, DoS attack, firewall, Anti-Virus Software

Competencies

  • Specialist skills
  • Intercultural skills
  • Communication skills
  • Critical thinking skills
  • Practical and/or problem-solving skills

Class flow

In the first half, mainly the lecturer introduces various techniques using slides.
The latter half includes practical training using computers.

Course schedule/Objectives

Course schedule Objectives
Class 1 History of cryptosystem and private-key cryptosystem In daily life, have an interest in security and the technology used there .
Class 2 Message authentication
Class 3 DH Key exchange and public-key cryptosystem
Class 4 Digital signature and Public-key infrastructure
Class 5 User authentication
Class 6 Other cryptographic technologies
Class 7 Summary of first half and intermediate examination
Class 8 Overview of network security 1: vulnerability, outline of attacks and access control
Class 9 Overview of network security 2: vulnerability and malicious softwares
Class 10 Various attack techniques 1: port scanning, DoS attack, etc.
Class 11 Various attack techniques 2: session hijacking, social engineering, etc.
Class 12 Security on Web
Class 13 Security on DNS and Email
Class 14 Defense techniques: firewall, Anti-Virus Software, etc.

Study advice (preparation and review)

To enhance effective learning, students are encouraged to spend approximately 100 minutes preparing for class and another 100 minutes reviewing class content afterwards (including assignments) for each class.
They should do so by referring to textbooks and other course material.

Textbook(s)

none

Reference books, course materials, etc.

The teaching materials will be distributed in each class.

Evaluation methods and criteria

Students will be assessed on their understanding of fundamental concepts and usage of cryptographic techniques and network security, and their ability to investigate and analyse current security situation.
Their scores are based on intermediate exam (50%) and final exam (50%). (The assessment method may change depending on the situation.)

Related courses

  • ICT.C305 : Network Architecture and Control

Prerequisites

No prerequisites.