2024 Faculty Courses School of Engineering Undergraduate major in Information and Communications Engineering
Cryptographic Technology and Network Security
- Academic unit or major
- Undergraduate major in Information and Communications Engineering
- Instructor(s)
- Wakaha Ogata / Sumiko Miyata
- Class Format
- Lecture (Face-to-face)
- Media-enhanced courses
- -
- Day of week/Period
(Classrooms) - 5-6 Tue / 5-6 Fri
- Class
- -
- Course Code
- ICT.C315
- Number of credits
- 200
- Course offered
- 2024
- Offered quarter
- 4Q
- Syllabus updated
- Mar 14, 2025
- Language
- Japanese
Syllabus
Course overview and goals
The first half of this course focuses on cryptographic technologies. The functions and mechanisms of cryptographic technologies such as cryptosystems and authentication scheme that are used in the Internet are explained. The latter half focuses on network security. Various attack techniques, Web security, DNS/Email security, and techniques for defense are explained.
Threat to communication networks grows every year, and a variety of security technologies are investigated to defend networks. Still, they are not defended completely. Learning the security technologies, students are expected to be able to investigate and analyze appropriately the situation.
Course description and aims
At the end of this course, students will be able to :
1) have an understanding of fundamental knowledge to defend networks from threat,
2) appropriately investigate and analyze the situation of networks,
3) select and use appropriate security technologies.
Keywords
Cryptosystem, authentication, digital signature, PKI, access control, malicious software, port scan, DoS attack, firewall, Anti-Virus Software
Competencies
- Specialist skills
- Intercultural skills
- Communication skills
- Critical thinking skills
- Practical and/or problem-solving skills
Class flow
In the first half, mainly the lecturer introduces various techniques using slides.
The latter half includes practical training using computers.
Course schedule/Objectives
Course schedule | Objectives | |
---|---|---|
Class 1 | History of cryptosystem and private-key cryptosystem | In daily life, have an interest in security and the technology used there . |
Class 2 | Message authentication | |
Class 3 | DH Key exchange and public-key cryptosystem | |
Class 4 | Digital signature and Public-key infrastructure | |
Class 5 | User authentication | |
Class 6 | Other cryptographic technologies | |
Class 7 | Summary of first half and intermediate examination | |
Class 8 | Overview of network security 1: vulnerability, outline of attacks and access control | |
Class 9 | Overview of network security 2: vulnerability and malicious softwares | |
Class 10 | Various attack techniques 1: port scanning, DoS attack, etc. | |
Class 11 | Various attack techniques 2: session hijacking, social engineering, etc. | |
Class 12 | Security on Web | |
Class 13 | Security on DNS and Email | |
Class 14 | Defense techniques: firewall, Anti-Virus Software, etc. |
Study advice (preparation and review)
To enhance effective learning, students are encouraged to spend approximately 100 minutes preparing for class and another 100 minutes reviewing class content afterwards (including assignments) for each class.
They should do so by referring to textbooks and other course material.
Textbook(s)
none
Reference books, course materials, etc.
The teaching materials will be distributed in each class.
Evaluation methods and criteria
Students will be assessed on their understanding of fundamental concepts and usage of cryptographic techniques and network security, and their ability to investigate and analyse current security situation.
Their scores are based on intermediate exam (50%) and final exam (50%). (The assessment method may change depending on the situation.)
Related courses
- ICT.C305 : Network Architecture and Control
Prerequisites
No prerequisites.