2025 (Current Year) Faculty Courses School of Engineering Department of Information and Communications Engineering Graduate major in Information and Communications Engineering
Modern Cryptography
- Academic unit or major
- Graduate major in Information and Communications Engineering
- Instructor(s)
- Wakaha Ogata
- Class Format
- Lecture (Face-to-face)
- Media-enhanced courses
- -
- Day of week/Period
(Classrooms) - 3-4 Mon / 3-4 Thu
- Class
- -
- Course Code
- ICT.C401
- Number of credits
- 200
- Course offered
- 2025
- Offered quarter
- 1Q
- Syllabus updated
- Mar 19, 2025
- Language
- English
Syllabus
Course overview and goals
Models, security definitions, and security proofs of cryptographic techniques such as encryption schemes, message authentication, digital signature, secret sharing, are explained.
Cryptography deals not only encryption system but also message authentication,digital signature, user authentication, etc. The security of these techniques is guaranteed by mathematics, especially number theory. Students are expected to learn the theory behind their techniques.
Course description and aims
At the end of this course, students will be able to
1) explain the mechanism of fundamental cryptographic technology,
2) explain the security background of cryptographic techniques,
3) explain the difference between computational security and information theoretical security,
4) distinguish what we can achieve by using modern cryptograph.
Keywords
Symmetric encryption, public-key encryption, message authentication, digital signature, secret sharing, zero-knowledge proof, security model
Competencies
- Specialist skills
- Intercultural skills
- Communication skills
- Critical thinking skills
- Practical and/or problem-solving skills
Class flow
Basically, the lecturer explains the contents of the text. The students might be given small exercises for better understanding.
Course schedule/Objectives
Course schedule | Objectives | |
---|---|---|
Class 1 | Basic of security notions in cryptography | Understand the model and security notion of cryptosystems. |
Class 2 | Symmetric encryption, mode of operation | Before coming to class, review the previous lesson. |
Class 3 | Public-key encryption 1 : model and Rabin cryptosystem | Understand the model and security definition of public key cryptosystems. |
Class 4 | Public-key encryption 2 : ElGamal cryptosystem | Before coming to class, review the previous lesson. |
Class 5 | Diffie-Hellman key exchange and security of ElGamal cryptosystem | Before coming to class, review ElGamal cryptosystem. |
Class 6 | Message authenticaion | Understand the model and security notion of message authenticaion. |
Class 7 | Basic of disital signature scheme | Before coming to class, review the contents in Section 2 of the course textbook. |
Class 8 | Some concrete digital signature schemes | Before coming to class, review the previous lesson. |
Class 9 | Zero-knowledge proof 1: Model and definition | Understand the concept of ZKIP and its definition. |
Class 10 | Zero-knowledge proof 2 : applications | Before coming to class, review the previous lesson. |
Class 11 | Secret sharing 1 : Model and definition | Understand the concept of secret sharing and its definition. |
Class 12 | Secret sharing 2 : applications | Before coming to class, review the previous lesson. |
Class 13 | Hash function | Before coming to class, review digital signature. |
Class 14 | Pseudo-random generator |
Study advice (preparation and review)
To enhance effective learning, students are encouraged to spend approximately 100 minutes preparing for class and another 100 minutes reviewing class content afterwards (including assignments) for each class.
They should do so by referring to textbooks and other course material.
Textbook(s)
None required.
Reference books, course materials, etc.
All materials used in class can be found on Science Tokyo LMS (the successor of T2SCHOLA).
Evaluation methods and criteria
Students' achievement of "student learning outcome" are evaluated based on the final examination.
Related courses
- ICT.C315 : Cryptographic Technology and Network Security
Prerequisites
No prerequisites.