2025 (Current Year) Faculty Courses School of Computing Major courses
Theory of Cryptography for Cybersecurity
- Academic unit or major
- Major courses
- Instructor(s)
- Keisuke Tanaka / Keita Xagawa / Ryo Nishimaki / Takahiro Matsuda
- Class Format
- Lecture
- Media-enhanced courses
- -
- Day of week/Period
(Classrooms) - Class
- -
- Course Code
- XCO.T474
- Number of credits
- 200
- Course offered
- 2025
- Offered quarter
- 3Q
- Syllabus updated
- May 29, 2025
- Language
- Japanese
Syllabus
Course overview and goals
With the advanced use of information and communications technology involving the internet, cybersecurity threats have become increasingly serious. Cyber attacks continue to have a serious impact on society, and the damage caused to society by the leakage of personal information and intellectual property due to cyber attacks is immeasurable. Despite the importance of the cybersecurity field, there is currently a significant shortage of human resources.
In response to such social needs, Tokyo Institute of Technology, the predecessor of Institute of Science Tokyo, has launched Progressive Graduate Minor in Cybersecurity in April 2016. In this minor, students will learn the practical aspects of cybersecurity, in collaboration with NRI as core, Rakuten, NTT, and AIST, and at the same time acquire knowledge of the theoretical background by taking advantage of the strengths of the theoretical field, which is a distinctive feature of the information and communication research field at Institute of Science Tokyo.
The curriculum consists of the following six courses as core, offered at School of Computing.
Foundation of Cybersecurity (1Q, 2-0-0)
Theory of Cryptography for Cybersecurity (3Q, 2-0-0)
Cybersecurity Governance (4Q, 1-1-0)
Attack and Defense on Cybersecurity I (2Q, 1-1-0)
Attack and Defense on Cybersecurity II (2-3Q, 1-1-0)
Attack and Defense on Cybersecurity III (4Q, 1-1-0)
In this course, students will study cryptography as a fundamental element of cybersecurity. In particular, the aim is to understand models, schemes, and proof methods in cryptology as they relate to cybersecurity.
Course description and aims
By the end of this course, students will be able to understand:
1) models in cryptography as a fundamental element of cybersecurity
2) systems and algorithms in cryptography as a fundamental element of cybersecurity
3) techniques for security proofs in cryptography as a fundamental element of cybersecurity.
Keywords
cryptography, security, information security, cybersecurity, security proof
Competencies
- Specialist skills
- Intercultural skills
- Communication skills
- Critical thinking skills
- Practical and/or problem-solving skills
Class flow
The class offers a standard type of lecture.
Course schedule/Objectives
Course schedule | Objectives | |
---|---|---|
Class 1 | The theory on public-key encryption (and symmetric-key encryption) (1) | Understand the notions of the models |
Class 2 | The theory on public-key encryption (and symmetric-key encryption) (2) | Understand the notions of the models |
Class 3 | The theory on public-key encryption (and symmetric-key encryption) (3) | Understand the algorithms for the schemes |
Class 4 | The theory on public-key encryption (and symmetric-key encryption) (4) | Understand the algorithms for the schemes |
Class 5 | The theory on public-key encryption (and symmetric-key encryption) (5) | Understand the methods of the security proofs |
Class 6 | The theory on digital signature (1) | Understand the notions of the models |
Class 7 | The theory on digital signature (2) | Understand the algorithms for the schemes |
Class 8 | The theory on digital signature (3) | Understand the algorithms for the schemes |
Class 9 | The theory on digital signature (4) | Understand the methods of the security proofs |
Class 10 | The theory on digital signature (5) | Understand the methods of the security proofs |
Class 11 | Secret sharing and multiparty computation (1) | Understand the notions of the models |
Class 12 | Secret sharing and multiparty computation (2) | Understand the notions of the models |
Class 13 | Secret sharing and multiparty computation (3) | Understand the algorithms for the schemes |
Class 14 | Secret sharing and multiparty computation (4) | Understand the algorithms for the schemes |
Study advice (preparation and review)
To enhance effective learning, students are encouraged to spend approximately 100 minutes preparing for class and another 100 minutes reviewing class content afterwards (including assignments) for each class. They should do so by referring to textbooks and other course material.
Textbook(s)
Textbooks will be used in this course.
Reference books, course materials, etc.
References will be announced in the classes.
Evaluation methods and criteria
The evaluation consists of the reports as homework assignments. There will be approximately three reports. The weights of the scores of the reports are equal. The total score is calculated by adding all of the scores.
Related courses
- XCO.T473 : Foundation of Cybersecurity
- XCO.T478 : Cybersecurity Governance
- XCO.T475 : Attack and Defense on Cybersecurity I
- XCO.T476 : Attack and Defense on Cybersecurity II
- XCO.T477 : Attack and Defense on Cybersecurity III
Prerequisites
None. However, the knowledge on the basic notions of computer science can help students to understand the contents of the course smoothly.
Contact information (e-mail and phone) Notice : Please replace from ”[at]” to ”@”(half-width character).
keisuke[at]comp.isct.ac.jp (Contact us via Slack direct message)
Office hours
Appointment by Slack direct message is required.