his course is intended for graduate students. This course will cover the basics of symmetriccryptography, public-key cryptography, hash functions, message authentication codes, digital signatures,key management and distribution, and other fundamental cryptographic primitives.
課程目標
Course Objective
This course is intended for graduate students. This course will cover the basics of symmetric cryptography, public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives. Then, we use the primitives to build provable secure protocols such as identification schemes, zero-knowledge proofs, commitment schemes, secret sharing, and electronic election system. By learning some existing secure protocols, you’ll learn how to build provable secure systems.
授課內容
Course Description
♠ | Symmetric-key encryption (Chapter 2) |
♠ | Algebra & number theory basics (Chapter 3) |
♠ | Public-key cryptography (Chapter 4) |
♠ | Cryptographic protocols (Chapter 5) |
| |
參考書籍
Textbook/References
♠ | Hans Delfs, Helmut Knebl, Introduction to Cryptography: Principles and Applications (2nd Ed.), |
| Springer, 2007. |
♠ | Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography. |
| CRC press, 2018. |
♠ | William Stallings, Network Security Essentials: Application and Standards [4th Ed.], |
| Pearson & Prentice Hall, 2010. |
先備知識
Requirements
| 講授 |
♠ | Computer Networks |
♠ | Introduction to Algorithms |
♠ | Probability |
評分方式
methods of grading
♠ | Four Homework Assignments |
♠ | Exams |
| i.Mid-Term ii.Final |
♠ | Evaluation |
| i.Homework: 50% + 1.Assignments 50% 2.Practical experiments 2×10% [bonus points] |
| ii.Mid-Term 25% |
| iii.Final 25% |
| |
*此為英文課程