Home - Students - My Studies - Courses - C - Content

Cryptography

ProgramTeacherCreditDuration

Computer science

Jianrong Wang

2

40

Course Name: Cryptography

Course Code:S2293206

Semester: 4

Credit: 2

Program: Computer science

Course Module: Optional

Responsible: Jianrong Wang

E-mail: wjr@tju.edu.cn

Department: Tianjin International Engineering Institute

Time Allocation (1 credit hour = 45 minutes)

Exercise

Lecture

Lab-study

Project

Internship

(days)

Personal

Work

8

12

20

10

Course Description

The course is optional designed for Engineering Master of Computer Science in TIEI. The course is an important application of mathematics in information security, combining theory and application. According to the basic security attributes of information security (confidentiality, authentication, integrity, non-repudiation, availability), the course introduces the basic concepts, development history, design principles and application scenarios of various cryptographic primitives (non-key cryptosystem, symmetric cryptography and asymmetric cryptography), as well as simple cryptographic protocols. The course helps students master the basic knowledge of design and analysis techniques in modern cryptography, foster their ability to apply cryptography knowledge so that they could accurately infer risks in the reality and design an effective defense system.

Prerequisite

  • Computer Network: the basic knowledge of computer networks, data communication basics, computer network architecture, computer local area network technology and so on.

  • Probability: the basic knowledge of probability, conditional probability and independence of events, random variables and probability distribution, 2D random variables and probability distribution.

  • Discrete Mathematics: mathematical logic, set, relationship and function, algebra system and graph theory.

Course Objectives

  • To understand security concepts, ethics in network security.

  • To understand the process of private-key encryption.

  • To understand the process of public-key encryption and the types.

  • To master security services and mechanisms in the network protocol stack.

Course Syllabus

  • Introduction: Principles of Modern Cryptography.

  • Perfect Secrecy and Its Limitations: Private-Key Encryption.

  • Message Authentication: Secrecy vs. Integrity; Message Authentication Codes; CBC-MAC; Authenticated Encryption.

  • Hash Functions: Security Requirements; HMAC; Additional Applications of Hash Functions.

  • Number Theory and Mathematical Background: The Public-Key Revolution; Key Distribution and Key Management; Diffie-Hellman Key Exchange.

  • Public-Key Encryption: Definitions of Security; Hybrid Encryption and the KEM/DEM Paradigm; El Gamal Encryption and DHIES; RSA Encryption and the RSA PKCS #1 Standard.

Textbooks & References

  • Menezes A J, Van Oorschot P C and Vanstone S A.Handbook of applied cryptography. CRC press, 1996.

  • Stinson D R.Cryptography: theory and practice. CRC press, 2005.

  • Mao W.Modern cryptography: theory and practice. Prentice Hall Professional Technical Reference, 2003.

  • Ab H. Cryptography and Coding. Springer Berlin Heidelberg, 2001.

Capability Tasks

CT1: To apply knowledge of computing and mathematics appropriately to the discipline.

CT2: To analyze a problem, and identify and define the computing requirements appropriate to its solution.

CT3: To design and implement a computer-based system, process, component or program to meet desired needs.

CS1: To master the basic theories of cryptography, and to understand the development status and trends of computer system.

CS2: To gain a comprehensive and solid foundation of Cryptography to apply secure protocols.

Achievements

  • To identify network security threats and to determine efforts to counter them. - Level: N

  • To write code for relevant cryptographic algorithms. - Level: M

  • To write a secure access client for access to a server. - Level: M

  • To send and receive secure mails. - Level: N

  • To determine firewall requirements, and to configure a firewall. - Level: M

Students: Computer science,Year 2