IIST (Institute of Integrated Science and Technology)

Back to List

FRI500D1(情報学フロンティア / Frontiers of informatics 500)
Cryptography and its Applications
暗号とその応用

Tatsuaki OKAMOTO

Class code etc
Faculty/Graduate school IIST (Institute of Integrated Science and Technology)
Attached documents
Year 2022
Class code YD955
Previous Class code
Previous Class title
Term
Day/Period
Class Type
Campus 小金井 / Koganei
Classroom name 各学部・研究科等の時間割等で確認
Grade
Credit(s) 2
Notes
Class taught by instructors with practical experience

Show all

Hide All

Outline and objectives

Nowadays, modern cryptography is widely used on the Internet and many IT applications. Cryptocurrencies and block-chains are one of the applications of cryptography. This course will introduce the basic concept and techniques of modern cryptography as well as for cryptocurrencies. It will also provide some advanced topics of modern cryptography such as post-quantum cryptography, homomorphic encryption, and functional encryption.

Goal

The students will get to understand the key concepts and techniques in modern cryptography and its applications to cryptocurrencies, such as symmetric-key encryption, public-key encryption, digital signatures, Bitcoin, block-chains and some advanced concepts of cryptography.

Default language used in class

英語 / English

Method(s)(学期の途中で変更になる場合には、別途提示します。 /If the Method(s) is changed, we will announce the details of any changes. )

Following the lectures, the students will learn the concepts and understand the basis of modern cryptography and cryptocurrencies. This course provides opportunities for students to learn the basic knowledge, methods, and techniques.

Active learning in class (Group discussion, Debate.etc.)

あり / Yes

Fieldwork in class

なし / No

Schedule

授業形態/methods of teaching:対面/face to face

※各回の授業形態は予定です。教員の指示に従ってください。

1st class[対面/face to face]:Introduction

Background of modern cryptography. Introduction to the lecturer. Course overview.

2nd class[対面/face to face]:Symmetric-key cryptosystems

Block ciphers and authentication code

3rd class[対面/face to face]:Concept of Public-key cryptosystems

Public-key encryption, Key exchange

4th class[対面/face to face]:Security and construction of public-key cryptosystems

CCA security, DH key exchange, RSA encryption, ElGamal encryption

5th class[対面/face to face]:Concept and security of digital signatures and hash functions

Requirements for electronic signatures, EU-CMA security

6th class[対面/face to face]:Construction of digital signatures and hash functions

RSA signatures, (EC-)DSA signatures, SHA family of hash functions

7th class[対面/face to face]:Public-key infrastructures (PKI)

Certificate authorities (CA), Digital signature laws

8th class[対面/face to face]:Post-quantum cryptography

Quantum computer, Lattice-based cryptography

9th class[対面/face to face]:Electronic money

Traditional electronic money systems, Ecash systems

10th class[対面/face to face]:Bitcoin

Proof of work (POW), Mining, Transactions, Block-chain.

11th class[対面/face to face]:Drawbacks of Bitcoin and other cryptocurrencies

Proof of Stake (POS), Smart contract, Ethereum, DAG

12th class[対面/face to face]:Block-chains

Open Ledger, Centralized/decentralized system, Public/private systems

13th class[対面/face to face]:Advances of public-key cryptosystems (1)

Fully homomorphic encryption, Applications, Lattice based construction

14th class[対面/face to face]:Advances of public-key cryptosystems (2)

Functional encryption, Applications, Bilinear based construction

Work to be done outside of class (preparation, etc.)

【Preparatory study and review time for this class are 4 hours each.】
Before the first lecture, please check:
https://en.wikipedia.org/wiki/Cryptograph

Textbooks

I will introduce some books and articles in my lectures.

References

I will introduce some books and articles in my lectures.

Grading criteria

1. Class participation: 40%
2. Final report: 60%

Changes following student comments

All students are enthusiastic and showed a sufficient level of understanding.