Professor : Kwangjo Kim (x.6118) TA : Byoungcheon Lee (x.6158)
Credit : 3
Hour : 3
1. Description
With the adventment
of information infrastrucure, the side-effects such as illegal wiretapping,
modification, or insersion, etc of information are rapidly inceased. This
course focuses the student to be capable of designing the theoretical
and practical countermeasures against such malicious acts for building
secure information society.
We deal with symmetric cryptosystem (conventional cryptosystems, block and stream ciphers), asymmetric cryptosytem( RSA, Diffie-Hellman ) , digital signature and hash function, and idetification, zero-knowledge proof, and the latest hot issues by student term proects. |
4. Weekly Lecture Plan
|
|
|
(1~4) |
- Introduction
- Conventiional Cryptosystem - Block Cipher System(I) - Block Cipher System(II) |
TP Report #1
HW #1 |
(5~8) |
- Stream Cipher
System
- Public Key Cryptosystem(I) - Public Key Cryptosystem(II) - Mid-term Exam. |
HW #2
TR Report #2 |
(9~12) |
- Digital Signature(I)
- Digital Signature(II) - Hash Functions - Zero-Knowledge Proof |
H/W #3
H/W #4 |
(13~15) |
- Identification
- Term Project Presentation - Final Exam. |
TP Rep#3 |