Syllabus

SubjectBASICSECCAP EXERCISE IN PROJECT BASED LEARNING C

Class Information

Faculty/Graduate School
POLICY MANAGEMENT / ENVIRONMENT AND INFORMATION STUDIES
Course Registration Number
49382
Subject Sort
W1053
Title
BASICSECCAP EXERCISE IN PROJECT BASED LEARNING C
Field
Courses Offered at Other Faculties
Unit
1 Unit
Year/Semester
2024 Fall
K-Number
FPE-CO-06203-211-60
Year/Semester
2024 Fall
Day of Week・Period
Lecturer Name
Keiji Takeda
Class Format
Online (Live)
Language
Japanese
Location
Other
Class Style
*Please click here for more information on the correspondence between 'Class Style' and ’Active Learning Methods’.
Group Work
GIGA Certificate
Not applied

Detail

Course Summary

Learn about In this course, students learn how to protect data in the Internet of Things (IoT) using public key cryptography and how to implement it in practice.

There are two types of cryptography, symmetric key cryptography and public key cryptography, which are the basis of cyber security.
The former assumes that each participant shares one or more secret keys in advance, so that
In a network of n terminals, n^2 keys must be managed, which is not realistic for IoT applications.
This is not realistic for IoT applications. On the other hand, public-key cryptography can realize a secure network of n terminals with a single key, providing a theoretically attractive solution.
On the other hand, public-key cryptography provides a theoretically attractive solution. However, many IoT devices have very limited computing, memory, and communication capabilities.
It is not easy to use public-key cryptography. Furthermore, attacks using a large number of IoT devices are also possible.

In this PBL exercise, we will cover a wide range of topics, from how to realize public-key cryptosystems for data protection to cryptanalysis methods.
The objective of this PBL exercise is to master the theoretical algorithms and practical implementation of public-key cryptography and its decryption methods.
By implementing public-key cryptography and cryptanalysis methods, students will be able to experience the time required for cryptanalysis and cryptanalysis.
The objective of this course is to promote deeper understanding of public-key cryptography and its decoding methods by experiencing the time required to implement them and decoding their algorithms.

Translated with DeepL.com (free version)incident response and communication