
Learn about In this course, students learn how to protect data in the Internet of Things (IoT) using public key cryptography and how to implement it in practice.
There are two types of cryptography, symmetric key cryptography and public key cryptography, which are the basis of cyber security.
The former assumes that each participant shares one or more secret keys in advance, so that
In a network of n terminals, n^2 keys must be managed, which is not realistic for IoT applications.
This is not realistic for IoT applications. On the other hand, public-key cryptography can realize a secure network of n terminals with a single key, providing a theoretically attractive solution.
On the other hand, public-key cryptography provides a theoretically attractive solution. However, many IoT devices have very limited computing, memory, and communication capabilities.
It is not easy to use public-key cryptography. Furthermore, attacks using a large number of IoT devices are also possible.
In this PBL exercise, we will cover a wide range of topics, from how to realize public-key cryptosystems for data protection to cryptanalysis methods.
The objective of this PBL exercise is to master the theoretical algorithms and practical implementation of public-key cryptography and its decryption methods.
By implementing public-key cryptography and cryptanalysis methods, students will be able to experience the time required for cryptanalysis and cryptanalysis.
The objective of this course is to promote deeper understanding of public-key cryptography and its decoding methods by experiencing the time required to implement them and decoding their algorithms.
Translated with DeepL.com (free version)incident response and communication