■ 課程目標 (Course Objectives)
密碼學是資訊安全的基石。諸如檔案加密保護、網路上身分驗證和通訊傳輸保密等等,都是密碼學的範疇。本課程講解密碼學基本知識、介紹多種加密演算法和其背後的數學原理、密碼學在電子商務的發展,並透過作業和報告讓學生具有實際練習和撰寫密碼元件程式的經驗,以達到具備設計安全資訊系統和擬訂完善安全策略的能力。
■ 課程內涵 (Course Contents)
Cryptography basic knowledge 1.2.6 Number Theory 1.2 Encryption Techniques 1.2 Encryption Algorithm 1.2.3 Applied Cryptography 1.2.3.6■ Course Objectives
Password learning is the cornerstone of information security. Such as file encryption protection, online identity verification and communication transmission confidentiality, etc., are all password learning. This course talks about basic knowledge of decryption code, introduces multiple encryption algorithms and the mathematical principles behind them, and the development of password learning in e-commerce, and allows students to have practical practice and writing password component programs through operations and reports to achieve a pre-design Security information system and ability to enforce security strategies.
■ Course Contents
Cryptography basic knowledge 1.2.6 Number Theory 1.2 Encryption Techniques 1.2 Encryption Algorithm 1.2.3 Applied Cryptography 1.2.3.6
電腦密碼學是網路安全、資訊系統安全、以及電子商務等領域中非常重要且核心的課程。大至國家軍事文件之保密,小至個人日常信函隱私,甚或電子商務之發展均需依賴電腦密碼學之研究。
Computer password learning is a very important and core course in the fields of network security, information system security, and e-commerce. From the confidentiality of national military documents to the privacy of personal daily letters, and even the development of e-commerce, all of which need to be studied by computer passwords.
1. Cryptography and Network Security: Principles and Practice, William Stallings, 7th Edition, Prentice Hall.
2. 密碼學與網路安全第四版(Cryptography and Network Security: Principles and Practice中譯本),賴榮樞,開發書局,2007
3. Applied Cryptographty, Bruce Schneier, John Wiley & Sons, Inc.
4. Cryptography - Theory and Practice, Douglas R. Stinson, CRC Press.
5. Security in Computing, Charles P. Pfleeger. Prentice-Hall, Inc.
6. Building Secure and Reliable Network Applications, Kenneth P. Birman, Manning Publications Co.
7. Internet Firewalls and Network Security, Chris Hare & Karanjit Siyan, New Riders Publishing.
8. Cryptography and Data Security, Dorothy E. R. Denning, Addison-Wesley Publishing Company.
9. Algorithmic Number Theory, Eric Bach and Jeffrey Shallit.
10. Handbook of Applied Cryptograph, Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone.
11.Differential Cryptanalysis of the Data Encryption Standard, Eli Biham and Adi Shamir.
12.Elliptic Curve Public Key Cryptosystems, Alfred Menezes.
1. Cryptography and Network Security: Principles and Practice, William Stallings, 7th Edition, Prentice Hall.
2. Password and Network Security: Principles and Practice, Book Development Bureau, 2007
3. Applied Cryptographty, Bruce Schneier, John Wiley & Sons, Inc.
4. Cryptography - Theory and Practice, Douglas R. Stinson, CRC Press.
5. Security in Computing, Charles P. Pfleeger. Prentice-Hall, Inc.
6. Building Secure and Reliable Network Applications, Kenneth P. Birman, Manning Publications Co.
7. Internet Firewalls and Network Security, Chris Hare & Karanjit Siyan, New Riders Publishing.
8. Cryptography and Data Security, Dorothy E. R. Denning, Addison-Wesley Publishing Company.
9. Algorithmic Number Theory, Eric Bach and Jeffrey Shallit.
10. Handbook of Applied Cryptograph, Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone.
11.Differential Cryptanalysis of the Data Encryption Standard, Eli Biham and Adi Shamir.
12.Elliptic Curve Public Key Cryptosystems, Alfred Menezes.
評分項目 Grading Method | 配分比例 Grading percentage | 說明 Description |
---|---|---|
作業作業 Action |
20 | |
期中考期中考 Midterm exam |
25 | |
期末考期末考 Final exam |
25 | |
報告與平時表現報告與平時表現 Reporting and daily performance |
30 |