■ 課程目標 (Course Objectives)
密碼學是資訊安全的基石。諸如檔案加密保護、網路上身分驗證和通訊傳輸保密等等,都是密碼學的範疇。本課程講解密碼學基本知識、介紹多種加密演算法和其背後的數學原理、密碼學在電子商務的發展,並透過作業和報告讓學生具有實際練習和撰寫密碼元件程式的經驗,以達到具備設計安全資訊系統和擬訂完善安全策略的能力。
■ 課程內涵 (Course Contents)
Cryptography basic knowledge 1.2.6 Number Theory 1.2 Encryption Techniques 1.2 Encryption Algorithm 1.2.3 Applied Cryptography 1.2.3.6■Course Objectives
Cryptography is the cornerstone of information security. Such as file encryption protection, online identity verification and communication transmission confidentiality, etc., are all areas of cryptography. This course explains the basic knowledge of cryptography, introduces various encryption algorithms and the mathematical principles behind them, and the development of cryptography in e-commerce. Through assignments and reports, students will have practical experience in practicing and writing cryptographic component programs, so as to achieve design capabilities. Security information systems and the ability to formulate sound security strategies.
■ Course Contents
Cryptography basic knowledge 1.2.6 Number Theory 1.2 Encryption Techniques 1.2 Encryption Algorithm 1.2.3 Applied Cryptography 1.2.3.6
電腦密碼學是網路安全、資訊系統安全、以及電子商務等領域中非常重要且核心的課程。大至國家軍事文件之保密,小至個人日常信函隱私,甚或電子商務之發展均需依賴電腦密碼學之研究。
Computer cryptography is a very important and core course in the fields of network security, information system security, and e-commerce. From the confidentiality of national military documents to the privacy of personal daily correspondence, or even the development of e-commerce, all rely on the research of computer cryptography.
1. Cryptography and Network Security: Principles and Practice, William Stallings, 7th Edition, Prentice Hall.
2. 密碼學與網路安全第四版(Cryptography and Network Security: Principles and Practice中譯本),賴榮樞,開發書局,2007
3. Applied Cryptographty, Bruce Schneier, John Wiley & Sons, Inc.
4. Cryptography - Theory and Practice, Douglas R. Stinson, CRC Press.
5. Security in Computing, Charles P. Pfleeger. Prentice-Hall, Inc.
6. Building Secure and Reliable Network Applications, Kenneth P. Birman, Manning Publications Co.
7. Internet Firewalls and Network Security, Chris Hare & Karanjit Siyan, New Riders Publishing.
8. Cryptography and Data Security, Dorothy E. R. Denning, Addison-Wesley Publishing Company.
9. Algorithmic Number Theory, Eric Bach and Jeffrey Shallit.
10. Handbook of Applied Cryptograph, Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone.
11.Differential Cryptanalysis of the Data Encryption Standard, Eli Biham and Adi Shamir.
12.Elliptic Curve Public Key Cryptosystems, Alfred Menezes.
1. Cryptography and Network Security: Principles and Practice, William Stallings, 7th Edition, Prentice Hall.
2. Cryptography and Network Security: Principles and Practice, fourth edition (Chinese translation), Lai Rongshu, Kaifa Bookstore, 2007
3. Applied Cryptographty, Bruce Schneier, John Wiley & Sons, Inc.
4. Cryptography - Theory and Practice, Douglas R. Stinson, CRC Press.
5. Security in Computing, Charles P. Pfleeger. Prentice-Hall, Inc.
6. Building Secure and Reliable Network Applications, Kenneth P. Birman, Manning Publications Co.
7. Internet Firewalls and Network Security, Chris Hare & Karanjit Siyan, New Riders Publishing.
8. Cryptography and Data Security, Dorothy E. R. Denning, Addison-Wesley Publishing Company.
9. Algorithmic Number Theory, Eric Bach and Jeffrey Shallit.
10. Handbook of Applied Cryptograph, Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone.
11.Differential Cryptanalysis of the Data Encryption Standard, Eli Biham and Adi Shamir.
12.Elliptic Curve Public Key Cryptosystems, Alfred Menezes.
評分項目 Grading Method | 配分比例 Grading percentage | 說明 Description |
---|---|---|
作業作業 Homework |
20 | |
期中考期中考 midterm exam |
25 | |
期末考期末考 final exam |
25 | |
報告與平時表現報告與平時表現 Reports and daily performance |
30 |