课程内容简介 建立密码学,信息安全的基本理念. 介绍密码算法(DES,IDEA, AES, MD5, SHA)的设计和破译的原理和方法. 介绍认证的基本要素,标准认证协议及其使用. 启发科研课题. 希望学生在今后学习,研究和工作中知道自己在做什么. | 课程内容简介(英文) Basic concepts and advanced topics in cryptography and IT-security. --Establish the right understanding of security, attacks and complexity. --Principles, structures and methods in the design of the block ciphers DES, IDEA, AES; Explain the strength and weakness in each algorithms and designs. Ideas and methods of varies attacks on block ciphers, main topic is differential attack; --Fundamental and construction of iterated hash functions. Attacks on hash functions: pre-image and collision, especially the recent results on MD4, MD5,SHA-1. --Concept and methods of authentication. Security requirements on protocols of challenge-response type. The use of standard protocols such as SSL, public-key certificates, PKI, S/MIME in real applications like e-bank, web-security and email. | 教学大纲 (6-学时) Introduction: Basic concepts and definitions in information security. Establish the right understanding of security, attacks and complexity. (6-学时) Cipher design: Principles, structures and methods in the design of the block ciphers DES, IDEA, AES; Explain the strength and weakness in each algorithms and designs. (6-学时) Cryptanalysis: Ideas and methods of varies attacks on block ciphers, main topic is differential attack. (6-学时) Hash function: fundamental and construction of iterated hash functions. Attacks on hash functions: pre-image and collision, especially the recent results on MD4, MD5,SHA-1. 6 (3-学时) Authentication protocols: concept and methods of authentication. Security requirements on protocols of challenge-response type.(3-学时) Standards: Authentication protocols in ISO standards using MAC, hash functions, ciphers, zero-knowledge and password. (3-学时) Authentication in applications: SSL, public-key certificates, PKI, S/MIME in e-bank, web-security, email. | 课程进度计划 进度按大纲顺序。要求用英语讨论,完成作业。课程大作业包括自行设计加密算法及其密码分析 | 课程考核要求 英语授课,作业.考试在授课过程中分段进行。成绩由-上课-作业-报告-讨论-考试-综合评定. | 参 考 文 献 - 1. A.Menezes, P.Oorshcot, and S.Vanstone. Handbook of Applied Crpytography. CRC Press, 1997. 2。W. Stallings, Cryptography and network security - principles and practice. Prentice-Hall, 1998, 2nd edition3。裴定一,徐祥, 信息安全数学基础, ISBN 978-7-115-15662-4, 人民邮电出版社,2007.4。吴文玲,冯登国,张文涛,分组密码的设计与分析,(第二版),清华大学出版社,2009。其它文献可在课件发布网点下载。2. 论文-从课程教学网站下载-www.seiee.sjtu.edu.cn/cms/
|
|