南京理工大学
《Theory of Modern Cryptology and Its Applications(II)》课程内容简介
课程编码 B106B005 课程类别 必修课
课程名称 Theory of Modern Cryptology and Its Applications(II)
英文名称 Theory of Modern Cryptology and Its Applications II
开课院系 计算机科学与工程学院 、网络空间安全学院(互联网研究院)
开课季节 秋学期 授课方式 面授讲课
考核方式 考试 课件地址
考试方式 闭卷 成绩计算方法 期末100%
课程总学时 32 课程学分 2
实验学时 适用对象
课程类型 理论课 课程属性 必修
任 课 教 师
教师姓名性别所属院系职称年龄
黄婵颖 计算机科学与工程学院 讲师 36

教学目标:
The objective of this class is to let students understand modern cryptology and security techniques and the advanced issues. By the indispensable discussion about security protocols, including Pseudo-random number generation, key distribution and agreement, authentication schemes and encryption algorithms, students will master these crypto-algorithms and security techniques, and are guided to examine and understand the security strength of protocols and systems against arbitrary attackers and attack scenarios.

课程内容:
1 PSEUDO-RANDOM NUMBER GENERATION (4 HRS)
1.1 Introduction and Examples
1.2 Indistinguishability of Probability Distributions
1.3 The Blum-Blum-Shub Generator
1.4 Probabilistic Encryption
2 IDENTIFICATION SCHEMES AND ENTITY AUTHENTICATION (6 HRS)
2.1 Introduction
2.2 Challenge-and-Response in the Secret-Key Setting
2.3 Challenge-and-Response in the Public-Key Setting
2.4 The Schnorr Identification Scheme
2.5 The Okamoto Identification Scheme
2.6 The Guillou-Quisquater Identification Scheme
3 KEY DISTRIBUTION (5 HRS)
3.1 Introduction
3.2 Diffie-Hellman Key Predistribution
3.3 Unconditionally Secure Key Predistribution
3.4 Key Distribution Patterns
3.5 Session Key Distribution Schemes
4 KEY AGREEMENT SCHEMES (5 HRS)
4.1 Introduction
4.2 Diffie-Hellman Key Agreement
4.3 MTI Key Agreement Schemes
4.4 Key Agreement Using Self-Certifying Keys
4.5 Encrypted Key Exchange
4.6 Conference Key Agreement Schemes
5 PUBLIC-KEY INFRASTRUCTURE (4 HRS)
5.1 Introduction: What is a PKI?
5.2 Certificates
5.3 Trust Models
5.4 The Future of PKI?
5.5 Identity-Based Cryptography
6 SECRET SHARING SCHEMES (4 HRS)
6.1 Introduction: The Shamir Threshold Scheme
6.2 Access Structures and General Secret Sharing
6.3 Information Rate and Construction of Efficient Schemes
7 MULTICAST SECURITY AND COPYRIGHT PROTECTION (4 HRS)
7.1 Introduction to Multicast Security
7.2 Broadcast Encryption
7.3 Multicast Re-Keying
7.4 Copyright Protection
7.5 Tracing Illegally Redistributed Keys

适用学生:
全日制硕士    非全日制硕士    留学硕士    进修硕士    硕博连读    本科直博    全日制博士    留学博士    进修博士    在职专硕    其他    

预修课程:
Preparatory Courses:Discrete Mathematics,C++ Programming, Computer Network

参考书目:
教材:Cryptography: Theory and Practice (4th Edition), by Douglas R. Stinson and Maura Paterson,Chapman and Hall/CRC,ISBN-10: 1138197017, 2018.
参考书:
[1] Introduction to Modern Cryptography (2nd Edition), by Jonathan Katz and Yehuda Lindell, Chapman and Hall/CRC, ISBN-10: 1466570261, 2014.
[2] Cryptography and Network Security: Principles and Practice (7th Edition), by William Stallings, Pearson, ISBN-10: 0134444280, 2016.
必读参考资料:Class Handouts

备注: