암호 이론 및 정보보안 실무
☞ 강의계획서 다운로드
교과목 개요 및 강의 목표
본 교과목에서는 정보보안의 기본 이론인 암호학과 그 응용분야에 대해 학습한다. 암호학과 관련된 알고리즘에 대해 심도있게 논의 하며, 응용분야에서는 보안 취약점과 대응방안, 정보보호시스템 등에 대해 실무관련 분야에 대해 논의한다. 최근 암호학 및 보안관련 논문, 저서, 연구보고서 등을 분석하며 심도 있는 토론을 진행한다.
교재 및 참고자료
1) 주교재:
- Cryptography And Network Security, William Stallings, Pearson
- Cryptography Engineering: Design Principles and Practical Applications, Niels Ferguson
2) 보조교재
- IEEE Xplore Digital Library, http://www.ieeexplore.ieee.org/
- ACM Digital Library, http://dl.acm.org/dl.cfm
학습평가 방법
출석(20%), 발표(10%), 과제물 (10%), 중간고사 (20%), 기말고사 (40%)
Presentations
Weekly |
Presenter |
Title |
Download |
1st |
Professor |
1. Orientation |
|
2nd(1) |
Pradip Kumar |
Chapter 02: Classical Encryption Techniques (Section: 1) |
|
2nd(2) |
Saurabh Singh |
Chapter 03: Block Cipher and DES (Section: 1,2,5) |
|
3rd |
권병욱 (Frank) |
Chapter 04: Basic Concepts in Number Theory and Finite Fields (Section: 3) |
|
3rd(2) |
박경엽 (Kyung-yeop Park) |
Chapter 05: Advanced Encryption Standard (AES) (Section: 2, 3, 4) |
|
4th |
오트곤바타르 (Tumenbayar) |
Chapter 06: Block Cipher Operation (Section: 1,2,3,4,5,6,7) |
|
4th |
김남용 (Namyong Kim) |
Chapter 06: Block Cipher Operation (Section: 1,2,3,4,5,6,7) |
|
5th(1) |
남기훈(Gihoon-Nam) |
Chapter 09: Public-Key Cryptography and RSA (Section: 1,2)
|
|
5th(2) |
예카테리나김 (Yekaterina Kim) |
Chapter 10: Other Public-Key Cryptosystems (Section: 1, 3, 4, 5) |
|
5th(3) |
서승희(Hee) |
Chapter 11: Cryptographic Hash Function (Section: 1,2,3,4,5) |
|
6th |
친바타르 (Chinbatar) |
Chapter 12: Meesage Authentication Codes (Section: 1,2,3,7) |
|
6th(2) |
셔일렌드라 (Shailendra) |
Chapter 13: Digital Signatures (Section: 1,2,3,4,5,6) |
|
7th(1) |
사우라브 싱 (Saurabh Singh) |
Chapter 14: Key Management and Distribution (Section: 1,2,3,4,5) |
|
7th(2) |
문서연 (Seo Yeon Moon) |
Chapter 15: User Authentication Protocols (Section: 1,2,3,4,5,6) |
|
8th |
|
Middle Term |
|
09th(1) |
공성현(Gong) |
Chapter 16: Network Access Control and Cloud Security
(Section: 1,2,3,4,5,6,7)
|
|
09th(2) |
셔일렌드라 (Shailendra) |
Chapter 18: Wireless Network Security (Section: 1,2,3,4) |
|
10th(1) |
Pradip Kumar Sharma |
Tschorsch, F., & Scheuermann, B. (2015). Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Communications Surveys & Tutorials, 18(3), 2084-2123 |
|
10th(2) |
서승희(Hee) |
Bozic, N., Pujolle, G., & Secci, S. (2016, December). A tutorial on blockchain and applications to secure network control-planes. In Smart Cloud Networks & Systems (SCNS) (pp. 1-8). IEEE |
|
11th(1) |
Saurabh |
Christidis, K., & Devetsikiotis, M. (2016). Blockchains and Smart Contracts for the Internet of Things. IEEE Access, 4, 2292-2303 |
|
11th(2) |
박경엽 (Kyung-yeop Park) |
Natoli, C., & Gramoli, V. (2016, October). The blockchain anomaly. In Network Computing and Applications (NCA), 2016 IEEE 15th International Symposium on (pp. 310-317). IEEE |
|
|