Course title
P07300003
Coding Theory

MANO Kazunori Click to show questionnaire result at 2016

KIMURA Gen
Course description
This is a introductory course for a basic cryptography and coding theory.
In constructing the system of information or communication, any information must be represented by a suitable code.
Such a code might be a cryptographic code for serucity, an source coding for an efficient information compression, or a channel coding for a fast and reliable communication.

The first part of this lecture presents a basis of the theory of cryptography.
Starting from an elementary methods of cryptography, students will learn both the symmetric-key crptography and the public key crpytography,
including ONE-TIME-PAD, RSA, DES, etc.

The second part of this lecture presents a basis of the communication channel coding theory.
In particular, students will learn an error correcting code focusing on block code and convolution code.
Exercises will be conducted to aid practical understanding of the lectures.
Purpose of class
To master the basics of the theory and technology of high reliability and confidentiality in information and communications, and to provide a foundation for deeper study as an engineer.
Goals and objectives
  1. Able to explain basic concepts and applications of cryptography and coding theory.
  2. Able to handle public key and common key encryption, error correction and detection of channel codes, block codes and convolutional codes mathematically.
  3. Able to implement simple programs for encryption and coding, and to perform simulations.
Relationship between 'Goals and Objectives' and 'Course Outcomes'

First half: Mid-term examination and program implementation Second half: Exercises (assignment report) Second half: Final exam Total.
1. 20% 10% 10% 40%
2. 20% 10% 10% 40%
3. 10% 10% 20%
4. 0%
Total. 50% 30% 20% -
Language
Japanese
Class schedule

Class schedule HW assignments (Including preparation and review of the class.) Amount of Time Required
1. Orientation and Introduction to an elementary cryptography I Read the syllabus. 60minutes
Study examples of cryptography and coding applications. 120minutes
2. Introduction to an elementary cryptography II Study elementary methods of cryptography. 190minutes
3. ONE TIME PAD cryptography Review ASCII and the theory of probability 190minutes
4. DES cryptography Review previous class 190minutes
5. Diffie-Hellman cryptography key exchange Study RSA cryptography 190minutes
6. RSA cryptography Review previous class 190minutes
7. Intermediate exam Study for the exam. 190minutes
8. Linear codes, mathematical foundations: finite fields, power and polynomial representations, and conjugate roots. Read handouts of mathematical basis. 70minutes
Review of the mathematical basis. 120minutes
9. Cyclic codes (1): Cyclic codes, generative polynomials, cyclic Hamming codes. Read handouts of cyclic code (1). 70minutes
Review of the cyclic code (1). 120minutes
10. Cyclic code (2): BCH code Read handouts of cyclic code (2). 70minutes
Review of the cyclic code (2). 120minutes
11. Cyclic code (3): Reed-Solomon code Read handouts of cyclic code (3). 70minutes
Review of the cyclic code (3). 120minutes
12. Convolutional codes (1): Introduction of convolutional codes, finite state description Read handouts of convolutional code (1). 70minutes
Review of convolutional code (1). 120minutes
13. Convolutional code (2): Maximum likelihood decoding (Viterbi algorithm). Read handouts of convolutional code (2). 70minutes
Review of convolutional code (2) 120minutes
14. Final examination and overall summary Overall review and test preparation 190minutes
Total. - - 2650minutes
Evaluation method and criteria
The first half is evaluated by a mid-term examination (40%) and a cryptography program implementation assignment (60%).
In the second half, coding theory (error correcting codes), students are evaluated based on exercises (50% on assignment reports) and a final examination (50%).
The final evaluation is 50% for the first half and 50% for the second half. 60% or more of the total evaluation score is required to pass the class.
Feedback on exams, assignments, etc.
ways of feedback specific contents about "Other"
Feedback in the class
Textbooks and reference materials
For the first part: Cryptography
Original documents will be delivered.
Recommended textbooks will also be announced in the class.

For the second part: Coding theory
Textbook: 「例題で学ぶ符号理論入門」先名健一著(森北出版)2011.
Some original texts will be delivered.

References:「誤り訂正技術の基礎」和田山正著(森北出版)2010.
Prerequisites
It is desireable to have taken "Information Theory (情報理論)" class.
Office hours and How to contact professors for questions
  • Anytime by e-mail (Prof. Kimura)
  • Monday 13:20-15:00 (Prof. Mano)
Regionally-oriented
Non-regionally-oriented course
Development of social and professional independence
  • Course that cultivates an ability for utilizing knowledge
  • Course that cultivates a basic problem-solving skills
Active-learning course
More than one class is interactive
Course by professor with work experience
Work experience Work experience and relevance to the course content if applicable
Applicable In the first half of the lecture, students will learn how to implement cryptographic codes learned in the lecture.
In the latter half of the lecture, the coding part, we will teach the concept of error-correcting codes necessary for developing communication systems, based on our experience of working on communication system development.
Education related SDGs:the Sustainable Development Goals
  • 4.QUALITY EDUCATION
  • 8.DECENT WORK AND ECONOMIC GROWTH
  • 9.INDUSTRY, INNOVATION AND INFRASTRUCTURE
  • 12.RESPONSIBLE CONSUMPTION & PRODUCTION
Last modified : Fri Jun 28 16:52:13 JST 2024