Türkçe English Rapor to Course Content
COURSE SYLLABUS
CRYPTOGRAPHY
1 Course Title: CRYPTOGRAPHY
2 Course Code: BM5114
3 Type of Course: Optional
4 Level of Course: Second Cycle
5 Year of Study: 1
6 Semester: 2
7 ECTS Credits Allocated: 6
8 Theoretical (hour/week): 3
9 Practice (hour/week) : 0
10 Laboratory (hour/week) : 0
11 Prerequisites: None
12 Recommended optional programme components: None
13 Language: Turkish
14 Mode of Delivery: Face to face
15 Course Coordinator: Dr. Ögr. Üyesi CENGİZ TOĞAY
16 Course Lecturers: -
17 Contactinformation of the Course Coordinator: Tel: 02242942796
ctogay@uludag.edu.tr
18 Website:
19 Objective of the Course: Classical cryptography: some simple crypto systems, analysis of simple crypto systems. Shannon theory: probability theory, properties of entropy, product cryptosystems. Block encryption algorithms: change-permutation networks, linear cryptanalysis, differential cryptanalysis, data encryption standard (DES), advanced encryption standard (AES), encryption modes. Cryptographic summary functions: summary functions and data integrity, security of summary functions, iterative summary functions, message verification codes. RSA cryptosystem: open-key Introduction to cryptosystems, number theory. Open keyed based on discrete logarithm problem cryptosystems: ElGamal cryptosystem, finite fields, elliptic curve cryptosystem. Digital signature: security requirements of digital signature systems, ElGamal digital signature system, DSA, ECDSA.
20 Contribution of the Course to Professional Development It will be provided to have knowledge about secure communication techniques.
21 Learning Outcomes:
1 77/5000 They learn how to develop classical cryptography systems.;
2 They can carry out data encryption standard (DES) and advanced encryption standard (AES).;
3 They can implement the RSA cryptosystem.;
4 Examine and implement ElGamal and elliptic curve cryptosystems.;
5 Learn ElGamal digital signature system, DSA and ECDSA.;
22 Course Content:
Week Theoretical Practical
1 Classical cryptography: some simple crypto systems, analysis of simple crypto systems.
2 Classical cryptography: some simple crypto systems, analysis of simple crypto systems.
3 Shannon theory: probability theory, properties of entropy, product cryptosystems.
4 Block encryption algorithms: change-permutation networks, linear cryptanalysis, differential cryptanalysis, data encryption standard (DES), advanced encryption standard (AES), encryption modes.
5 Block encryption algorithms: change-permutation networks, linear cryptanalysis, differential cryptanalysis, data encryption standard (DES), advanced encryption standard (AES), encryption modes.
6 Block encryption algorithms: change-permutation networks, linear cryptanalysis, differential cryptanalysis, data encryption standard (DES), advanced encryption standard (AES), encryption modes.
7 Cryptographic summary functions: summary functions and data integrity, security of summary functions, iterative summary functions, message verification codes.
8 Cryptographic summary functions: summary functions and data integrity, security of summary functions, iterative summary functions, message verification codes.
9 RSA cryptosystem: open-key Introduction to cryptosystems, number theory.
10 RSA cryptosystem: open-key Introduction to cryptosystems, number theory.
11 Open keyed based on discrete logarithm problem cryptosystems: ElGamal cryptosystem, finite fields, elliptic curve cryptosystem.
12 Open keyed based on discrete logarithm problem cryptosystems: ElGamal cryptosystem, finite fields, elliptic curve cryptosystem.
13 Digital signature: security requirements of digital signature systems, ElGamal digital signature system, DSA, ECDSA.
14 Digital signature: security requirements of digital signature systems, ElGamal digital signature system, DSA, ECDSA.
23 Textbooks, References and/or Other Materials: 1) Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition by Bruce Schneier (Oct 18, 1996) Wiley; 2nd edition (October 18, 1996)
2) Christof Paar, Understanding Cryptography: A Textbook for Students and Practitioners”, Springer; 1st Edition.2nd Printing edition (July 8, 2010).
3) Niels Ferguson, Bruce Schneier, Tadayoshi Kohno, “Cryptography Engineering: Design Principles and Practical Applications” Wiley; 1 edition (March 15, 2010)
24 Assesment
TERM LEARNING ACTIVITIES NUMBER PERCENT
Midterm Exam 1 40
Quiz 0 0
Homeworks, Performances 0 0
Final Exam 1 60
Total 2 100
Contribution of Term (Year) Learning Activities to Success Grade 40
Contribution of Final Exam to Success Grade 60
Total 100
Measurement and Evaluation Techniques Used in the Course Written Exam
Information
25 ECTS / WORK LOAD TABLE
Activites NUMBER TIME [Hour] Total WorkLoad [Hour]
Theoretical 14 3 42
Practicals/Labs 0 0 0
Self Study and Preparation 0 0 0
Homeworks, Performances 0 0 0
Projects 0 0 0
Field Studies 0 0 0
Midtermexams 1 60 60
Others 0 0 0
Final Exams 1 80 80
Total WorkLoad 242
Total workload/ 30 hr 6,07
ECTS Credit of the Course 6
26 CONTRIBUTION OF LEARNING OUTCOMES TO PROGRAMME QUALIFICATIONS
PQ1 PQ2 PQ3 PQ4 PQ5 PQ6
LO1 2 4 4 3 5 3
LO2 3 4 4 5 3 5
LO3 3 4 1 3 3 4
LO4 3 4 2 3 3 1
LO5 3 4 1 5 4 4
LO: Learning Objectives PQ: Program Qualifications
Contribution Level: 1 Very Low 2 Low 3 Medium 4 High 5 Very High
Bologna Communication
E-Mail : bologna@uludag.edu.tr
Design and Coding
Bilgi İşlem Daire Başkanlığı © 2015
otomasyon@uludag.edu.tr