Course Information
SemesterCourse Unit CodeCourse Unit TitleT+P+LCreditNumber of ECTS CreditsLast Updated Date
1COMP 5554CRYPTOGRAPHY3+0+03827.11.2015

 
Course Details
Language of Instruction English
Level of Course Unit Master's Degree
Department / Program Master of Science in COMPUTER ENGINEERING with thesis (In English)
Type of Program Formal Education
Type of Course Unit Elective
Course Delivery Method Face To Face
Objectives of the Course This course aims to introduce number theoretic aspects of cryptography.
Course Content Half of the term is dedicated to symmetric ciphers and the other half to asymmetric ciphers.
Course Methods and Techniques
Prerequisites and co-requisities None
Course Coordinator Assistant Professor HÜSEYİN HIŞIL
Name of Lecturers Assistant Professor HÜSEYİN HIŞIL
Assistants None
Work Placement(s) No

Recommended or Required Reading
Resources Robert Sedgewick, Algorithms in C, Parts 1-4 (Fundamental Algorithms, Data Structures, Sorting, Searching)

Course Category
Mathematics and Basic Sciences %25
Engineering %30
Engineering Design %25
Social Sciences %0
Education %0
Science %0
Health %0
Field %20

Planned Learning Activities and Teaching Methods
Activities are given in detail in the section of "Assessment Methods and Criteria" and "Workload Calculation"

Assessment Methods and Criteria
In-Term Studies Quantity Percentage
Participation 14 % 0
Quiz 1 % 10
Homework 5 % 40
Project 1 % 20
Presentation/Seminar 1 % 30
Contribution of final Examination and Final Project 1 % 30
Total
23
% 130

 
ECTS Allocated Based on Student Workload
Activities Quantity Duration Total Work Load
Attendance 14 3 42
Quiz 1 2 2
Homework 5 8 40
Course Teaching Hours(14 weeks)Total course hours 14 3 42
Further self-study 14 5 70
Contribution of final Examination and Final Project 1 3 3
Total Work Load   Number of ECTS Credits 7 199

 
Course Learning Outcomes: Upon the successful completion of this course, students will be able to:
NoLearning Outcomes
1 Learning and designing symmetric ciphers
2 Learning and designing asymmetric ciphers
3 Engineering crypto-suits
4 Detecting vulnerabilities of a crypto application

 
Weekly Detailed Course Contents
WeekTopicsStudy MaterialsMaterials
1 Random number generation
2 Crypto basics
3 Block ciphers
4 Stream ciphers
5 Hash functions
7 AES
8 RSA, DH
9 ElGamal
10 Elliptic curves
11 Elliptic curves II
12 Lattice based cryptosystems
13 Cryptographic protocols
14 Cryptographic protocols II

 
Contribution of Learning Outcomes to Programme Outcomes
P1 P2 P3 P4 P5
C1 4 4 3 1 2
C2 5 4 2 2 1
C3 3 3 3 1 1
C4 3 4 3 2 1

  bbb

  
  https://obs.yasar.edu.tr/oibs/bologna/progCourseDetails.aspx?curCourse=4005000556661&lang=en