| Semester | Course Unit Code | Course Unit Title | T+P+L | Credit | Number of ECTS Credits | Last Updated Date |
| 1 | COMP 5554 | CRYPTOGRAPHY | 3+0+0 | 3 | 8 | 27.11.2015 |
|
Language of Instruction
|
English
|
|
Level of Course Unit
|
Master's Degree
|
|
Department / Program
|
Master of Science in COMPUTER ENGINEERING with thesis (In English)
|
|
Type of Program
|
Formal Education
|
|
Type of Course Unit
|
Elective
|
|
Course Delivery Method
|
Face To Face
|
|
Objectives of the Course
|
This course aims to introduce number theoretic aspects of cryptography.
|
|
Course Content
|
Half of the term is dedicated to symmetric ciphers and the other half to asymmetric ciphers.
|
|
Course Methods and Techniques
|
|
|
Prerequisites and co-requisities
|
None
|
|
Course Coordinator
|
Assistant Professor HÜSEYİN HIŞIL
|
|
Name of Lecturers
|
Assistant Professor HÜSEYİN HIŞIL
|
|
Assistants
|
None
|
|
Work Placement(s)
|
No
|
Recommended or Required Reading
|
Resources
|
Robert Sedgewick, Algorithms in C, Parts 1-4 (Fundamental Algorithms, Data Structures, Sorting, Searching)
|
Course Category
|
Mathematics and Basic Sciences
|
%25
|
|
|
Engineering
|
%30
|
|
|
Engineering Design
|
%25
|
|
|
Social Sciences
|
%0
|
|
|
Education
|
%0
|
|
|
Science
|
%0
|
|
|
Health
|
%0
|
|
|
Field
|
%20
|
|
|
Planned Learning Activities and Teaching Methods
Activities are given in detail in the section of "Assessment Methods and Criteria" and "Workload Calculation"
Assessment Methods and Criteria
|
In-Term Studies
|
|
Participation
|
14
|
%
0
|
|
Quiz
|
1
|
%
10
|
|
Homework
|
5
|
%
40
|
|
Project
|
1
|
%
20
|
|
Presentation/Seminar
|
1
|
%
30
|
|
Contribution of final Examination and Final Project
|
1
|
%
30
|
|
Total
|
23
|
%
130
|
ECTS Allocated Based on Student Workload
|
Activities
|
Total Work Load
|
|
Attendance
|
14
|
3
|
42
|
|
Quiz
|
1
|
2
|
2
|
|
Homework
|
5
|
8
|
40
|
|
Course Teaching Hours(14 weeks)Total course hours
|
14
|
3
|
42
|
|
Further self-study
|
14
|
5
|
70
|
|
Contribution of final Examination and Final Project
|
1
|
3
|
3
|
|
Total Work Load
| |
|
Number of ECTS Credits 7
199
|
Course Learning Outcomes: Upon the successful completion of this course, students will be able to:
| No | Learning Outcomes |
|
1
| Learning and designing symmetric ciphers |
|
2
| Learning and designing asymmetric ciphers |
|
3
| Engineering crypto-suits |
|
4
| Detecting vulnerabilities of a crypto application |
Weekly Detailed Course Contents
| Week | Topics | Study Materials | Materials |
| 1 |
Random number generation
|
|
|
| 2 |
Crypto basics
|
|
|
| 3 |
Block ciphers
|
|
|
| 4 |
Stream ciphers
|
|
|
| 5 |
Hash functions
|
|
|
| 7 |
AES
|
|
|
| 8 |
RSA, DH
|
|
|
| 9 |
ElGamal
|
|
|
| 10 |
Elliptic curves
|
|
|
| 11 |
Elliptic curves II
|
|
|
| 12 |
Lattice based cryptosystems
|
|
|
| 13 |
Cryptographic protocols
|
|
|
| 14 |
Cryptographic protocols II
|
|
|
Contribution of Learning Outcomes to Programme Outcomes
bbb
https://obs.yasar.edu.tr/oibs/bologna/progCourseDetails.aspx?curCourse=4005000556661&lang=en