School/Faculty/Institute Faculty of Engineering
Course Code COMP 453
Course Title in English Cryptography
Course Title in Turkish Kriptografi
Language of Instruction EN
Type of Course Flipped Classroom
Level of Course Intermediate
Semester Spring
Contact Hours per Week
Lecture: 150 Recitation: 3 Lab: Other:
Estimated Student Workload 150 hours per semester
Number of Credits 6 ECTS
Grading Mode Standard Letter Grade
Pre-requisites None
Co-requisites None
Expected Prior Knowledge -
Registration Restrictions -
Overall Educational Objective To learn the basics of cryptographic algorithms and correctly implement them in computing systems.
Course Description This course is an introductory course on the methods, algorithms, techniques, and tools of data security and cryptography.

Course Learning Outcomes and Competences

Upon successful completion of the course, the learner is expected to be able to:
1) Describe encryption and decryption using classical cryptosystems;
2) Identify and analyze the main elements of Shannon’s theory including entropy and perfect secrecy;
3) Discuss block ciphers and stream ciphers;
4) Implement hash functions, and apply them to the construction of MACs;
5) Identify cryptographic primitives to provide integrity, availability and confidentiality.
Program Learning Outcomes/Course Learning Outcomes 1 2 3 4 5
1) Thorough knowledge of the major concepts, theoretical perspectives, empirical findings, and historical trends in psychology.
2) Understanding of and ability to apply essential research methods in psychology, including research design, data analysis, and data interpretation.
3) Competence to use critical and creative thinking, skeptical inquiry and a scientific approach to solving problems related to behavior and mental processes.
4) Understanding and ability to apply psychological principles, skills and values in personal, social, and organizational contexts.
5) Ability to weigh evidence, to tolerate ambiguity, and to reflect other values that underpin psychology as a discipline.
6) Internalization and dissemination of professional ethical standards.
7) Demonstration of competence in information technologies, and the ability to use computer and other technologies for purposes related to the pursuit of knowledge in psychology and the broader social sciences.
8) Skills to communicate the knowledge of psychological science effectively, in a variety of formats, in both Turkish and in English (in English, at least CEFR B2 level).
9) Recognition, understanding, and respect for the complexity of sociocultural and international diversity.
10) Recognition for the need for, and the skills to pursue, lifelong learning, inquiry, and self-improvement.
11) Ability to formulate critical hypotheses based on psychological theory and literature, and design studies to test those hypotheses.
12) Ability to acquire knowledge independently, and to plan one’s own learning.
13) Demonstration of advanced competence in the clarity and composition of written work and presentations.

Relation to Program Outcomes and Competences

N None S Supportive H Highly Related
     
Program Outcomes and Competences Level Assessed by
1) Thorough knowledge of the major concepts, theoretical perspectives, empirical findings, and historical trends in psychology. N
2) Understanding of and ability to apply essential research methods in psychology, including research design, data analysis, and data interpretation. N
3) Competence to use critical and creative thinking, skeptical inquiry and a scientific approach to solving problems related to behavior and mental processes. H Exam,HW,Participation
4) Understanding and ability to apply psychological principles, skills and values in personal, social, and organizational contexts. N
5) Ability to weigh evidence, to tolerate ambiguity, and to reflect other values that underpin psychology as a discipline. N
6) Internalization and dissemination of professional ethical standards. N
7) Demonstration of competence in information technologies, and the ability to use computer and other technologies for purposes related to the pursuit of knowledge in psychology and the broader social sciences. N
8) Skills to communicate the knowledge of psychological science effectively, in a variety of formats, in both Turkish and in English (in English, at least CEFR B2 level). N
9) Recognition, understanding, and respect for the complexity of sociocultural and international diversity. S Participation
10) Recognition for the need for, and the skills to pursue, lifelong learning, inquiry, and self-improvement. S HW,Participation
11) Ability to formulate critical hypotheses based on psychological theory and literature, and design studies to test those hypotheses. N
12) Ability to acquire knowledge independently, and to plan one’s own learning. S Exam,HW
13) Demonstration of advanced competence in the clarity and composition of written work and presentations. H Exam,HW
Prepared by and Date FUNDA ÖZDEMİR ,
Course Coordinator FUNDA ÖZDEMİR
Semester Spring
Name of Instructor Asst. Prof. Dr. FUNDA ÖZDEMİR

Course Contents

Week Subject
1) Classical Cryptography: some simple cryptosystems
2) Cryptanalysis of simple cryptosystems
3) Stream ciphers, random number generators, one-time pad
4) Shannon’s theory, entropy, perfect secrecy
5) Block ciphers, the data encryption standard (DES)
6) The advanced encryption standard (AES)
7) Modes of operation
8) Hash functions, message authentication codes (MAC)
9) One-way functions, trapdoor one-way functions, public-key cryptography, RSA
10) Diffie-Hellman key exchange, ElGamal
11) Elliptic curve cryptosystems
12) Digital signatures: introduction, RSA and ElGamal digital signature schemes
13) The digital signature algorithm (DSA), the elliptic curve digital signature algorithm (ECDSA)
14) Some advanced protocols: Zero-Knowledge Proofs, Secure Multi-Party Computation
15) Final Exam/Project/Presentation Period
16) Final Exam/Project/Presentation Period
Required/Recommended ReadingsD. R. Stinson, Cryptography: Theory and Practice, 3rd Edition, Chapman & Hall/CRC, 2006. Nigel P. Smart. Cryptography Made Simple. Springer, 2016. C. Paar and J. Pelzl, Understanding Cryptography, Springer 2010. A. J. Menezes P. C. van Oorschot, and S. A Vanstone. Handbook of Applied Cryptography, CRC Press, 1997. Katz & Lindell, “Introduction to Modern Cryptography”, 3rd Edition, Chapman and Hall/CRC.
Teaching MethodsFlipped Classroom. Independent study for students.
Homework and ProjectsHomework, Projects
Laboratory WorkNone
Computer UseRequired
Other ActivitiesNone
Assessment Methods
Assessment Tools Count Weight
Quiz(zes) 1 % 10
Homework Assignments 1 % 10
Project 1 % 20
Midterm(s) 2 % 60
TOTAL % 100
Course Administration

Instructor’s office: 5th floor Phone number: Office hours: After the lecture hours. E-mail address: Rules for attendance: YÖK Regulations. Statement on plagiarism: YÖK Regulations. http://3fcampus.mef.edu.tr/uploads/cms/webadmin.mef.edu.tr/4833_2.pdf

ECTS Student Workload Estimation

Activity No/Weeks Hours Calculation
No/Weeks per Semester Preparing for the Activity Spent in the Activity Itself Completing the Activity Requirements
Course Hours 14 2 3 70
Presentations / Seminar 1 4 1 5
Project 1 10 1 11
Homework Assignments 2 4 3 14
Quiz(zes) 2 2 1 6
Midterm(s) 2 20 2 44
Total Workload 150
Total Workload/25 6.0
ECTS 6