School/Faculty/Institute | Faculty of Engineering | ||||
Course Code | COMP 453 | ||||
Course Title in English | Cryptography | ||||
Course Title in Turkish | Kriptografi | ||||
Language of Instruction | EN | ||||
Type of Course | Flipped Classroom | ||||
Level of Course | Intermediate | ||||
Semester | Spring | ||||
Contact Hours per Week |
|
||||
Estimated Student Workload | 150 hours per semester | ||||
Number of Credits | 6 ECTS | ||||
Grading Mode | Standard Letter Grade | ||||
Pre-requisites | None | ||||
Co-requisites | None | ||||
Expected Prior Knowledge | - | ||||
Registration Restrictions | - | ||||
Overall Educational Objective | To learn the basics of cryptographic algorithms and correctly implement them in computing systems. | ||||
Course Description | This course is an introductory course on the methods, algorithms, techniques, and tools of data security and cryptography. |
Course Learning Outcomes and CompetencesUpon successful completion of the course, the learner is expected to be able to:1) Describe encryption and decryption using classical cryptosystems; 2) Identify and analyze the main elements of Shannon’s theory including entropy and perfect secrecy; 3) Discuss block ciphers and stream ciphers; 4) Implement hash functions, and apply them to the construction of MACs; 5) Identify cryptographic primitives to provide integrity, availability and confidentiality. |
Program Learning Outcomes/Course Learning Outcomes | 1 | 2 | 3 | 4 | 5 |
---|---|---|---|---|---|
1) Thorough knowledge of the major concepts, theoretical perspectives, empirical findings, and historical trends in psychology. | |||||
2) Understanding of and ability to apply essential research methods in psychology, including research design, data analysis, and data interpretation. | |||||
3) Competence to use critical and creative thinking, skeptical inquiry and a scientific approach to solving problems related to behavior and mental processes. | |||||
4) Understanding and ability to apply psychological principles, skills and values in personal, social, and organizational contexts. | |||||
5) Ability to weigh evidence, to tolerate ambiguity, and to reflect other values that underpin psychology as a discipline. | |||||
6) Internalization and dissemination of professional ethical standards. | |||||
7) Demonstration of competence in information technologies, and the ability to use computer and other technologies for purposes related to the pursuit of knowledge in psychology and the broader social sciences. | |||||
8) Skills to communicate the knowledge of psychological science effectively, in a variety of formats, in both Turkish and in English (in English, at least CEFR B2 level). | |||||
9) Recognition, understanding, and respect for the complexity of sociocultural and international diversity. | |||||
10) Recognition for the need for, and the skills to pursue, lifelong learning, inquiry, and self-improvement. | |||||
11) Ability to formulate critical hypotheses based on psychological theory and literature, and design studies to test those hypotheses. | |||||
12) Ability to acquire knowledge independently, and to plan one’s own learning. | |||||
13) Demonstration of advanced competence in the clarity and composition of written work and presentations. |
N None | S Supportive | H Highly Related |
Program Outcomes and Competences | Level | Assessed by | |
1) | Thorough knowledge of the major concepts, theoretical perspectives, empirical findings, and historical trends in psychology. | N | |
2) | Understanding of and ability to apply essential research methods in psychology, including research design, data analysis, and data interpretation. | N | |
3) | Competence to use critical and creative thinking, skeptical inquiry and a scientific approach to solving problems related to behavior and mental processes. | H | Exam,HW,Participation |
4) | Understanding and ability to apply psychological principles, skills and values in personal, social, and organizational contexts. | N | |
5) | Ability to weigh evidence, to tolerate ambiguity, and to reflect other values that underpin psychology as a discipline. | N | |
6) | Internalization and dissemination of professional ethical standards. | N | |
7) | Demonstration of competence in information technologies, and the ability to use computer and other technologies for purposes related to the pursuit of knowledge in psychology and the broader social sciences. | N | |
8) | Skills to communicate the knowledge of psychological science effectively, in a variety of formats, in both Turkish and in English (in English, at least CEFR B2 level). | N | |
9) | Recognition, understanding, and respect for the complexity of sociocultural and international diversity. | S | Participation |
10) | Recognition for the need for, and the skills to pursue, lifelong learning, inquiry, and self-improvement. | S | HW,Participation |
11) | Ability to formulate critical hypotheses based on psychological theory and literature, and design studies to test those hypotheses. | N | |
12) | Ability to acquire knowledge independently, and to plan one’s own learning. | S | Exam,HW |
13) | Demonstration of advanced competence in the clarity and composition of written work and presentations. | H | Exam,HW |
Prepared by and Date | FUNDA ÖZDEMİR , |
Course Coordinator | FUNDA ÖZDEMİR |
Semester | Spring |
Name of Instructor | Asst. Prof. Dr. FUNDA ÖZDEMİR |
Week | Subject |
1) | Classical Cryptography: some simple cryptosystems |
2) | Cryptanalysis of simple cryptosystems |
3) | Stream ciphers, random number generators, one-time pad |
4) | Shannon’s theory, entropy, perfect secrecy |
5) | Block ciphers, the data encryption standard (DES) |
6) | The advanced encryption standard (AES) |
7) | Modes of operation |
8) | Hash functions, message authentication codes (MAC) |
9) | One-way functions, trapdoor one-way functions, public-key cryptography, RSA |
10) | Diffie-Hellman key exchange, ElGamal |
11) | Elliptic curve cryptosystems |
12) | Digital signatures: introduction, RSA and ElGamal digital signature schemes |
13) | The digital signature algorithm (DSA), the elliptic curve digital signature algorithm (ECDSA) |
14) | Some advanced protocols: Zero-Knowledge Proofs, Secure Multi-Party Computation |
15) | Final Exam/Project/Presentation Period |
16) | Final Exam/Project/Presentation Period |
Required/Recommended Readings | D. R. Stinson, Cryptography: Theory and Practice, 3rd Edition, Chapman & Hall/CRC, 2006. Nigel P. Smart. Cryptography Made Simple. Springer, 2016. C. Paar and J. Pelzl, Understanding Cryptography, Springer 2010. A. J. Menezes P. C. van Oorschot, and S. A Vanstone. Handbook of Applied Cryptography, CRC Press, 1997. Katz & Lindell, “Introduction to Modern Cryptography”, 3rd Edition, Chapman and Hall/CRC. | ||||||||||||||||||
Teaching Methods | Flipped Classroom. Independent study for students. | ||||||||||||||||||
Homework and Projects | Homework, Projects | ||||||||||||||||||
Laboratory Work | None | ||||||||||||||||||
Computer Use | Required | ||||||||||||||||||
Other Activities | None | ||||||||||||||||||
Assessment Methods |
|
||||||||||||||||||
Course Administration |
Instructor’s office: 5th floor Phone number: Office hours: After the lecture hours. E-mail address: Rules for attendance: YÖK Regulations. Statement on plagiarism: YÖK Regulations. http://3fcampus.mef.edu.tr/uploads/cms/webadmin.mef.edu.tr/4833_2.pdf |
Activity | No/Weeks | Hours | Calculation | ||||
No/Weeks per Semester | Preparing for the Activity | Spent in the Activity Itself | Completing the Activity Requirements | ||||
Course Hours | 14 | 2 | 3 | 70 | |||
Presentations / Seminar | 1 | 4 | 1 | 5 | |||
Project | 1 | 10 | 1 | 11 | |||
Homework Assignments | 2 | 4 | 3 | 14 | |||
Quiz(zes) | 2 | 2 | 1 | 6 | |||
Midterm(s) | 2 | 20 | 2 | 44 | |||
Total Workload | 150 | ||||||
Total Workload/25 | 6.0 | ||||||
ECTS | 6 |