DIGITAL GAME DESIGN | |||||
Bachelor | TR-NQF-HE: Level 6 | QF-EHEA: First Cycle | EQF-LLL: Level 6 |
Course Code | Course Name | Semester | Theoretical | Practical | Credit | ECTS |
CMP4321 | Introduction to Network Security and Cryptography | Spring | 3 | 0 | 3 | 6 |
This catalog is for information purposes. Course status is determined by the relevant department at the beginning of semester. |
Language of instruction: | English |
Type of course: | Non-Departmental Elective |
Course Level: | Bachelor’s Degree (First Cycle) |
Mode of Delivery: | Face to face |
Course Coordinator : | Assist. Prof. ECE GELAL SOYAK |
Course Lecturer(s): |
Assist. Prof. SELÇUK BAKTIR |
Recommended Optional Program Components: | None |
Course Objectives: | This is an introductory course where fundamental concepts in cryptography and network security are explained. After completing the course, students will get basic understanding about encryption, decryption, stream ciphers, block ciphers, public-key cryptography, digital signatures, hash functions, message authentication codes and key distribution protocols. |
The students who have succeeded in this course; I. Gain knowledge on Symmetric key cryptography, block and stream ciphers, II. Gain knowledge on the AES algorithm, III. Gain knowledge on Public key cryptography and public key algorithms such as RSA, Diffie-Hellman, Elgamal and elliptic curve cryptography, IV. Gain knowledge on digital Signatures, V. Gain knowledge on hash functions, VI. Gain knowledge on key exchange protocols. |
Introduction and Review of Basics. Stream Ciphers. Advanced Encryption Standard (AES). Block Cipher Modes of Operation. Public-key Cryptography. The RSA Algorithm. Digital Signatures. Hash Functions. Message Authentication Codes. Discrete Logarithm Problem. Diffie-Hellman Key Exchange and ElGamal Encryption. Elliptic Curve Cryptography. Key Establishment Protocols. The teaching methods of the course are as follows: - Narration - Individual Study - Reading - Problem Solving - Application |
Week | Subject | Related Preparation |
1) | Introduction and review of basics. | |
2) | Stream Ciphers. | |
3) | Advanced Encryption Standard (AES). | |
4) | Block Cipher Modes of Operation. | |
5) | Public-key Cryptography. | |
6) | RSA Algorithm. | |
7) | Midterm exam. | |
8) | Digital Signatures. | |
9) | Hash Functions. | |
10) | Message Authentication Codes. | |
11) | Discrete Logarithm Problem. | |
12) | Diffie-Hellman Key Exchange and ElGamal Encryption. | |
13) | Elliptic Curve Cryptography. | |
14) | Key Establishment Protocols. |
Course Notes / Textbooks: | Understanding Cryptography, Christof Paar and Jan Pelzl, Springer 2010. |
References: |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 14 | % 0 |
Homework Assignments | 6 | % 20 |
Presentation | 1 | % 10 |
Midterms | 1 | % 30 |
Final | 1 | % 40 |
Total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 60 | |
PERCENTAGE OF FINAL WORK | % 40 | |
Total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 14 | 3 | 42 |
Study Hours Out of Class | 14 | 5 | 70 |
Homework Assignments | 6 | 4 | 24 |
Midterms | 1 | 2 | 2 |
Final | 1 | 2 | 2 |
Total Workload | 140 |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution | |
1) | Comprehend the conceptual importance of the game in the field of communication, ability to implement the player centered application to provide design. | |
2) | Analyze, synthesize, and evaluate information and ideas from various perspectives. | |
3) | Analyze the key elements that make up specific game genres, forms of interactions, mode of narratives and understand how they are employed effectively to create a successful game. | |
4) | Understand game design theories and methods as well as implement them during game development; to make enjoyable, attractive, instructional and immersive according to the target audience. | |
5) | Understand the technology and computational principles involved in developing games and master the use of game engines. | |
6) | Understand the process of creation and use of 2D and 3D assets and animation for video games. | |
7) | Understand and master the theories and methodologies of understanding and measuring player experience and utilize them during game development process. | |
8) | Comprehend and master how ideas, concepts and topics are conveyed via games followed by the utilization of these aspects during the development process. | |
9) | Manage the game design and development process employing complete documentation; following the full game production pipeline via documentation. | |
10) | Understand and employ the structure and work modes of game development teams; comprehend the responsibilities of team members and collaborations between them while utilizing this knowledge in practice. | |
11) | Understand the process of game publishing within industry standards besides development and utilize this knowledge practice. | |
12) | Pitching a video game to developers, publishers, and players; mastering the art of effectively communicating and marketing the features and commercial potential of new ideas, concepts or games. |