INTERIOR ARCHITECTURE AND ENVIRONMENTAL DESIGN | |||||
Bachelor | TR-NQF-HE: Level 6 | QF-EHEA: First Cycle | EQF-LLL: Level 6 |
Course Code | Course Name | Semester | Theoretical | Practical | Credit | ECTS |
CMP4321 | Introduction to Network Security and Cryptography | Spring Fall |
3 | 0 | 3 | 6 |
This catalog is for information purposes. Course status is determined by the relevant department at the beginning of semester. |
Language of instruction: | English |
Type of course: | Non-Departmental Elective |
Course Level: | Bachelor’s Degree (First Cycle) |
Mode of Delivery: | Face to face |
Course Coordinator : | MEHMET ŞÜKRÜ KURAN |
Course Lecturer(s): |
Dr. Öğr. Üyesi SELÇUK BAKTIR |
Recommended Optional Program Components: | None |
Course Objectives: | This is an introductory course where fundamental concepts in cryptography and network security are explained. After completing the course, students will get basic understanding about encryption, decryption, stream ciphers, block ciphers, public-key cryptography, digital signatures, hash functions, message authentication codes and key distribution protocols. |
The students who have succeeded in this course; I. Gain knowledge on Symmetric key cryptography, block and stream ciphers, II. Gain knowledge on the AES algorithm, III. Gain knowledge on Public key cryptography and public key algorithms such as RSA, Diffie-Hellman, Elgamal and elliptic curve cryptography, IV. Gain knowledge on digital Signatures, V. Gain knowledge on hash functions, VI. Gain knowledge on key exchange protocols. |
Introduction and Review of Basics. Stream Ciphers. Advanced Encryption Standard (AES). Block Cipher Modes of Operation. Public-key Cryptography. The RSA Algorithm. Digital Signatures. Hash Functions. Message Authentication Codes. Discrete Logarithm Problem. Diffie-Hellman Key Exchange and ElGamal Encryption. Elliptic Curve Cryptography. Key Establishment Protocols. |
Week | Subject | Related Preparation |
1) | Introduction and review of basics. | |
2) | Stream Ciphers. | |
3) | Advanced Encryption Standard (AES). | |
4) | Block Cipher Modes of Operation. | |
5) | Public-key Cryptography. | |
6) | RSA Algorithm. | |
7) | Midterm exam. | |
8) | Digital Signatures. | |
9) | Hash Functions. | |
10) | Message Authentication Codes. | |
11) | Discrete Logarithm Problem. | |
12) | Diffie-Hellman Key Exchange and ElGamal Encryption. | |
13) | Elliptic Curve Cryptography. | |
14) | Key Establishment Protocols. |
Course Notes / Textbooks: | Understanding Cryptography, Christof Paar and Jan Pelzl, Springer 2010. |
References: |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 14 | % 0 |
Homework Assignments | 6 | % 20 |
Presentation | 1 | % 10 |
Midterms | 1 | % 30 |
Final | 1 | % 40 |
Total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 60 | |
PERCENTAGE OF FINAL WORK | % 40 | |
Total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 14 | 3 | 42 |
Study Hours Out of Class | 14 | 4 | 56 |
Homework Assignments | 6 | 4 | 24 |
Midterms | 1 | 2 | 2 |
Final | 1 | 2 | 2 |
Total Workload | 126 |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution | |
1) | Setting up various spaces in national and international contexts, carrying out designs, planning and applications that could satisfy various user groups and respond various requirements in the field of Interior Architecture, | |
2) | Analyzing the information gathered from the framework of actual physical, social and economical constraints and user requirements, and synthesizing these with diverse knowledge and considerations in order to create innovative spatial solutions, | |
3) | Generating creative, innovative, aesthetic and unique spatial solutions by using tangible and abstract concepts, | |
4) | Using at least one of the illustration and presentation technologies competently, that the field of interior architecture requires, | |
5) | Reporting, presenting and transferring the design, practice and research studies to the specialists or laymen by using visual, textual or oral communication methods, efficiently and accurately, | |
6) | Embracing and prioritizing man-environment relationships, user health, safety and security, and universal design principles in the field of interior architecture, | |
7) | Design understanding and decision making that respects social and cultural rights of the society, cultural heritage and nature, | |
8) | Being aware of national and international values, following developments and being equipped about ethical and aesthetical subjects in the fields of interior architecture, design and art, | |
9) | Having absolute conscious about legal regulations, standards and principles; and realizing professional ethics, duties and responsibilities in the field of Interior Architecture, |