CMP4322 Advanced Cryptology and NetworksBahçeşehir UniversityDegree Programs SOFTWARE ENGINEERINGGeneral Information For StudentsDiploma SupplementErasmus Policy StatementNational QualificationsBologna Commission
SOFTWARE ENGINEERING
Bachelor TR-NQF-HE: Level 6 QF-EHEA: First Cycle EQF-LLL: Level 6

Course Introduction and Application Information

Course Code Course Name Semester Theoretical Practical Credit ECTS
CMP4322 Advanced Cryptology and Networks Fall 3 0 3 6
This catalog is for information purposes. Course status is determined by the relevant department at the beginning of semester.

Basic information

Language of instruction: English
Type of course: Non-Departmental Elective
Course Level: Bachelor’s Degree (First Cycle)
Mode of Delivery: Face to face
Course Coordinator : MEHMET ŞÜKRÜ KURAN
Recommended Optional Program Components: None
Course Objectives: This course aims at equipping students with a deeper understanding of cryptography. It starts by introducing the underlying theory of Galois fields, and targets basic topics of significant practical importance as well as advanced topics of theoretical importance. In the first part of the course, a detailed analysis of standard cryptographic algorithms is made and efficient implementation ideas are discussed, focusing on public key schemes such as RSA, ElGamal and Diffie-Hellman, as well as elliptic curve cryptography and homomorphic encryption. In the second part, application of these algorithms to advanced protocols, such as for authentication, identification, key distribution, zero-knowledge and computationally-private information retrieval, is discussed. In the last part of the course, advanced mathematical algorithms, such as brute-force, baby-step giant-step and the Pohlig-Hellman, for attacking some of the covered cryptographic schemes are discussed.

Learning Outcomes

The students who have succeeded in this course;
I. Gain knowledge on Popular symmetric and public key cryptographic algorithms,
II. Gain knowledge on Efficient implementation of cryptographic algorithms,
III. Gain knowledge on different attacks against cryptographic algorithms.

Course Content

Overview of Cryptography and Network Security. Advanced Encryption Standard (AES), RSA and Elliptic Curve Cryptography. Hash Functions. Efficient Implementation Techniques for cryptographic algorithms. Diffie-Hellman Key Exchange and Meet-in-the Middle Attack. Pohlig-Hellman, Pollard’s Rho and side-channel attacks. Attacks against hash functions.

Weekly Detailed Course Contents

Week Subject Related Preparation
1) Overview of Cryptography and Network Security.
2) Advanced Encryption Standard (AES).
3) RSA algorithm.
4) Elliptic curve cryptography.
5) Hash functions.
6) Efficient implementation techniques.
7) Efficient implementation techniques.
8) Efficient implementation techniques.
9) Midterm exam.
10) Diffie-Hellman Key Exchange and Meet-in-the Middle Attack
11) Pohlig Hellman Attack.
12) Pollard’s Rho Attack.
13) Side-Channel Attacks.
14) Attacks Against Hash Functions.

Sources

Course Notes / Textbooks: Understanding Cryptography, Christof Paar and Jan Pelzl, Springer 2010.

Handbook of Applied Cryptography, Alfred Menezes, Paul C. Van Oorschot and Scott A. Vanstone, CRC Press 1997.
References:

Evaluation System

Semester Requirements Number of Activities Level of Contribution
Attendance 14 % 10
Project 1 % 10
Midterms 1 % 40
Final 1 % 40
Total % 100
PERCENTAGE OF SEMESTER WORK % 50
PERCENTAGE OF FINAL WORK % 50
Total % 100

ECTS / Workload Table

Activities Number of Activities Duration (Hours) Workload
Course Hours 14 3 42
Study Hours Out of Class 15 4 60
Project 1 21 21
Midterms 1 2 2
Final 1 2 2
Total Workload 127

Contribution of Learning Outcomes to Programme Outcomes

No Effect 1 Lowest 2 Low 3 Average 4 High 5 Highest
           
Program Outcomes Level of Contribution
1) Be able to specify functional and non-functional attributes of software projects, processes and products.
2) Be able to design software architecture, components, interfaces and subcomponents of a system for complex engineering problems.
3) Be able to develop a complex software system with in terms of code development, verification, testing and debugging.
4) Be able to verify software by testing its program behavior through expected results for a complex engineering problem.
5) Be able to maintain a complex software system due to working environment changes, new user demands and software errors that occur during operation.
6) Be able to monitor and control changes in the complex software system, to integrate the software with other systems, and to plan and manage new releases systematically.
7) Be able to identify, evaluate, measure, manage and apply complex software system life cycle processes in software development by working within and interdisciplinary teams.
8) Be able to use various tools and methods to collect software requirements, design, develop, test and maintain software under realistic constraints and conditions in complex engineering problems.
9) Be able to define basic quality metrics, apply software life cycle processes, measure software quality, identify quality model characteristics, apply standards and be able to use them to analyze, design, develop, verify and test complex software system.
10) Be able to gain technical information about other disciplines such as sustainable development that have common boundaries with software engineering such as mathematics, science, computer engineering, industrial engineering, systems engineering, economics, management and be able to create innovative ideas in entrepreneurship activities.
11) Be able to grasp software engineering culture and concept of ethics and have the basic information of applying them in the software engineering and learn and successfully apply necessary technical skills through professional life.
12) Be able to write active reports using foreign languages and Turkish, understand written reports, prepare design and production reports, make effective presentations, give clear and understandable instructions.
13) Be able to have knowledge about the effects of engineering applications on health, environment and security in universal and societal dimensions and the problems of engineering in the era and the legal consequences of engineering solutions.