CIVIL ENGINEERING | |||||
Bachelor | TR-NQF-HE: Level 6 | QF-EHEA: First Cycle | EQF-LLL: Level 6 |
Course Code | Course Name | Semester | Theoretical | Practical | Credit | ECTS |
CMP4322 | Advanced Cryptology and Networks | Spring Fall |
3 | 0 | 3 | 6 |
This catalog is for information purposes. Course status is determined by the relevant department at the beginning of semester. |
Language of instruction: | English |
Type of course: | Non-Departmental Elective |
Course Level: | Bachelor’s Degree (First Cycle) |
Mode of Delivery: | Face to face |
Course Coordinator : | Assist. Prof. ECE GELAL SOYAK |
Recommended Optional Program Components: | None |
Course Objectives: | This course aims at equipping students with a deeper understanding of cryptography. It starts by introducing the underlying theory of Galois fields, and targets basic topics of significant practical importance as well as advanced topics of theoretical importance. In the first part of the course, a detailed analysis of standard cryptographic algorithms is made and efficient implementation ideas are discussed, focusing on public key schemes such as RSA, ElGamal and Diffie-Hellman, as well as elliptic curve cryptography and homomorphic encryption. In the second part, application of these algorithms to advanced protocols, such as for authentication, identification, key distribution, zero-knowledge and computationally-private information retrieval, is discussed. In the last part of the course, advanced mathematical algorithms, such as brute-force, baby-step giant-step and the Pohlig-Hellman, for attacking some of the covered cryptographic schemes are discussed. |
The students who have succeeded in this course; I. Gain knowledge on Popular symmetric and public key cryptographic algorithms, II. Gain knowledge on Efficient implementation of cryptographic algorithms, III. Gain knowledge on different attacks against cryptographic algorithms. |
Overview of Cryptography and Network Security. Advanced Encryption Standard (AES), RSA and Elliptic Curve Cryptography. Hash Functions. Efficient Implementation Techniques for cryptographic algorithms. Diffie-Hellman Key Exchange and Meet-in-the Middle Attack. Pohlig-Hellman, Pollard’s Rho and side-channel attacks. Attacks against hash functions. The teaching methods of the course are as follows: - Lecture - Individual Study - Reading - Group Work - Problem Solving - Application - Discussion - Project Preparation |
Week | Subject | Related Preparation |
1) | Overview of Cryptography and Network Security. | |
2) | Advanced Encryption Standard (AES). | |
3) | RSA algorithm. | |
4) | Elliptic curve cryptography. | |
5) | Hash functions. | |
6) | Efficient implementation techniques. | |
7) | Efficient implementation techniques. | |
8) | Efficient implementation techniques. | |
9) | Midterm exam. | |
10) | Diffie-Hellman Key Exchange and Meet-in-the Middle Attack | |
11) | Pohlig Hellman Attack. | |
12) | Pollard’s Rho Attack. | |
13) | Side-Channel Attacks. | |
14) | Attacks Against Hash Functions. |
Course Notes / Textbooks: | Understanding Cryptography, Christof Paar and Jan Pelzl, Springer 2010. Handbook of Applied Cryptography, Alfred Menezes, Paul C. Van Oorschot and Scott A. Vanstone, CRC Press 1997. |
References: |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 14 | % 10 |
Project | 1 | % 10 |
Midterms | 1 | % 40 |
Final | 1 | % 40 |
Total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 50 | |
PERCENTAGE OF FINAL WORK | % 50 | |
Total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 14 | 3 | 42 |
Study Hours Out of Class | 15 | 5 | 75 |
Project | 1 | 21 | 21 |
Midterms | 1 | 2 | 2 |
Final | 1 | 2 | 2 |
Total Workload | 142 |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution | |
1) | Adequate knowledge in mathematics, science and civil engineering; the ability to use theoretical and practical knowledge in these areas in complex engineering problems. | |
2) | Ability to identify, formulate, and solve complex engineering problems; ability to select and apply proper analysis and modeling methods for this purpose. | |
3) | Ability to design a complex system, process, structural and/or structural members to meet specific requirements under realistic constraints and conditions; ability to apply modern design methods for this purpose. | |
4) | Ability to develop, select and use modern techniques and tools necessary for the analysis and solution of complex problems encountered in civil engineering applications; ability to use civil engineering technologies effectively. | |
5) | Ability to design, conduct experiments, collect data, analyze and interpret results for the study of complex engineering problems or civil engineering research topics. | |
6) | Ability to work effectively within and multi-disciplinary teams; individual study skills. | |
7) | Ability to communicate effectively in English and Turkish (if he/she is a Turkish citizen), both orally and in writing. | |
8) | Awareness of the necessity of lifelong learning; ability to access information to follow developments in civil engineering technology. | |
9) | To act in accordance with ethical principles, professional and ethical responsibility; having awareness of the importance of employee workplace health and safety. | |
10) | Information about business life practices such as project management, risk management, and change management; awareness of entrepreneurship, innovation, and sustainable development. | |
11) | Knowledge about contemporary issues and the global and societal effects of engineering practices on health, environment, and safety; awareness of the legal consequences of civil engineering solutions. |