GASTRONOMY (TURKISH) | |||||
Bachelor | TR-NQF-HE: Level 6 | QF-EHEA: First Cycle | EQF-LLL: Level 6 |
Course Code | Course Name | Semester | Theoretical | Practical | Credit | ECTS |
CMP4322 | Advanced Cryptology and Networks | Spring | 3 | 0 | 3 | 6 |
This catalog is for information purposes. Course status is determined by the relevant department at the beginning of semester. |
Language of instruction: | English |
Type of course: | Non-Departmental Elective |
Course Level: | Bachelor’s Degree (First Cycle) |
Mode of Delivery: | Face to face |
Course Coordinator : | MEHMET ŞÜKRÜ KURAN |
Recommended Optional Program Components: | None |
Course Objectives: | This course aims at equipping students with a deeper understanding of cryptography. It starts by introducing the underlying theory of Galois fields, and targets basic topics of significant practical importance as well as advanced topics of theoretical importance. In the first part of the course, a detailed analysis of standard cryptographic algorithms is made and efficient implementation ideas are discussed, focusing on public key schemes such as RSA, ElGamal and Diffie-Hellman, as well as elliptic curve cryptography and homomorphic encryption. In the second part, application of these algorithms to advanced protocols, such as for authentication, identification, key distribution, zero-knowledge and computationally-private information retrieval, is discussed. In the last part of the course, advanced mathematical algorithms, such as brute-force, baby-step giant-step and the Pohlig-Hellman, for attacking some of the covered cryptographic schemes are discussed. |
The students who have succeeded in this course; I. Gain knowledge on Popular symmetric and public key cryptographic algorithms, II. Gain knowledge on Efficient implementation of cryptographic algorithms, III. Gain knowledge on different attacks against cryptographic algorithms. |
Overview of Cryptography and Network Security. Advanced Encryption Standard (AES), RSA and Elliptic Curve Cryptography. Hash Functions. Efficient Implementation Techniques for cryptographic algorithms. Diffie-Hellman Key Exchange and Meet-in-the Middle Attack. Pohlig-Hellman, Pollard’s Rho and side-channel attacks. Attacks against hash functions. |
Week | Subject | Related Preparation |
1) | Overview of Cryptography and Network Security. | |
2) | Advanced Encryption Standard (AES). | |
3) | RSA algorithm. | |
4) | Elliptic curve cryptography. | |
5) | Hash functions. | |
6) | Efficient implementation techniques. | |
7) | Efficient implementation techniques. | |
8) | Efficient implementation techniques. | |
9) | Midterm exam. | |
10) | Diffie-Hellman Key Exchange and Meet-in-the Middle Attack | |
11) | Pohlig Hellman Attack. | |
12) | Pollard’s Rho Attack. | |
13) | Side-Channel Attacks. | |
14) | Attacks Against Hash Functions. |
Course Notes / Textbooks: | Understanding Cryptography, Christof Paar and Jan Pelzl, Springer 2010. Handbook of Applied Cryptography, Alfred Menezes, Paul C. Van Oorschot and Scott A. Vanstone, CRC Press 1997. |
References: |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 14 | % 10 |
Project | 1 | % 10 |
Midterms | 1 | % 40 |
Final | 1 | % 40 |
Total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 50 | |
PERCENTAGE OF FINAL WORK | % 50 | |
Total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 14 | 3 | 42 |
Study Hours Out of Class | 15 | 4 | 60 |
Project | 1 | 21 | 21 |
Midterms | 1 | 2 | 2 |
Final | 1 | 2 | 2 |
Total Workload | 127 |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution | |
1) | - Possess advanced level theoretical and practical knowledge supported by textbooks with updated information, practice equipments and other resources. | |
2) | Use of advanced theoretical and practical knowledge within the field. -Interpret and evaluate data, define and analyze problems, develop solutions based on research and proofs by using acquired advanced knowledge and skills within the field. | |
3) | Inform people and institutions, transfer ideas and solution proposals to problems in written and orally on issues in the field. - Share the ideas and solution proposals to problems on issues in the field with professionals and non-professionals by the support of qualitative and quantitative data. -Organize and implement project and activities for social environment with a sense of social responsibility. -Monitor the developments in the field and communicate with peers by using a foreign language at least at a level of European Language Portfolio B1 General Level. -Use informatics and communication technologies with at least a minimum level of European Computer Driving License Advanced Level software knowledge. | |
4) | Evaluate the knowledge and skills acquired at an advanced level in the field with a critical approach. -Determine learning needs and direct the learning. -Develop positive attitude towards lifelong learning. | |
5) | Act in accordance with social, scientific, cultural and ethic values on the stages of gathering, implementation and release of the results of data related to the field. - Possess sufficient consciousness about the issues of universality of social rights, social justice, quality, cultural values and also, environmental protection, worker's health and security. | |
6) | Conduct studies at an advanced level in the field independently. - Take responsibility both as a team member and individually in order to solve unexpected complex problems faced within the implementations in the field. - Planning and managing activities towards the development of subordinates in the framework of a project |