CYBER SECURITY (ENGLISH, THESIS)
Master TR-NQF-HE: Level 7 QF-EHEA: Second Cycle EQF-LLL: Level 7

Course Introduction and Application Information

Course Code Course Name Semester Theoretical Practical Credit ECTS
CMP5121 Network Security and Cryptography Fall 3 0 3 7
The course opens with the approval of the Department at the beginning of each semester

Basic information

Language of instruction: En
Type of course: Departmental Elective
Course Level:
Mode of Delivery: Face to face
Course Coordinator : Dr. Öğr. Üyesi SELÇUK BAKTIR
Course Lecturer(s): Dr. Öğr. Üyesi SELÇUK BAKTIR
Dr. Öğr. Üyesi YÜCEL BATU SALMAN
Course Objectives: This is an introductory course where fundamental concepts in cryptography and network security are explained. After completing the course, students will get basic understanding about encryption, decryption, stream ciphers, block ciphers, public-key cryptography, digital signatures, hash functions, message authentication codes and key distribution protocols.

Learning Outputs

The students who have succeeded in this course;
I. Gain knowledge on Symmetric key cryptography, block and stream ciphers,
II. Gain knowledge on the AES algorithm,
III. Gain knowledge on Public key cryptography and public key algorithms such as RSA, Diffie-Hellman, Elgamal and elliptic curve cryptography,
IV. Gain knowledge on digital Signatures,
V. Gain knowledge on hash functions,
VI. Gain knowledge on key exchange protocols.

Course Content

Introduction and Review of Basics. Stream Ciphers. Advanced Encryption Standard (AES). Block Cipher Modes of Operation. Public-key Cryptography. The RSA Algorithm. Digital Signatures. Hash Functions. Message Authentication Codes. Discrete Logarithm Problem. Diffie-Hellman Key Exchange and ElGamal Encryption. Elliptic Curve Cryptography. Key Establishment Protocols.

Weekly Detailed Course Contents

Week Subject Related Preparation
1) Introduction and review of basics.
2) Stream Ciphers.
3) Advanced Encryption Standard (AES).
4) Block Cipher Modes of Operation.
5) Public key cryptography.
6) RSA algorithm.
7) Midterm exam.
8) Digital signatures.
9) Hash functions.
10) Message Authentication Codes.
11) Discrete Logarithm Problem.
12) Diffie-Hellman key exchange and ElGamal encryption.
13) Elliptic curve cryptography.
14) Key establishment protocols.

Sources

Course Notes: Understanding Cryptography, Christof Paar and Jan Pelzl, Springer 2010.
References:

Evaluation System

Semester Requirements Number of Activities Level of Contribution
Attendance 14 % 0
Laboratory 0 % 0
Application 0 % 0
Field Work 0 % 0
Special Course Internship (Work Placement) 0 % 0
Quizzes 0 % 0
Homework Assignments 4 % 20
Presentation 1 % 10
Project 0 % 0
Seminar 0 % 0
Midterms 1 % 30
Preliminary Jury % 0
Final 1 % 40
Paper Submission % 0
Jury % 0
Bütünleme % 0
Total % 100
PERCENTAGE OF SEMESTER WORK % 60
PERCENTAGE OF FINAL WORK % 40
Total % 100

ECTS / Workload Table

Activities Number of Activities Duration (Hours) Workload
Course Hours 14 3 42
Laboratory 0 0 0
Application 0 0 0
Special Course Internship (Work Placement) 0 0 0
Field Work 0 0 0
Study Hours Out of Class 14 5 70
Presentations / Seminar 2 3 6
Project 0 0 0
Homework Assignments 4 8 32
Quizzes 0 0 0
Preliminary Jury 0
Midterms 1 20 20
Paper Submission 0
Jury 0
Final 1 20 20
Total Workload 190

Contribution of Learning Outcomes to Programme Outcomes

No Effect 1 Lowest 2 Low 3 Average 4 High 5 Highest
           
Program Outcomes Level of Contribution
1) Being able to develop and deepen their knowledge at the level of expertise in the same or a different field, based on undergraduate level qualifications.
1) To be able to supervise and teach these values by observing social, scientific, cultural and ethical values in the stages of collecting, interpreting, applying and announcing the data related to the field.
1) Being able to independently carry out a work that requires expertise in the field.
1) To be able to critically evaluate the knowledge and skills acquired in the field of expertise and to direct their learning.
1) To be able to systematically transfer current developments in the field and their own studies to groups in and outside the field, in written, verbal and visual forms, by supporting them with quantitative and qualitative data.
2) To be able to interpret and create new knowledge by integrating the knowledge gained in the field with the knowledge from different disciplines,
2) To be able to develop strategy, policy and implementation plans in the fields related to the field and to evaluate the obtained results within the framework of quality processes.
2) To be able to critically examine social relations and the norms that guide these relations, to develop them and take action to change them when necessary.
2) To be able to use the theoretical and applied knowledge at the level of expertise acquired in the field.
2) To be able to develop new strategic approaches for the solution of complex and unpredictable problems encountered in applications related to the field and to produce solutions by taking responsibility.
2) To be able to comprehend the interdisciplinary interaction with which the field is related.
3) To be able to use the knowledge, problem solving and/or application skills they have internalized in their field in interdisciplinary studies.
3) Being able to lead in environments that require the resolution of problems related to the field.
3) To be able to solve the problems encountered in the field by using research methods.