COMPUTER ENGINEERING (ENGLISH, INTEGRATED PHD) | |||||
PhD | TR-NQF-HE: Level 7 | QF-EHEA: Second Cycle | EQF-LLL: Level 7 |
Course Code | Course Name | Semester | Theoretical | Practical | Credit | ECTS |
CMP5121 | Network Security and Cryptography | Spring | 3 | 0 | 3 | 8 |
The course opens with the approval of the Department at the beginning of each semester |
Language of instruction: | En |
Type of course: | Must Course |
Course Level: | |
Mode of Delivery: | Face to face |
Course Coordinator : | Assist. Prof. SELÇUK BAKTIR |
Course Lecturer(s): |
Assist. Prof. SELÇUK BAKTIR Assist. Prof. YÜCEL BATU SALMAN |
Course Objectives: | This is an introductory course where fundamental concepts in cryptography and network security are explained. After completing the course, students will get basic understanding about encryption, decryption, stream ciphers, block ciphers, public-key cryptography, digital signatures, hash functions, message authentication codes and key distribution protocols. |
The students who have succeeded in this course; I. Gain knowledge on Symmetric key cryptography, block and stream ciphers, II. Gain knowledge on the AES algorithm, III. Gain knowledge on Public key cryptography and public key algorithms such as RSA, Diffie-Hellman, Elgamal and elliptic curve cryptography, IV. Gain knowledge on digital Signatures, V. Gain knowledge on hash functions, VI. Gain knowledge on key exchange protocols. |
Introduction and Review of Basics. Stream Ciphers. Advanced Encryption Standard (AES). Block Cipher Modes of Operation. Public-key Cryptography. The RSA Algorithm. Digital Signatures. Hash Functions. Message Authentication Codes. Discrete Logarithm Problem. Diffie-Hellman Key Exchange and ElGamal Encryption. Elliptic Curve Cryptography. Key Establishment Protocols. |
Week | Subject | Related Preparation | |
1) | Introduction and review of basics. | ||
2) | Stream Ciphers. | ||
3) | Advanced Encryption Standard (AES). | ||
4) | Block Cipher Modes of Operation. | ||
5) | Public key cryptography. | ||
6) | RSA algorithm. | ||
7) | Midterm exam. | ||
8) | Digital signatures. | ||
9) | Hash functions. | ||
10) | Message Authentication Codes. | ||
11) | Discrete Logarithm Problem. | ||
12) | Diffie-Hellman key exchange and ElGamal encryption. | ||
13) | Elliptic curve cryptography. | ||
14) | Key establishment protocols. |
Course Notes: | Understanding Cryptography, Christof Paar and Jan Pelzl, Springer 2010. |
References: |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 14 | % 0 |
Laboratory | 0 | % 0 |
Application | 0 | % 0 |
Field Work | 0 | % 0 |
Special Course Internship (Work Placement) | 0 | % 0 |
Quizzes | 0 | % 0 |
Homework Assignments | 4 | % 20 |
Presentation | 1 | % 10 |
Project | 0 | % 0 |
Seminar | 0 | % 0 |
Midterms | 1 | % 30 |
Preliminary Jury | % 0 | |
Final | 1 | % 40 |
Paper Submission | % 0 | |
Jury | % 0 | |
Bütünleme | % 0 | |
Total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 60 | |
PERCENTAGE OF FINAL WORK | % 40 | |
Total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 14 | 3 | 42 |
Laboratory | 0 | 0 | 0 |
Application | 0 | 0 | 0 |
Special Course Internship (Work Placement) | 0 | 0 | 0 |
Field Work | 0 | 0 | 0 |
Study Hours Out of Class | 14 | 5 | 70 |
Presentations / Seminar | 2 | 3 | 6 |
Project | 0 | 0 | 0 |
Homework Assignments | 4 | 8 | 32 |
Quizzes | 0 | 0 | 0 |
Preliminary Jury | 0 | ||
Midterms | 1 | 20 | 20 |
Paper Submission | 0 | ||
Jury | 0 | ||
Final | 1 | 20 | 20 |
Total Workload | 190 |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution |