Home  »  Institute of Science »  Ph.D. on Computer Engineering

COURSE UNIT TITLECOURSE UNIT CODESEMESTERTHEORY + PRACTICE (Hour)ECTS
INFORMATION SECURITY BİL614 - 3 + 0 10

TYPE OF COURSE UNITElective Course
LEVEL OF COURSE UNITDoctorate Of Science
YEAR OF STUDY-
SEMESTER-
NUMBER OF ECTS CREDITS ALLOCATED10
NAME OF LECTURER(S)-
LEARNING OUTCOMES OF THE COURSE UNIT At the end of this course, the students;
1) Know the cryptographic algorithms and techniques, as well as underlying mathematics.
2) Estimate the possible attacks and the potential threats due to security design flaws.
3) Implement the cryptographic algorithms in software.
4) Ability to implement key control, key distribution, and key exchange algorithms.
5) Ability to state security protocol failures.
6) Ability to work in a cryptography project and present it.
MODE OF DELIVERYFace to face
PRE-REQUISITES OF THE COURSENo
RECOMMENDED OPTIONAL PROGRAMME COMPONENTNone
COURSE DEFINITIONIntroduction to Cryptography; Classical Cryptography; Symmetric and Asymmetric Encryption; DES; AES; RSA Problem; Diffie Hellman Key Exchange; Rabin; ElGamal; Pseudo-Random Bits; Cryptographic Hash Functions; Message Authentication Codes; Digital Signature; Principles of Authentication Protocols; Authentication in Real Worlds.
COURSE CONTENTS
WEEKTOPICS
1st Week Introduction to Cryptography;
2nd Week Classical Cryptography;
3rd Week Symmetric and Asymmetric Encryption;
4th Week DES; AES; RSA Problem;
5th Week Diffie Hellman Key Exchange;
6th Week Rabin;
7th Week ElGamal;
8th Week Mid-term
9th Week Pseudo-Random Bits;
10th Week Cryptographic Hash Functions;
11th Week Message Authentication Codes;
12th Week Digital Signature;
13th Week Principles of Authentication Protocols;
14th Week Authentication in Real Worlds.
RECOMENDED OR REQUIRED READING1. Stinson, Douglas, R. "Cyrptography: Theory and Practice", CRC Press, (1995)
2. Schneier, B. "Applied Crytography", Wiley, 1996
3. Stallings, W. "Cryptography and Network Security: Principles and Practice", Prentice Hall, (2010)
4. Menezes, A. , Vanstone, S. and Orschot, P. "Handbook of Applied Cryptography with Coding Theory", Pearson, (2006)
PLANNED LEARNING ACTIVITIES AND TEACHING METHODSLecture,Questions/Answers,Practice,Project,Report Preparation,Presentation
ASSESSMENT METHODS AND CRITERIA
 QuantityPercentage(%)
Mid-term130
Project130
Total(%)60
Contribution of In-term Studies to Overall Grade(%)60
Contribution of Final Examination to Overall Grade(%)40
Total(%)100
ECTS WORKLOAD
Activities Number Hours Workload
Midterm exam122
Preparation for Quiz
Individual or group work1411154
Preparation for Final exam16969
Course hours14342
Preparation for Midterm exam14444
Laboratory (including preparation)
Final exam122
Homework
Total Workload313
Total Workload / 3010,43
ECTS Credits of the Course10
LANGUAGE OF INSTRUCTIONTurkish
WORK PLACEMENT(S)No
  

KEY LEARNING OUTCOMES (KLO) / MATRIX OF LEARNING OUTCOMES (LO)
LO1LO2LO3LO4LO5LO6
K1  X   X   X     X   X
K2    X   X      
K3    X         X
K4    X       X  
K5  X   X   X       X
K6          X   X
K7          X   X
K8  X   X   X   X    
K9           
K10    X   X      
K11          X   X
K12    X     X   X   X