Course Information
SemesterCourse Unit CodeCourse Unit TitleL+PCreditNumber of ECTS Credits
5MATH313INTRODUCTION TO CRYPTOLOGY 3+036

Course Details
Language of Instruction English
Level of Course Unit First Cycle
Department / Program MATHEMATICS
Mode of Delivery Face to Face
Type of Course Unit Elective
Objectives of the Course The course aims at introducing the fundamental concepts and mathematical aspects of cryptology and giving the role of cryptology in information security. Moreover, the most common techniques that cryptology makes use of and the mathematical infrastructures are introduced. After taking the course, one can have a general overview of cryptographic concepts and algorithms.
Course Content After introducing the fundamental concept and the mathematical infrastructure of cryptology, several cryptographic algorithms and protocols are expressed including historical ciphers, block ciphers and analysis, DES and AES, stream ciphers and analysis, keystream generators, public key cryptosystems, RSA and LLL algorithms, hash functions and message authentication codes (MACs), digital signature algorithms, DSA and ElGamal signature, Diffie Hellman key exchange, cryptographic protocols and key management.
Course Methods and Techniques
Prerequisites and co-requisities None
Course Coordinator None
Name of Lecturers Associate Prof.Dr. Orhun Kara
Associate Prof.Dr. Berkant Ustao─člu
Assistants None
Work Placement(s) No

Recommended or Required Reading
Resources Cryptography: Theory and Practise, 3rd edition, CRC press, Douglas R. Stinson
Handbook of applied cryptography, CRC Press 1996, A.J.Menezes, P.C. Von Oorschot, S. A. Vanstone

Course Category

Planned Learning Activities and Teaching Methods
Activities are given in detail in the section of "Assessment Methods and Criteria" and "Workload Calculation"

Assessment Methods and Criteria
In-Term Studies Quantity Percentage
Midterm exams 1 % 20
Quizzes 0 % 0
Homeworks 8 % 30
Other activities 0 % 0
Laboratory works 0 % 0
Projects 1 % 10
Final examination 1 % 40
Total
11
% 100

ECTS Allocated Based on Student Workload
Activities Quantity Duration Total Work Load
Weekly Course Time 42 1 42
Outside Activities About Course (Attendance, Presentation, Midterm exam,Final exam, Quiz etc.) 8 10 80
Application (Homework, Reading, Self Study etc.) 1 18 18
Exams and Exam Preparations 2 20 40
Total Work Load   Number of ECTS Credits 6 180

Course Learning Outcomes: Upon the successful completion of this course, students will be able to:
NoLearning Outcomes
1 possesses a general concept of how cryptology play a role in information security
2 follows the common techniques and the mathematical infrastructure that cryptology uses
3 understands the applications of cryptology in the real life
4 follows more sophisticated and dedicated crypto courses
5 comprehends basic cryptographic algorithms and protocols


Weekly Detailed Course Contents
WeekTopicsStudy MaterialsMaterials
1 General overview of cryptology. Symmetric encryption, hash functions, public key encryption Cryptography: Theory and Practise, 3rd edition, CRC press, Douglas R. Stinson
2 Fundamental concepts of cryptanalysis and historical ciphers Cryptography: Theory and Practise, 3rd edition, CRC press, Douglas R. Stinson
3 Introduction to symmetric encryption algorithms, block ciphers; stream ciphers Cryptography: Theory and Practise, 3rd edition, CRC press, Douglas R. Stinson
4 Analysis of block ciphers; DES; modes of operations Cryptography: Theory and Practise, 3rd edition, CRC press, Douglas R. Stinson
5 Contemporary block ciphers Cryptography: Theory and Practise, 3rd edition, CRC press, Douglas R. Stinson
6 Stream ciphers, initialization algorithms; keystream generators and their security analysis; contemporary stream ciphers Cryptography: Theory and Practise, 3rd edition, CRC press, Douglas R. Stinson
7 MAC algorithms and their analysis Cryptography: Theory and Practise, 3rd edition, CRC press, Douglas R. Stinson
8 Hash functions; HMAC and their security criteria Cryptography: Theory and Practise, 3rd edition, CRC press, Douglas R. Stinson
9 Public key encryption; authenticity vs confidentiality; Knapsack; LLL; RSA Cryptography: Theory and Practise, 3rd edition, CRC press, Douglas R. Stinson
10 Diffie Hellman key exchange; ElGamal encryption Cryptography: Theory and Practise, 3rd edition, CRC press, Douglas R. Stinson
11 Digital signature algorithms; general concepts, cryptographic security Cryptography: Theory and Practise, 3rd edition, CRC press, Douglas R. Stinson
12 Digital signature algorithms II: RSA signature, DSA; ElGamal signature algorithms Cryptography: Theory and Practise, 3rd edition, CRC press, Douglas R. Stinson
13 Fundamental concepts of cryptographic protocols, key management Cryptography: Theory and Practise, 3rd edition, CRC press, Douglas R. Stinson
14 cryptographic protocols in applications Cryptography: Theory and Practise, 3rd edition, CRC press, Douglas R. Stinson


Contribution of Learning Outcomes to Programme Outcomes
P1 P2 P3 P4 P5 P6 P7 P8 P9 P10 P11 P12 P13 P14
C1 1 3 2 4 2 4 2 3 3 2 2 2 1
C2 3 4 3 4 3 4 4 3 3 3 3 2 2
C3 2 4 3 4 2 4 3 3 3 2 2 2 2
C4 4 4 3 4 3 4 3 3 2 2 3 3 2
C5 3 4 3 4 2 4 3 3 2 1 3 2 3

Contribution: 0: Null 1:Slight 2:Moderate 3:Significant 4:Very Significant


https://obs.iyte.edu.tr/oibs/bologna/progCourseDetails.aspx?curCourse=163336&lang=en