Course Information
SemesterCourse Unit CodeCourse Unit TitleL+PCreditNumber of ECTS Credits
8MATH432ANALYSIS OF SYMMETRIC ENCRYPTIONS AND HASH FUNCTIONS 3+036

Course Details
Language of Instruction English
Level of Course Unit First Cycle
Department / Program MATHEMATICS
Mode of Delivery Face to Face
Type of Course Unit Elective
Objectives of the Course The course aims at a deep understanding of mathematical infrastructure and analysis of block and stream ciphers as well as hash functions.. The design principles and approaches of contemporary stream ciphers and block ciphers are discussed and analyzed. Formal security evaluation measures, standard analysis techniques are broached and presented. The students can learn the modern techniques of cryptanalysis of symmetric ciphers and hash functions.
Course Content The general scope of the course consists of design principals and security analysis of modern block ciphers, stream ciphers, hash functions and MACs. Feistel and SPN block ciphers, DES, AES, design philosophy of AES, differential cryptanalysis, linear cryptanalysis, integral attack, algebraic attack, nonlinearity, branch number, difference tables, lightweight block ciphers, key schedules, round functions are covered in block cipher sides. Moreover, keystream generators, correlation attacks, LFSR based stream ciphers, RC4, A5/1 and analyses are introduced. Hash functions and MAC algorithms, their security criteria, compression functions, Merkle-Damgard construction, SHA family, CMAC, OMAC algorithms are covered.
Course Methods and Techniques
Prerequisites and co-requisities None
Course Coordinator None
Name of Lecturers Associate Prof.Dr. Orhun Kara
Associate Prof.Dr. Berkant Ustao─člu
Assistants None
Work Placement(s) No

Recommended or Required Reading
Resources Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson
Handbook of applied cryptography, CRC Press 1996, A.J.Menezes, P.C. Von Oorschot, S. A. Vanstone

Course Category

Planned Learning Activities and Teaching Methods
Activities are given in detail in the section of "Assessment Methods and Criteria" and "Workload Calculation"

Assessment Methods and Criteria
In-Term Studies Quantity Percentage
Midterm exams 1 % 20
Quizzes 0 % 0
Homeworks 8 % 30
Other activities 0 % 0
Laboratory works 0 % 0
Projects 1 % 10
Final examination 1 % 40
Total
11
% 100

ECTS Allocated Based on Student Workload
Activities Quantity Duration Total Work Load
Weekly Course Time 42 1 42
Outside Activities About Course (Attendance, Presentation, Midterm exam,Final exam, Quiz etc.) 8 10 80
Application (Homework, Reading, Self Study etc.) 1 18 18
Exams and Exam Preparations 2 20 40
Total Work Load   Number of ECTS Credits 6 180

Course Learning Outcomes: Upon the successful completion of this course, students will be able to:
NoLearning Outcomes
1 possesses a general overview and concept of symmetric encryptions
2 possesses a general overview and concept of hash functions
3 assesses the security analysis of block ciphers and stream ciphers
4 understands the attacks on hash functions
5 understands the design criteria of symmetric ciphers and hash functions


Weekly Detailed Course Contents
WeekTopicsStudy MaterialsMaterials
1 General overview of cryptology: symmetric encryption, public key encryption, hash functions and message authentication codes. Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson
2 Introduction to block ciphers: round function; key schedule algorithm; confusion and diffusion; substitution permutation networks; Feistel networks; modes of operations Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson
3 Introduction to stream ciphers: keystream generators; period; security of keystream sequences Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson
4 Introduction to Message Authentication Codes and hash functions; security criteria; applications Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson
5 Design and analysis of block ciphers; DES and AES; their security and design criteria Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson
6 Linear cryptanalysis; nonlinearity; linear cryptanalysis of DES Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson
7 Differential cryptanalysis, difference distribution tables, differential characteristics; attacks on DES Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson
8 security criteria of AES; differential and linear cryptanalysis of AES; branch number and MDS matrices, boomerang and impossible differential attacks Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson
9 Integral attack and square attack; applications on AES Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson
10 LSFR based stream ciphers; periods of LFSR; statistical properties of LFSR; linear complexity and Berlekamp Massey algorithm Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson
11 Cryptanalysis of keystream generators; resynchronization attacks; tradeoff attacks; correlation attacks Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson
12 Construction of compression functions; security analysis of hash functions; Merkle Damgard construction, collision resistance Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson
13 Multicollision attacks and second preimage attacks on Merkle Damgard constructions; herding attacks Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson
14 Security analysis of SHA family and MD family; SHA3 algorithm Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson


Contribution of Learning Outcomes to Programme Outcomes
P1 P2 P3 P4 P5 P6 P7 P8 P9 P10 P11 P12 P13 P14
C1 1 2 2 4 2 4 3 3 3 2 2 2 1
C2 1 2 2 4 2 4 3 3 3 2 3 2 1
C3 2 3 2 4 3 4 3 3 3 2 3 4 2
C4 2 3 2 4 3 4 3 3 3 2 3 4 2
C5 2 3 2 4 3 4 2 3 3 2 2 2 1

Contribution: 0: Null 1:Slight 2:Moderate 3:Significant 4:Very Significant


https://obs.iyte.edu.tr/oibs/bologna/progCourseDetails.aspx?curCourse=163343&lang=en