ACADEMICS
Course Details
ELE790 - Contemporary Cryptology
2024-2025 Fall term information
The course is not open this term
ELE790 - Contemporary Cryptology
Program | Theoretýcal hours | Practical hours | Local credit | ECTS credit |
PhD | 3 | 0 | 3 | 10 |
Obligation | : | Elective |
Prerequisite courses | : | - |
Concurrent courses | : | - |
Delivery modes | : | Face-to-Face |
Learning and teaching strategies | : | Lecture, Question and Answer, Problem Solving |
Course objective | : | It is aimed to give the following topics to the students; |
Learning outcomes | : | Identifying and classifying cryptology problems, Review: ancient and contemporary cryptograpy algorithms, Review: conventional and modern algorithms, Usage: block cipher, stream cipher, messager security, network security, digital signature and related problems; applications techniques. A student completing the course successfully will Identifies and classifies cryptology algorithms, Addresses cryptology algorithms and problems; and designs algorithms, Selects and picks algorithms to solve cryptographic problems and can compare their advantages and disadvantages, L.O..4. Implements techniques and algorithms in projects, thesis and real life applications, L.O..5. Knows algorithms and follows related publications. |
Course content | : | History; Cryptography and algorithms, Review: Conventional algorithms, Review: Symmetric and Asymmetric algorithms, Usage: Cryptology algorithms, Adapting algorithms mentioned above to practical problems, Practical usage: Private and Public Key Algorithms. |
References | : | Stallings W, Cryptography and Network Security, Pearson ? Addison Wesley, 2006. |
Weeks | Topics |
---|---|
1 | Cryptology, Definitions, Services, Mechanisms, Attacks |
2 | Symmetric Encryption, Terminology, Symmetric Methods and Models |
3 | Block and Stream Ciphering, DES, cryptanalysis attacks |
4 | Mathematical Concepts, Finite Fields |
5 | Modern Symmetric Encryption Methods, triple DES, Blowfish, RC5 |
6 | Symmetric Encryption and Confidentiality, Link Enryption, End-to-End Encryption, Traffic Analysis, Key Distribution, Random Numbers |
7 | Number Theory, Review, Definitions, Concepts, |
8 | Key Management, Other Public Key Algorithms |
9 | Message Authentication and Hash Functions |
10 | Midterm |
11 | Hash Algorithms, MD5, SHA-1, RIPEMD-160 |
12 | Digital Signature and Applications |
13 | Authentication Applications, Kerberos, X.509 |
14 | Electronic Mail Security |
15 | Final Exam |
16 | Final Exam |
Course activities | Number | Percentage |
---|---|---|
Attendance | 0 | 0 |
Laboratory | 0 | 0 |
Application | 0 | 0 |
Field activities | 0 | 0 |
Specific practical training | 0 | 0 |
Assignments | 13 | 20 |
Presentation | 0 | 0 |
Project | 0 | 0 |
Seminar | 0 | 0 |
Quiz | 0 | 0 |
Midterms | 1 | 40 |
Final exam | 1 | 40 |
Total | 100 | |
Percentage of semester activities contributing grade success | 60 | |
Percentage of final exam contributing grade success | 40 | |
Total | 100 |
Course activities | Number | Duration (hours) | Total workload |
---|---|---|---|
Course Duration | 14 | 3 | 42 |
Laboratory | 0 | 0 | 0 |
Application | 0 | 0 | 0 |
Specific practical training | 0 | 0 | 0 |
Field activities | 0 | 0 | 0 |
Study Hours Out of Class (Preliminary work, reinforcement, etc.) | 13 | 7 | 91 |
Presentation / Seminar Preparation | 0 | 0 | 0 |
Project | 0 | 0 | 0 |
Homework assignment | 14 | 5 | 70 |
Quiz | 0 | 0 | 0 |
Midterms (Study duration) | 1 | 25 | 25 |
Final Exam (Study duration) | 1 | 30 | 30 |
Total workload | 43 | 70 | 258 |
Key learning outcomes | Contribution level | |||||
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | ||
1. | Has highest level of knowledge in certain areas of Electrical and Electronics Engineering. | |||||
2. | Has knowledge, skills and and competence to develop novel approaches in science and technology. | |||||
3. | Follows the scientific literature, and the developments in his/her field, critically analyze, synthesize, interpret and apply them effectively in his/her research. | |||||
4. | Can independently carry out all stages of a novel research project. | |||||
5. | Designs, plans and manages novel research projects; can lead multidisiplinary projects. | |||||
6. | Contributes to the science and technology literature. | |||||
7. | Can present his/her ideas and works in written and oral forms effectively; in Turkish or English. | |||||
8. | Is aware of his/her social responsibilities, evaluates scientific and technological developments with impartiality and ethical responsibility and disseminates them. |
1: Lowest, 2: Low, 3: Average, 4: High, 5: Highest