COURSE INTRODUCTION AND APPLICATION INFORMATION


Course Name
Criptology and Computer Security
Code
Semester
Theory
(hour/week)
Application/Lab
(hour/week)
Local Credits
ECTS
IES 570
Fall/Spring
3
0
3
7.5
Prerequisites
None
Course Language
English
Course Type
Elective
Course Level
Second Cycle
Mode of Delivery -
Teaching Methods and Techniques of the Course
Course Coordinator -
Course Lecturer(s) -
Assistant(s) -
Course Objectives Together with cryptographic algorithms and systems, this course will deal with computer security and cryptography concepts under confidentiality, integrity, and availability. It will also consider necessary approaches and techniques to build protection mechanisms and security protocols in order to secure computer networks in a broader sense.
Learning Outcomes The students who succeeded in this course;
  • Understand theory of fundamental cryptography, encryption and decryption algorithms
  • Learn and apply programming of the encryption algorithms and cryptosystems
  • Build specific cryptosystems by applying encryption algorithms and security protocols
  • Analysis of the cryptographic algorithms and cryptosystems. Vulnerability analyses of security algorithms, mechanisms, and protocols
  • Grasp algorithms and techniques for identity management and message authentication
  • Develop and analyse digital password systems, secure authentication systems by use of message authentication algorithms and techniques
Course Description To acquaint students with advanced cryptography algorithms, systems, principals, functions, and development techniques of network security mechanisms. Make students to go into research and development within this field.
Related Sustainable Development Goals

 



Course Category

Core Courses
Major Area Courses
Supportive Courses
Media and Managment Skills Courses
Transferable Skill Courses

 

WEEKLY SUBJECTS AND RELATED PREPARATION STUDIES

Week Subjects Required Materials
1 Güvenlikte yaklaşımlar: OSI mimari model, saldırılar, sistemler, mekanizmalar ve modeller / Security Trends: OSI architecture, attacks, services, mechanisms, and models of security Cryptography and Network Security Stallings – Ch1, pp. 3153
2 Simetrik algoritmalar: Klasik şifreleme teknikleri /Symmetric ciphers: Classical encryption techniques Cryptography and Network Security Stallings – Ch2, pp 5584
3 Blok şifreleme ve DES / Block ciphers and Data Encryption Standard (DES) Cryptography and Network Security Stallings – Ch3pp. 90121
4 Sayı kuramı: Sonlu alanlar, modular aritmetik Euclid algoritması, polinom aritmetiği/ Number theory: Finite fields, Modular arithmetic, Euclidian algorithm, and polinomial arithmetic Cryptography and Network Security Stallings – Ch4pp. 125168
5 Advnaced Encryption Standard, (AES), Blok Şifreleme, işlemleri, Rassal sayı üretme ve stream ciphers/Advnaced Encryption Standard (AES), Block Cipher operations, Pseudo random number generation and Stream Ciphers Cryptography and Network Security Stallings – Ch5Ch7pp. 171263
6 Simetrik şifreleme ile bilgi gizliliğini sağlamak/ Confidentiality using symmetric encryption Cryptography and Network Security Stallings – Ch8pp. 267287
7 Review of the Semester  
8 Açık anahtarlı şifreleme, RSA ve Diğer Açık anahtar kripo sistemleri/Publickey cryptography, RSA and Other PublicKey Cryptosystems Cryptography and Network Security Stallings – ChCh10pp. 290348
9 Vize /MIDTERM EXAM
10 Kriptografik Veri Bütünlüğü Algoritmaları/Cryptographic Data Integrity Algorithms Cryptography and Network Security Stallings – Ch11pp. 351380
11 Mesaj doğrulama Kodları /Message authentication Codes Cryptography and Network Security Stallings – Ch11pp. 317334
12 Hash ve MAC algoritmaları/Hash and MAC algorithms Cryptography and Network Security Stallings – Ch12pp. 386,417
13 Sayısal imza /Digital signature Cryptography and Network Security Stallings – Ch13, pp.419431
14 Karşılıklı Güven ve Ağ ve Internet Güvenliği/Mutual Trust, Network and Internet Security Cryptography and Network Security Stallings – Ch14Ch19, 435673
15 Proje sunumları /Project Presentations
16 Review of the Semester  
Course Notes/Textbooks Cryptography and Network Security Principals and Practice Fifth Ed., William Stallings,© 2010 | Pearson Prentice Hall | ISBN: 0139780137056323
Suggested Readings/Materials Handbook of Applied Cryptography, Fifth Ed., Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone © 2001 CRC Press, ISBN: 0849385237 İlgili Araştırma Makaleleri/Related Research Papers

 

EVALUATION SYSTEM

Semester Activities Number Weigthing
Participation
1
6
Laboratory / Application
Field Work
Quizzes / Studio Critiques
Portfolio
Homework / Assignments
Presentation / Jury
Project
2
24
Seminar / Workshop
Oral Exam
Midterm
1
30
Final Exam
1
40
Total

Weighting of Semester Activities on the Final Grade
3
60
Weighting of End-of-Semester Activities on the Final Grade
1
40
Total

ECTS / WORKLOAD TABLE

Semester Activities Number Duration (Hours) Workload
Course Hours
(Including exam week: 16 x total hours)
16
3
48
Laboratory / Application Hours
(Including exam week: 16 x total hours)
16
Study Hours Out of Class
15
4
60
Field Work
Quizzes / Studio Critiques
Portfolio
Homework / Assignments
Presentation / Jury
5
Project
2
15
Seminar / Workshop
Oral Exam
Midterms
1
15
Final Exams
1
22
    Total
175

 

COURSE LEARNING OUTCOMES AND PROGRAM QUALIFICATIONS RELATIONSHIP

#
Program Competencies/Outcomes
* Contribution Level
1
2
3
4
5
1

To develop and deepen his/her knowledge on theories of mathematics and statistics and their applications in level of expertise, and to obtain unique definitions which bring innovations to the area, based on master level competencies,

2

To have the ability of original, independent and critical thinking in Mathematics and Statistics and to be able to develop theoretical concepts,

3

To have the ability of defining and verifying problems in Mathematics and Statistics,

4

With an interdisciplinary approach, to be able to apply theoretical and applied methods of mathematics and statistics in analyzing and solving new problems and to be able to discover his/her own potentials with respect to the application,

5

In nearly every fields that mathematics and statistics are used, to be able to execute, conclude and report a research, which requires expertise, independently,

6

To be able to evaluate and renew his/her abilities and knowledge acquired in the field of Applied Mathematics and Statistics with critical approach, and to be able to analyze, synthesize and evaluate complex thoughts in a critical way,

7

To be able to convey his/her analyses and methods in the field of Applied Mathematics and Statistics to the experts in a scientific way,

8

To be able to use national and international academic resources (English) efficiently, to update his/her knowledge, to communicate with his/her native and foreign colleagues easily, to follow the literature periodically, to contribute scientific meetings held in his/her own field and other fields systematically as written, oral and visual.

9

To be familiar with computer software commonly used in the fields of Applied Mathematics and Statistics and to be able to use at least two of them efficiently,

10

To contribute the transformation process of his/her own society into an information society and the sustainability of this process by introducing scientific, technological, social and cultural advances in the fields of Applied Mathematics and Statistics,

11

As having rich cultural background and social sensitivity with a global perspective, to be able to evaluate all processes efficiently, to be able to contribute the solutions of social, scientific, cultural and ethical problems and to support the development of these values,

12

As being competent in abstract thinking, to be able to connect abstract events to concrete events and to transfer solutions, to analyze results with scientific methods by designing experiment and collecting data and to interpret them,

13

To be able to produce strategies, policies and plans about systems and topics in which mathematics and statistics are used and to be able to interpret and develop results,

14

To be able to evaluate, argue and analyze prominent persons, events and phenomena, which play an important role in the development and combination of the fields of Mathematics and Statistics, within the perspective of the development of other fields of science,

15

In Applied Mathematics and Statistics, to be able to sustain scientific work as an individual or a group, to be effective in all phases of an independent work, to participate decision-making process and to make and execute necessary planning within an effective time schedule.

*1 Lowest, 2 Low, 3 Average, 4 High, 5 Highest