The aim of this course is to teach the student about computer security such as encryption, operating system security, network security and security related to user and role distribution. After completing this course, students will be able to analyze and design secure systems based on a moderate level of complexity.
Prerequisite(s)
None
Corequisite(s)
None
Special Requisite(s)
Basic programming skills, basic probability&statistics and number theory knowledge and (in order to follow the course resources) basic English knowledge are necessary and sufficient.
- William Stallings , Cryptography and Network Security Principles and Practice,Seventh Edition
Other Sources
- Prof. Dr. Ersan AKYILDIZ- Doç. Dr. Ali DOĞANAKSOY ve diğerleri, Kriptolojiye Giriş Ders Notları, Şubat 2004
Course Schedules
Week
Contents
Learning Methods
1. Week
Introduction to Cryptology
Oral Presentation
2. Week
Classic Crypto Systems
Oral Presentation
3. Week
Basic Number Theory
Oral Presentation
4. Week
Finite Fields
Oral Presentation
5. Week
Basic Arithmetic Operations on Numbers and Polynomials
Oral Presentation
6. Week
Symmetric Passwords
Oral Presentation
7. Week
Block Ciphers and Data Encryption Standard
Oral Presentation
8. Week
Midterm Exam
9. Week
Other public-key cryptosystems
Oral Presentation,
10. Week
Advanced Encryption Standard
Oral Presentation
11. Week
Random Bit Generation and Streaming Ciphers
Oral Presentation,
12. Week
Public Key Cryptography and RSA
Oral Presentation,
13. Week
Other Public Key Encryption Systems
Oral Presentation
14. Week
Cryptographic Hash Functions
Oral Presentation,
15. Week
Finals Week
Exam
16. Week
Finals Week
Exam
17. Week
Finals Week
Exam
Assessments
Evaluation tools
Quantity
Weight(%)
Midterm(s)
1
40
Final Exam
1
60
Program Outcomes
PO-1
Interpreting advanced theoretical and applied knowledge in Mathematics and Computer Science.
PO-2
Critiquing and evaluating data by implementing the acquired knowledge and skills in Mathematics and Computer Science.
PO-3
Recognizing, describing, and analyzing problems in Mathematics and Computer Science; producing solution proposals based on research and evidence.
PO-4
Understanding the operating logic of computer and recognizing computational-based thinking using mathematics as a discipline.
PO-5
Collaborating as a team-member, as well as individually, to produce solutions to problems in Mathematics and Computer Science.
PO-6
Communicating in a foreign language, and interpreting oral and written communicational abilities in Turkish.
PO-7
Using time effectively in inventing solutions by implementing analytical thinking.
PO-8
Understanding professional ethics and responsibilities.
PO-9
Having the ability to behave independently, to take initiative, and to be creative.
PO-10
Understanding the importance of lifelong learning and developing professional skills continuously.
PO-11
Using professional knowledge for the benefit of the society.
Learning Outcomes
LO-1
Learns the basic principles of computer security and discusses the importance of ethical values in information theft. Defines threat models and common network security objectives
LO-2
Learns password and encryption protocols, hashing functions, one-way functions, known key crypto.
LO-3
Recall Galois algebra and number theory, emphasize the importance on encryption algortihms and understand how to implement his/her background
LO-4
Learns the basic concepts in network security. Analyzes defense types. Dramatize example scenarios in DNS and IPSec applications
LO-5
Understand the importance of the operating system security issues and seek unique answers to security problems.