Undergraduate
Faculty of Science and Letters
Mathematics And Computer Science
Anlık RSS Bilgilendirmesi İçin Tıklayınız.Düzenli bilgilendirme E-Postaları almak için listemize kaydolabilirsiniz.


Cryptography and Network Security

Course CodeSemester Course Name LE/RC/LA Course Type Language of Instruction ECTS
MB0055 Cryptography and Network Security 2/2/0 DE Turkish 5
Course Goals
The aim of this course is to teach the student about computer security such as encryption, operating system security, network security and security related to user and role distribution. After completing this course, students will be able to analyze and design secure systems based on a moderate level of complexity.
Prerequisite(s) None
Corequisite(s) None
Special Requisite(s) Basic programming skills, basic probability&statistics and number theory knowledge and (in order to follow the course resources) basic English knowledge are necessary and sufficient.
Instructor(s) Lecturer Hamiyet Büşra Bozoğlu
Course Assistant(s) None
Schedule Friday: 13:00-14:50, AKLAB B2FEFPC2 & CATS Friday: 15:00-16:50, AKLAB B2FEFPC2 & CATS
Office Hour(s) Tuesday: 10:00-11:00 İncirli Campus 4B-01
Teaching Methods and Techniques - Oral Presentation

-
Principle Sources  -  William Stallings , Cryptography and Network Security Principles and Practice,Seventh Edition

 
Other Sources -  Prof. Dr. Ersan AKYILDIZ- Doç. Dr. Ali DOĞANAKSOY ve diğerleri, Kriptolojiye Giriş Ders Notları,  Şubat 2004
Course Schedules
Week Contents Learning Methods
1. Week Introduction to Cryptology Oral Presentation
2. Week Classic Crypto Systems Oral Presentation
3. Week Basic Number Theory Oral Presentation
4. Week Finite Fields Oral Presentation
5. Week Basic Arithmetic Operations on Numbers and Polynomials Oral Presentation
6. Week Symmetric Passwords Oral Presentation
7. Week Block Ciphers and Data Encryption Standard Oral Presentation
8. Week Midterm Exam
9. Week Other public-key cryptosystems Oral Presentation,
10. Week Advanced Encryption Standard Oral Presentation
11. Week Random Bit Generation and Streaming Ciphers Oral Presentation,
12. Week Public Key Cryptography and RSA Oral Presentation,
13. Week Other Public Key Encryption Systems Oral Presentation
14. Week Cryptographic Hash Functions Oral Presentation,
15. Week Finals Week Exam
16. Week Finals Week Exam
17. Week Finals Week Exam
Assessments
Evaluation tools Quantity Weight(%)
Midterm(s) 1 40
Final Exam 1 60


Program Outcomes
PO-1Interpreting advanced theoretical and applied knowledge in Mathematics and Computer Science.
PO-2Critiquing and evaluating data by implementing the acquired knowledge and skills in Mathematics and Computer Science.
PO-3Recognizing, describing, and analyzing problems in Mathematics and Computer Science; producing solution proposals based on research and evidence.
PO-4Understanding the operating logic of computer and recognizing computational-based thinking using mathematics as a discipline.
PO-5Collaborating as a team-member, as well as individually, to produce solutions to problems in Mathematics and Computer Science.
PO-6Communicating in a foreign language, and interpreting oral and written communicational abilities in Turkish.
PO-7Using time effectively in inventing solutions by implementing analytical thinking.
PO-8Understanding professional ethics and responsibilities.
PO-9Having the ability to behave independently, to take initiative, and to be creative.
PO-10Understanding the importance of lifelong learning and developing professional skills continuously.
PO-11Using professional knowledge for the benefit of the society.
Learning Outcomes
LO-1Learns the basic principles of computer security and discusses the importance of ethical values ​​in information theft. Defines threat models and common network security objectives
LO-2Learns password and encryption protocols, hashing functions, one-way functions, known key crypto.
LO-3Recall Galois algebra and number theory, emphasize the importance on encryption algortihms and understand how to implement his/her background
LO-4Learns the basic concepts in network security. Analyzes defense types. Dramatize example scenarios in DNS and IPSec applications
LO-5Understand the importance of the operating system security issues and seek unique answers to security problems.
Course Assessment Matrix:
Program Outcomes - Learning Outcomes Matrix
 PO 1PO 2PO 3PO 4PO 5PO 6PO 7PO 8PO 9PO 10PO 11
LO 1
LO 2
LO 3
LO 4
LO 5