BİLİŞİM GÜVENLİĞİ TEKNOLOJİSİ
Associate TR-NQF-HE: Level 5 QF-EHEA: Short Cycle EQF-LLL: Level 5

Ders Genel Tanıtım Bilgileri

Course Code: 2022211003
Ders İsmi: Cryptography
Ders Yarıyılı: Fall
Ders Kredileri:
Theoretical Practical Credit ECTS
3 0 3 5
Language of instruction: TR
Ders Koşulu:
Ders İş Deneyimini Gerektiriyor mu?: No
Type of course: Necessary
Course Level:
Associate TR-NQF-HE:5. Master`s Degree QF-EHEA:Short Cycle EQF-LLL:5. Master`s Degree
Mode of Delivery: Face to face
Course Coordinator : Öğr.Gör. Esma TAYRAN
Course Lecturer(s): Öğr.Gör. Esma TAYRAN
Course Assistants:

Dersin Amaç ve İçeriği

Course Objectives: It is determined to teach the basic principles of cryptography, the basics of security applications such as encryption and digital signature to associate degree students and to gain new abilities in these subjects.
Course Content: Mathematical foundations, block cipher algorithms, random number generators and stream data ciphers, one-way hash algorithms, public key cryptosystem algorithms, identification and key exchange algorithms, secure communication techniques, public and private key crypto systems, digital signing, identification and identification methods and security protocols.

Learning Outcomes

The students who have succeeded in this course;
Learning Outcomes
1 - Knowledge
Theoretical - Conceptual
1) Defines basic cryptography concepts.
2) Explain the basic mathematical concepts of cryptography.
3) List the basic principles of public-key cryptographic systems.
2 - Skills
Cognitive - Practical
1) Gain theoretical and practical knowledge and experience about encryption algorithms.
2) It provides theoretical and practical knowledge and experience on digital signature algorithms.
3 - Competences
Communication and Social Competence
Learning Competence
Field Specific Competence
1) It gives the ability to understand and design identity recognition and identification algorithms.
Competence to Work Independently and Take Responsibility

Ders Akış Planı

Week Subject Related Preparation
1) Basic Concepts in Cryptology Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019
2) Caesar Cipher, Alternative Encryption Methods Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019
3) Mathematics for Cryptology Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019
4) Introduction to Modern Cryptosystems, Symmetric and Asymmetric Encryption Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019
5) Vigenère Cipher, Hill Cipher Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019
6) Symmetric and Asymmetric Encryption, Diffie-Hellman Encryption Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019
7) Al-Gamal Encryption Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019
8) Midterm Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019
9) RSA Algorithms Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019
10) RSA signing Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019
11) Discrete logarithm Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019
12) Elliptic curve cryptosystems Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019
13) Steganography Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019
14) Steganography Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019

Sources

Course Notes / Textbooks: Dersin yürütücüsü tarafından notlar paylaşılacaktır.
References: Bruce Schneier ,"Applied Cryptography: Protocols, Algorithms, and Source Code in C 2E",Barnes & Noble,1999
Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019
V. S. Bagad, I. A. Dhotre, Cryptography and Network Security, Techinal Publication Pune, 2008

Ders - Program Öğrenme Kazanım İlişkisi

Ders Öğrenme Kazanımları

1

2

4

3

5

6

Program Outcomes
1) Having knowledge and skills in security algorithms for programming
2) Ability to install and manage software required for end user security
3) Having the ability to install and manage computer networks and use the network operating system
4) Have basic database and web programming skills

Ders - Öğrenme Kazanımı İlişkisi

No Effect 1 Lowest 2 Low 3 Average 4 High 5 Highest
           
Program Outcomes Level of Contribution
1) Having knowledge and skills in security algorithms for programming 4
2) Ability to install and manage software required for end user security 3
3) Having the ability to install and manage computer networks and use the network operating system 3
4) Have basic database and web programming skills 3

Öğrenme Etkinliği ve Öğretme Yöntemleri

Bireysel çalışma ve ödevi
Uygulama (Modelleme, Tasarım, Maket, Simülasyon, Deney vs.)

Ölçme ve Değerlendirme Yöntemleri ve Kriterleri

Yazılı Sınav (Açık uçlu sorular, çoktan seçmeli, doğru yanlış, eşleştirme, boşluk doldurma, sıralama)
Homework

Assessment & Grading

Semester Requirements Number of Activities Level of Contribution
Midterms 1 % 40
Semester Final Exam 1 % 60
total % 100
PERCENTAGE OF SEMESTER WORK % 40
PERCENTAGE OF FINAL WORK % 60
total % 100

İş Yükü ve AKTS Kredisi Hesaplaması

Activities Number of Activities Duration (Hours) Workload
Course Hours 14 2 28
Study Hours Out of Class 14 6 84
Midterms 1 20 20
Final 1 20 20
Total Workload 152