BİLİŞİM GÜVENLİĞİ TEKNOLOJİSİ | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | 2022211003 | ||||||||
Ders İsmi: | Cryptography | ||||||||
Ders Yarıyılı: | Fall | ||||||||
Ders Kredileri: |
|
||||||||
Language of instruction: | TR | ||||||||
Ders Koşulu: | |||||||||
Ders İş Deneyimini Gerektiriyor mu?: | No | ||||||||
Type of course: | Necessary | ||||||||
Course Level: |
|
||||||||
Mode of Delivery: | Face to face | ||||||||
Course Coordinator : | Öğr.Gör. Esma TAYRAN | ||||||||
Course Lecturer(s): |
Öğr.Gör. Esma TAYRAN |
||||||||
Course Assistants: |
Course Objectives: | It is determined to teach the basic principles of cryptography, the basics of security applications such as encryption and digital signature to associate degree students and to gain new abilities in these subjects. |
Course Content: | Mathematical foundations, block cipher algorithms, random number generators and stream data ciphers, one-way hash algorithms, public key cryptosystem algorithms, identification and key exchange algorithms, secure communication techniques, public and private key crypto systems, digital signing, identification and identification methods and security protocols. |
The students who have succeeded in this course;
|
Week | Subject | Related Preparation |
1) | Basic Concepts in Cryptology | Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019 |
2) | Caesar Cipher, Alternative Encryption Methods | Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019 |
3) | Mathematics for Cryptology | Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019 |
4) | Introduction to Modern Cryptosystems, Symmetric and Asymmetric Encryption | Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019 |
5) | Vigenère Cipher, Hill Cipher | Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019 |
6) | Symmetric and Asymmetric Encryption, Diffie-Hellman Encryption | Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019 |
7) | Al-Gamal Encryption | Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019 |
8) | Midterm | Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019 |
9) | RSA Algorithms | Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019 |
10) | RSA signing | Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019 |
11) | Discrete logarithm | Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019 |
12) | Elliptic curve cryptosystems | Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019 |
13) | Steganography | Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019 |
14) | Steganography | Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019 |
Course Notes / Textbooks: | Dersin yürütücüsü tarafından notlar paylaşılacaktır. |
References: | Bruce Schneier ,"Applied Cryptography: Protocols, Algorithms, and Source Code in C 2E",Barnes & Noble,1999 Siber Güvenlik ve Savunma,Prof.Dr. Ş.SAĞIROĞLU,M.ŞENOL,BGD Siber Güvenlik ve Savunma Kitap Serisi-2,2019 V. S. Bagad, I. A. Dhotre, Cryptography and Network Security, Techinal Publication Pune, 2008 |
Ders Öğrenme Kazanımları | 1 |
2 |
4 |
3 |
5 |
6 |
---|---|---|---|---|---|---|
Program Outcomes | ||||||
1) Having knowledge and skills in security algorithms for programming | ||||||
2) Ability to install and manage software required for end user security | ||||||
3) Having the ability to install and manage computer networks and use the network operating system | ||||||
4) Have basic database and web programming skills |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution | |
1) | Having knowledge and skills in security algorithms for programming | 4 |
2) | Ability to install and manage software required for end user security | 3 |
3) | Having the ability to install and manage computer networks and use the network operating system | 3 |
4) | Have basic database and web programming skills | 3 |
Bireysel çalışma ve ödevi | |
Uygulama (Modelleme, Tasarım, Maket, Simülasyon, Deney vs.) |
Yazılı Sınav (Açık uçlu sorular, çoktan seçmeli, doğru yanlış, eşleştirme, boşluk doldurma, sıralama) | |
Homework |
Semester Requirements | Number of Activities | Level of Contribution |
Midterms | 1 | % 40 |
Semester Final Exam | 1 | % 60 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 14 | 2 | 28 |
Study Hours Out of Class | 14 | 6 | 84 |
Midterms | 1 | 20 | 20 |
Final | 1 | 20 | 20 |
Total Workload | 152 |