Course Unit Code  Course Unit Title  Type of Course Unit  Year of Study  Semester  Number of ECTS Credits  9105056232007  Cryptology  Elective  1  1  8 

Level of Course Unit 
Third Cycle 
Language of Instruction 
Turkish 
Objectives of the Course 
Establishing the necessary theoretical background for research in the subject area of cryptology. 
Name of Lecturer(s) 
Prof. Dr. Mehmet Emin DALKILIÇ 
Learning Outcomes 
1  Having knowledge in cryptosystem protocols.  2  To understand the mathematical and theoretical background of symmetrical and public key cryptography  3  To use cryptography effectively for securing information in different layers of communication.  4  Improving knowledge in the subject by following the academical publications of Cryptography.  5  Ability to compare and select different cryptographic techniques for a security application.  6  Ability to put forward new cryptanalysis methods for cryptosystems.  7  To understand and implement the the key distribution and exchange algorithms.  8  To understand and be able to implement cryptanalysis methods of classical and modern cryptosystems.  9  Having knowledge in social and ethical perspectives of security and privacy issues. 

Mode of Delivery 
Face to Face 
Prerequisites and corequisities 
None 
Recommended Optional Programme Components 
None 
Course Contents 
Classical Cryptosystems. Shannon theory. Modern block/stream cipher. Differential Cryptanalysis. Public key Cryptography: RSA, Discrete Logarithm Problem, Primality tests. Elliptic Curve Cryptography. Quantum Cryptography. 
Weekly Detailed Course Contents 

1  Introduction to course, discussing contents.  Introduction   2  Classical Cryptography. Shift, Hill, Substitution, Vigenere, Permutation ciphers  Lecturing with examples   3  Cryptanalysis of classical cryptosystems.  Lecturing with examples   4  Shannon theory. Idea of Entropy.  Lecturing with examples   5  Block ciphers. DES, AES.  Lecturing with examples   6  Linear and differential cryptanalysis.  Lecturing with examples   7  Public key cryptography.Discrete logarithm problem.  Lecturing with examples   8  RSA. Primality tests.  Lecturing with examples   9  MIDTERM  MIDTERM   10  Elliptic Curve Cryptography.  Lecturing with examples   11  Quantum Cryptography  Lecturing with examples   12  Term project presentations  Project Presentations   13  Term project presentations  Project Presentations   14  Term project presentations  Project Presentations   15  Discussing and solving homework problems  Discussing and solving homework problems   16  FINAL EXAM  FINAL EXAM  

Recommended or Required Reading 
D. Stinson, Cryptography Theory and Practice, 3rd ed., 2006.
Cryptool encryption and cryptanalysis software http://www.cryptool.org/

Planned Learning Activities and Teaching Methods 
Activities are given in detail in the sections of "Assessment Methods and Criteria" and "Workload Calculation". 
Assessment Methods and Criteria  
Midterm Examination  1  100  SUM  100  
Final Sınavı  1  100  SUM  100  Term (or Year) Learning Activities  40  End Of Term (or Year) Learning Activities  60  SUM  100 
 Work Placement(s)  None 

Workload Calculation 