Description of Individual Course Units
 Course Unit Code Course Unit Title Type of Course Unit Year of Study Semester Number of ECTS Credits 9105056232007 Cryptology Elective 1 1 8
Level of Course Unit
Third Cycle
Language of Instruction
Turkish
Objectives of the Course
Establishing the necessary theoretical background for research in the subject area of cryptology.
Name of Lecturer(s)
Prof. Dr. Mehmet Emin DALKILIÇ
Learning Outcomes
 1 Having knowledge in cryptosystem protocols. 2 To understand the mathematical and theoretical background of symmetrical and public key cryptography 3 To use cryptography effectively for securing information in different layers of communication. 4 Improving knowledge in the subject by following the academical publications of Cryptography. 5 Ability to compare and select different cryptographic techniques for a security application. 6 Ability to put forward new cryptanalysis methods for cryptosystems. 7 To understand and implement the the key distribution and exchange algorithms. 8 To understand and be able to implement cryptanalysis methods of classical and modern cryptosystems. 9 Having knowledge in social and ethical perspectives of security and privacy issues.
Mode of Delivery
Face to Face
Prerequisites and co-requisities
None
Recommended Optional Programme Components
None
Course Contents
Classical Cryptosystems. Shannon theory. Modern block/stream cipher. Differential Cryptanalysis. Public key Cryptography: RSA, Discrete Logarithm Problem, Primality tests. Elliptic Curve Cryptography. Quantum Cryptography.
Weekly Detailed Course Contents
 Week Theoretical Practice Laboratory 1 Introduction to course, discussing contents. Introduction 2 Classical Cryptography. Shift, Hill, Substitution, Vigenere, Permutation ciphers Lecturing with examples 3 Cryptanalysis of classical cryptosystems. Lecturing with examples 4 Shannon theory. Idea of Entropy. Lecturing with examples 5 Block ciphers. DES, AES. Lecturing with examples 6 Linear and differential cryptanalysis. Lecturing with examples 7 Public key cryptography.Discrete logarithm problem. Lecturing with examples 8 RSA. Primality tests. Lecturing with examples 9 MIDTERM MIDTERM 10 Elliptic Curve Cryptography. Lecturing with examples 11 Quantum Cryptography Lecturing with examples 12 Term project presentations Project Presentations 13 Term project presentations Project Presentations 14 Term project presentations Project Presentations 15 Discussing and solving homework problems Discussing and solving homework problems 16 FINAL EXAM FINAL EXAM
D. Stinson, Cryptography Theory and Practice, 3rd ed., 2006. Cryptool encryption and cryptanalysis software http://www.cryptool.org/
Planned Learning Activities and Teaching Methods
Activities are given in detail in the sections of "Assessment Methods and Criteria" and "Workload Calculation".
Assessment Methods and Criteria
 Term (or Year) Learning Activities Quantity Weight Midterm Examination 1 100 SUM 100 End Of Term (or Year) Learning Activities Quantity Weight Final Sınavı 1 100 SUM 100 Term (or Year) Learning Activities 40 End Of Term (or Year) Learning Activities 60 SUM 100
Work Placement(s)
None