Description of Individual Course Units
Course Unit CodeCourse Unit TitleType of Course UnitYear of StudySemesterNumber of ECTS Credits
9105056232007CryptologyElective118
Level of Course Unit
Third Cycle
Objectives of the Course
Establishing the necessary theoretical background for research in the subject area of cryptology.
Name of Lecturer(s)
Prof. Dr. Mehmet Emin DALKILIÇ
Learning Outcomes
1Having knowledge in cryptosystem protocols.
2To understand the mathematical and theoretical background of symmetrical and public key cryptography
3To use cryptography effectively for securing information in different layers of communication.
4Improving knowledge in the subject by following the academical publications of Cryptography.
5Ability to compare and select different cryptographic techniques for a security application.
6Ability to put forward new cryptanalysis methods for cryptosystems.
7To understand and implement the the key distribution and exchange algorithms.
8To understand and be able to implement cryptanalysis methods of classical and modern cryptosystems.
9Having knowledge in social and ethical perspectives of security and privacy issues.
Mode of Delivery
Face to Face
Prerequisites and co-requisities
None
Recommended Optional Programme Components
None
Course Contents
Classical Cryptosystems. Shannon theory. Modern block/stream cipher. Differential Cryptanalysis. Public key Cryptography: RSA, Discrete Logarithm Problem, Primality tests. Elliptic Curve Cryptography. Quantum Cryptography.
Weekly Detailed Course Contents
WeekTheoreticalPracticeLaboratory
1Introduction to course, discussing contents. Introduction
2Classical Cryptography. Shift, Hill, Substitution, Vigenere, Permutation ciphersLecturing with examples
3Cryptanalysis of classical cryptosystems.Lecturing with examples
4Shannon theory. Idea of Entropy.Lecturing with examples
5Block ciphers. DES, AES. Lecturing with examples
6Linear and differential cryptanalysis.Lecturing with examples
7Public key cryptography.Discrete logarithm problem. Lecturing with examples
8RSA. Primality tests.Lecturing with examples
9MIDTERMMIDTERM
10Elliptic Curve Cryptography.Lecturing with examples
11Quantum CryptographyLecturing with examples
12Term project presentations Project Presentations
13Term project presentations Project Presentations
14Term project presentations Project Presentations
15Discussing and solving homework problemsDiscussing and solving homework problems
16FINAL EXAMFINAL EXAM
Recommended or Required Reading
D. Stinson, Cryptography Theory and Practice, 3rd ed., 2006. Cryptool encryption and cryptanalysis software http://www.cryptool.org/
Planned Learning Activities and Teaching Methods
Assessment Methods and Criteria
Term (or Year) Learning ActivitiesQuantityWeight
SUM0
End Of Term (or Year) Learning ActivitiesQuantityWeight
SUM0
SUM0
Language of Instruction
Turkish
Work Placement(s)
None
Workload Calculation
ActivitiesNumberTime (hours)Total Work Load (hours)
Midterm Examination133
Final Examination133
Attending Lectures14342
Problem Solving717
Project Preparation13030
Project Presentation122
Writing Paper12020
Individual Study for Homework Problems7749
Individual Study for Mid term Examination13535
Individual Study for Final Examination14040
TOTAL WORKLOAD (hours)231
Contribution of Learning Outcomes to Programme Outcomes
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PO
13
PO
14
PO
15
PO
16
PO
17
PO
18
PO
19
PO
20
PO
21
PO
22
PO
23
PO
24
LO155           1 3     2  
LO245           1 3        
LO3       3 3   1   3      
LO44          5 1  53      
LO5    4 1      1   3  3   
LO6   545153    1  34    3 
LO7  3    3     1          
LO83 3    3     1          
LO9 3          22       2  
* Contribution Level : 1 Very low 2 Low 3 Medium 4 High 5 Very High
 
Ege University, Bornova - İzmir / TURKEY • Phone: +90 232 311 10 10 • e-mail: intrec@mail.ege.edu.tr