Instıtute Of Graduate Educatıon
Informatıon Technologıes Master's Program (Wıthout Thesıs)

Course Information

CRYPTOGRAPHY AND NETWORK SECURITY
Code Semester Theoretical Practice National Credit ECTS Credit
Hour / Week
IT568 Spring 3 0 3 5

Prerequisites and co-requisites None
Language of instruction Turkish
Type Elective
Level of Course Master's
Lecturer Asst. Prof. Dr. Maryam ESKANDARI
Mode of Delivery Face to Face
Suggested Subject None
Professional practise ( internship ) None
Objectives of the Course The objectives of this course includes helping students develop: - Understanding of the fundamentals of shared and public key cryptography. - Ability to select the appropriate cryptographic protocols for a given security application.
Contents of the Course Classical Ciphers, Substitution, Permutation, Playfair, Vigenere, Perfect secrecy and one-time pad, Data Encryption Standard, Public Key Cryptography, RSA, El-Gamal, Diffie-Hellman key exchange, Authentication and Digital Signature, Bit Commitment and Fair Coin Flips, Zero-knowledge Proofs, Protocol failures in cryptosystems, Quantum cryptography.

Learning Outcomes of Course

# Learning Outcomes
1 Logical, analytic and abstract thinking.
2 Ability to implement cryptographic protocols in different layers of a given system. (Identification and authentication, communication security, message confidentiality, confidentiality of the sender and of recipient, message integrity, authentication of sender etc.)
3 Ability to state security protocol failures.
4 Ability to implement key control, key distribution and key exchange algorithms.

Course Syllabus

# Subjects Teaching Methods and Technics
1 Simple ciphers (Substitution, Permutation, Vigenere) Internet research
2 Simple ciphers (Substitution, Permutation, Vigenere) Reading, Assignment
3 Perfect Secrecy and one-time pad Internet research
4 Data Encryption Standard Reading, Assignment
5 Advanced Encryption Standard Internet research
6 Public-Key Cryptography and Mathematical foundations Reading, Assignment
7 Midterm exam Exam
8 Diffie-Hellman key exchange Internet research, Assignment
9 Authentication and Digital Signature Protocols Reading
10 Bit Commitment and Fair Coin Flips, Zero-knowledge Proofs Internet research, Assignment
11 Protocol failures in cryptosystems Reading
12 Quantum Cryptography Internet research, Assignment
13 Project Presentations Term Project Presentations
14 Final Exam Exam
15
16

Course Syllabus

# Material / Resources Information About Resources Reference / Recommended Resources

Method of Assessment

# Weight Work Type Work Title
1 40% Mid-Term Exam Mid-Term Exam
2 60% Final Exam Final Exam

Relationship between Learning Outcomes of Course and Program Outcomes

# Learning Outcomes Program Outcomes Method of Assessment
1 Logical, analytic and abstract thinking. 1͵4͵6͵7͵11 1͵2
2 Ability to implement cryptographic protocols in different layers of a given system. (Identification and authentication, communication security, message confidentiality, confidentiality of the sender and of recipient, message integrity, authentication of sender etc.) 1͵4͵6͵7͵11 1͵2
3 Ability to state security protocol failures. 1͵4͵6͵7͵11 1͵2
4 Ability to implement key control, key distribution and key exchange algorithms. 1͵4͵6͵7͵11 1͵2
PS. The numbers, which are shown in the column Method of Assessment, presents the methods shown in the previous table, titled as Method of Assessment.

Work Load Details

# Type of Work Quantity Time (Hour) Work Load
1 Course Duration 14 3 42
2 Course Duration Except Class (Preliminary Study, Enhancement) 14 3 42
3 Presentation and Seminar Preparation 0 0 0
4 Web Research, Library and Archival Work 0 0 0
5 Document/Information Listing 0 0 0
6 Workshop 0 0 0
7 Preparation for Midterm Exam 0 0 0
8 Midterm Exam 0 0 0
9 Quiz 0 0 0
10 Homework 0 0 0
11 Midterm Project 0 0 0
12 Midterm Exercise 0 0 0
13 Final Project 0 0 0
14 Final Exercise 1 41 41
15 Preparation for Final Exam 0 0 0
16 Final Exam 0 0 0
  125