Welcome, Guest . Login . Türkçe
Where Am I: Ninova / Courses / Institute of Science and Technology / BLG 520E / Course Informations
 

Course Information

Course Name
Turkish Kriptografi
English Cryptography
Course Code
BLG 520E Credit Lecture
(hour/week)
Recitation
(hour/week)
Laboratory
(hour/week)
Semester -
3 3 - -
Course Language English
Course Coordinator Sıddıka Berna Örs Yalçın
Course Objectives 1) To teach classical cryptography.
2) To teach Shannon's Theory
3) To teach block ciphers and attacks
4) To teach hash functions
5) To teach public key cryptosystems
6) To teach digital signature algorithms
Course Description Classical cryptography: introduction: some simple cryptosystems, cryptanalysis of simple cryptosystems. Shannon's theory: probability theory, entropy, properties of entropy, product cryptosystems. Block ciphers: substiturion-permutation network, linear cryptanalysis, differential cryptanalysis, the data encryption standard (DES), advanced encryption standard (AES), modes of operation. Hash functions: collision-free hash functions, authentication codes. The RSA system and factoring: introduction to public-key cryptography, more number theory, the RSA cryptosystem. Public-key cryptosystems based on discrete logarithm problem: the ElGamal cryptosystem, finite field and elliptic curve systems, galois fields, elliptic curves. Signature schemes: introduction, the ElGamal signature scheme, the digital signature algorithm (DSA), the elliptic curve digital signature algorithm (ECDSA).
Course Outcomes M.Sc students who successfully pass this course will gain the knowledge, skill and competency in the following subjects;
1) They learn how the classical cryptosystems were progressed.
2) They learn probability theory, entropy, properties of entropy and can investigate about product cryptosystems
3) They learn substiturion-permutation networks and can apply linear and differential cryptanalysis on them.
4) They can implement the data encryption standard (DES) and advanced encryption standard (AES)
5) They can investigate and implement the hash functions.
6) They can implement the RSA cryptosystem.
7) They can investigate and implement the ElGamal and elliptic curve cryptosystems.
8) They learn the ElGamal signature scheme, the digital signature algorithm (DSA), the elliptic curve digital signature algorithm (ECDSA).
Pre-requisite(s)
Required Facilities
Other
Textbook Douglas R. Stinson, “Cryptography: Theory and Practice”, Chapman and Hall/CRC; 3 edition (November 1, 2005).
Other References 1) Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition by Bruce Schneier (Oct 18, 1996) Wiley; 2nd edition (October 18, 1996)
2) Christof Paar, Understanding Cryptography: A Textbook for Students and Practitioners”, Springer; 1st Edition.2nd Printing edition (July 8, 2010).
3) Niels Ferguson, Bruce Schneier, Tadayoshi Kohno, “Cryptography Engineering: Design Principles and Practical Applications” Wiley; 1 edition (March 15, 2010)
 
 
Courses . Help . About
Ninova is an ITU Office of Information Technologies Product. © 2024