Türkçe | English
FACULTY of ENGINEERING / DEPARTMENT of COMPUTER ENGINEERING
(30%) English
Course Catalog
https://www.ktu.edu.tr/bilgisayar
Phone: +90 0462 377 2080
MF
FACULTY of ENGINEERING / DEPARTMENT of COMPUTER ENGINEERING / (30%) English
Katalog Ana Sayfa
  Katalog Ana Sayfa  KTÜ Ana Sayfa   Katalog Ana Sayfa
 
 

BIL4031@data security3+0+0ECTS:4
Year / SemesterFall Semester
Level of CourseFirst Cycle
Status Elective
DepartmentDEPARTMENT of COMPUTER ENGINEERING
Prerequisites and co-requisitesNone
Mode of Delivery
Contact Hours14 weeks - 3 hours of lectures per week
LecturerProf. Dr. Güzin ULUTAŞ
Co-Lecturer
Language of instructionTurkish
Professional practise ( internship ) None
 
The aim of the course:
The aim of the course is for students to learn about data security approaches and to gain the ability to produce solutions to possible security-requiring problems.
 
Learning OutcomesCTPOTOA
Upon successful completion of the course, the students will be able to :
LO - 1 : 1,51,6,
LO - 2 : 11,6,
LO - 3 : 3,41,6,
CTPO : Contribution to programme outcomes, TOA :Type of assessment (1: written exam, 2: Oral exam, 3: Homework assignment, 4: Laboratory exercise/exam, 5: Seminar / presentation, 6: Term paper), LO : Learning Outcome

 
Contents of the Course
The course content includes traditional encryption methods, mathematical content behind encryption methods, symmetric and asymmetric encryption algorithms, forensic science approaches, steganography and watermarking methods.
 
Course Syllabus
 WeekSubjectRelated Notes / Files
 Week 1Security Goals, Attacks, Services and Mechanisms
 Week 2Mathematics of Cryptography I
 Week 3Traditional Symmetric Key Ciphers
 Week 4Mathematics of Cryptography II
 Week 5Modern Symmetric Ciphers
 Week 6Data Encryption Standard
 Week 7Advanced Encryption Standard
 Week 8Various modes for modern symmetric key ciphers
 Week 9First MidTerm
 Week 10Mathematics of Cryptography III
 Week 11Asymmetric key cryptography
 Week 12Steganography and Data Hiding Techniques
 Week 13Watermarking Methods
 Week 14Visual Cryptography and Secret sharing schemes
 Week 15Forensic science approaches for data security
 Week 16invited speaker from data security subfield
 
Textbook / Material
1Crpytography and Network Security, Behrouz Forouzan, McGraw Hill
 
Recommended Reading
1Cryptography and Network Security: Principles and Practice, William Stallings
 
Method of Assessment
Type of assessmentWeek NoDate

Duration (hours)Weight (%)
Mid-term exam 9 150 25
Homework/Assignment/Term-paper 15 25
End-of-term exam 16 150 50
 
Student Work Load and its Distribution
Type of workDuration (hours pw)

No of weeks / Number of activity

Hours in total per term
Yüz yüze eğitim 3 14 42
Arasınav için hazırlık 1 8 8
Arasınav 2 1 2
Proje 1 14 14
Dönem sonu sınavı için hazırlık 1 15 15
Dönem sonu sınavı 2 1 2
Total work load83