|
BILL7192 | Cryptography and Network Security | 3+0+0 | ECTS:7.5 | Year / Semester | Spring Semester | Level of Course | Third Cycle | Status | Elective | Department | DEPARTMENT of COMPUTER ENGINEERING | Prerequisites and co-requisites | None | Mode of Delivery | | Contact Hours | 14 weeks - 3 hours of lectures per week | Lecturer | Prof. Dr. Güzin ULUTAŞ | Co-Lecturer | None | Language of instruction | Turkish | Professional practise ( internship ) | None | | The aim of the course: | To give detailed information about cryptography and security |
Programme Outcomes | CTPO | TOA | Upon successful completion of the course, the students will be able to : | | | PO - 1 : | Has general information about the cryptographic techniques | 1,2,3,4,5,6,7,8,9,10 | 1 | PO - 2 : | Can suggest techniques to ensure the data security | 1,2,3,4,5,6,7,8,9,10 | 1 | PO - 3 : | can solve the network problems about the security and suggest techniques to deal with these problems | 1,2,3,4,5,6,7,8,9,10 | 1,6 | PO - 4 : | can propose techniques about the image security | 1,2,3,4,5,6,7,8,9,10 | 1,6 | CTPO : Contribution to programme outcomes, TOA :Type of assessment (1: written exam, 2: Oral exam, 3: Homework assignment, 4: Laboratory exercise/exam, 5: Seminar / presentation, 6: Term paper), PO : Learning Outcome | |
Conventional encryption techniques and algorithms: DES, Block chipher, Blowfish, RES, CAST-128. Confidentiality: Key distribution, Random number generation. Public key cryptography, Number theory, Message authentication and Hash function, Hash and Mac algorithms, Digital Signature and authentication protocols. Authentication and applications, Electronic mail security, IP security, Web security, Intruders, viruses, worms and firewalls |
|
Course Syllabus | Week | Subject | Related Notes / Files | Week 1 | Introduction to data security | | Week 2 | Conventional encryption, classical techniques, modern techniques | | Week 3 | Ensuring the data security using symmetrical key cryptography, DES, AES | | Week 4 | Public key cryptography and hash functions | | Week 5 | Introduction to Number theory | | Week 6 | Digital signatures and authentication protocols | | Week 7 | Used techniques for ensuring the image security, watermarking and image cryptography | | Week 8 | Threshold schemes and secret image sharing | | Week 9 | midterm exam | | Week 10 | Network security practice and system security | | Week 11 | Authentication applications | | Week 12 | Electronic Mail Security | | Week 13 | Internet Protocol Security | | Week 14 | Viruses and Worms, Firewall | | Week 15 | Digital Watermarking Techniques | | Week 16 | Final term | | |
1 | Cryptography and Network Security: Principles and Practice; Fourth or Fifth Edition. By William Stallings, Prentice Hall, Hardcover | | |
1 | Cryptography: Theory and Practice by Douglas R. Stinson, CRC press, hardcover, Pub- lished March, 1995 | | 2 | Network Security Essentials: Applications and Standards by William Stallings. Prentice Hall, Hardcover, Published November 1999 | | |
Method of Assessment | Type of assessment | Week No | Date | Duration (hours) | Weight (%) | Mid-term exam | 9 | | 2 | 30 | In-term studies (second mid-term exam) | 14 | | 2 | 20 | End-of-term exam | 14 | | 2 | 50 | |
Student Work Load and its Distribution | Type of work | Duration (hours pw) | No of weeks / Number of activity | Hours in total per term | Yüz yüze eğitim | 3 | 14 | 42 | Sınıf dışı çalışma | 1 | 14 | 14 | Arasınav için hazırlık | 1 | 9 | 9 | Arasınav | 2 | 1 | 2 | Ödev | 1 | 14 | 14 | Dönem sonu sınavı için hazırlık | 1 | 14 | 14 | Dönem sonu sınavı | 2 | 1 | 2 | Total work load | | | 97 |
|