Course Details

INTRODUCTION TO CRYPTOGRAPHY

COMP417

Course Information
SemesterCourse Unit CodeCourse Unit TitleT+P+LCreditNumber of ECTS Credits
7COMP417INTRODUCTION TO CRYPTOGRAPHY3+0+055

Course Details
Language of Instruction English
Level of Course Unit Bachelor's Degree
Department / Program COMPUTER ENGINEERING
Type of Program Formal Education
Type of Course Unit Elective
Course Delivery Method Face To Face
Objectives of the Course O1. Providing conceptual understanding of cryptographic protocols
O2. Developing basic knowledge on construction of symmetric and asymmetric encryption systems
O3. Exploring the basics of public-key encryption systems
O4. Providing essential information on PKI and TLS
O5. Developing understanding on constructions of cryptography applications from cryptographic structures
Course Content This course will provide introduction to cryptography and its applications to computer security. This course will cover the fundamentals of symmetric cryptography (i.e., encryption and message authentication) and public-key cryptography (i.e., key-exchange and signatures) as well as cryptographic protocols like secret sharing and multiparty computation.
Course Methods and Techniques
Prerequisites and co-requisities None
Course Coordinator Asist Prof.Dr. ABDULKADİR KÖSE abdulkadir.kose@agu.edu.tr
Name of Lecturers Instructor Dr. Cavidan Yakupoğlu Karaağaç cavidan.yakupoglu@agu.edu.tr
Assistants None
Work Placement(s) No

Recommended or Required Reading
Resources Course Textbook: A Graduate Course in Applied Cryptography Dan Boneh and Victor Shoup https://toc.cryptobook.us/book.pdf Additional Materials: A Pragmatic Introduction to Secure Multi-Party Computation by David Evans, Vladimir Kolesnikov, Mike Rosulek https://www.cs.virginia.edu/~evans/pragmaticmpc/pragmaticmpc.pdf An Introduction to Cryptography, PGP Cooperation https://www.cs.unibo.it/babaoglu/courses/security/resources/documents/intro-to-crypto.pdf Cryptography: An Introduction (3rd Edition) by Nigel Smart https://www.cs.umd.edu/~waa/414-F11/IntroToCrypto.pdf

Course Category
Mathematics and Basic Sciences %20
Engineering %30
Engineering Design %30
Social Sciences %0
Education %0
Health %0
Field %20

Planned Learning Activities and Teaching Methods
Activities are given in detail in the section of "Assessment Methods and Criteria" and "Workload Calculation"

Assessment Methods and Criteria
In-Term Studies Quantity Percentage
Yarıyıl İçi Çalışmalarının Başarı Notunun Katkısı 1 % 30
Quiz/Küçük Sınav 2 % 10
Ödev 5 % 25
Final examination 1 % 35
Total
9
% 100

 
ECTS Allocated Based on Student Workload
Activities Quantity Duration Total Work Load
Yazılı Sınav 2 10 20
Grup Projesi 3 5 15
Ev Ödevi 2 5 10
Medya İncelemesi 1 5 5
Kısa Sınav 2 10 20
Okuma 1 10 10
Teslim 5 2 10
Takım/Grup Çalışması 3 5 15
Yüz Yüze Ders 14 3 42
Final Sınavı 1 10 10
Total Work Load   Number of ECTS Credits 5 157

Course Learning Outcomes: Upon the successful completion of this course, students will be able to:
NoLearning Outcomes
1 Öğrenciler, kriptografik protokollerin temel ilkelerini, uygulamalarını ve matematiksel altyapısını anlayacaktır.
2 Öğrenciler, gerçek hayat kullanım senaryoları için kriptografik protokoller oluşturmayı anlayabileceklerdir.
3 Öğrenciler, kriptografinin bilgi güvenliğindeki rolünü kavrayacaktır.
4 Öğrenciler, geçmişte ve günümüzde kullanılan kriptografik algoritmaları ve yöntemleri anlayıp öğrenecektir.
5 Students will understand and learn construction of advanced security protocols using cryptographic protocols.


Weekly Detailed Course Contents
WeekTopicsStudy MaterialsMaterials
1 Overview of cryptography The one-time pad and perfect secrecy
2 Pseudorandom generators (PRGs) Semantic security
3 Symmetric encryption Stream cipher constructions
4 Block cipher modes of operation (CTR, CBC, ECB) Block cipher constructions (3DES and AES)
5 Public Key Cryptography RSA, factoring problem Weakness of RSA textbook version
6 ElGamal encryption Security Definitions: Chosen-plaintext security (CPA-security) Chosen-ciphertext security (CCA-security)
9 Key exchange Diffie-Hellman key exchange Discrete log, CDH, and DDH
10 Pseudorandom generators (PRGs) Semantic security
11 Hash Functions Message authentication codes (MACs) Hash-based MACs: HMAC
12 Certificates and the public-key infrastructure (PKI) Authenticated key-exchange protocols: constructions and attacks Transport Layer Security (TLS)
13 Cryptography Applications Introduction to Multiparty Computation Fully Homomorphic Encryption Real-life scenarios
14 Private Information Retrieval (PIR)


Contribution of Learning Outcomes to Programme Outcomes
P1
C1
C2
C3
C4
C5

Contribution: 1: Very Slight 2:Slight 3:Moderate 4:Significant 5:Very Significant


https://sis.agu.edu.tr/oibs/bologna/progCourseDetails.aspx?curCourse=74902&lang=en