Cyber Security (Master) (with Thesis) (English) | |||||
Master | TR-NQF-HE: Level 7 | QF-EHEA: Second Cycle | EQF-LLL: Level 7 |
Course Code: | CYS5003 | ||||
Course Name: | Introductıon To Cryptography And Securıty Protocols | ||||
Semester: | Spring | ||||
Course Credits: |
|
||||
Language of instruction: | English | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | Departmental Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | Face to face | ||||
Course Coordinator: | Dr. Öğr. Üy. FUNDA ÖZDEMİR | ||||
Course Lecturer(s): | Doç. Dr. Ali Ghaffari | ||||
Course Assistants: |
Course Objectives: | Enable the students to learn fundamental concepts of cryptography and security ptotocold and utilize these techniques in computing systems. To be able to secure a message over insecure channel by various means. To understand various protocols for network security to protect against the threats in the networks. To learn about how to maintain the Confidentiality, Integrity and Availability of a data. |
Course Content: | General concepts of cryptography, classical cryptosystem and basics of cryptanalysis, symmetric and asymmetric cryptography algorithms (OTP, DES, 3DES, AES, RC5, RSA), public key cryptography, cryptographic hash functions, data integrity and message authentication, digital signatures, secure key exchange (Diffie–Hellman key exchange), authentication mechanisms , authentication protocols, security protocol design, analysis and verification, access control and authorization. Some existing application layer security protocols (such as email security) . |
The students who have succeeded in this course;
1) equip with cryptography and security basics in modern computer network and systems. 2) provide security of the data over the network. 3) protect any network from the threats in the world. |
Week | Subject | Related Preparation |
1) | Introduction to cryptography and system security: cryptology, cryptanalysis, classification of cryptosystems, and basic concepts of secure systems. | No |
2) | Symmetric-key Cryptographic Systems: design principles, cipher systems | No |
3) | One time pad and stream ciphers | No |
4) | Block ciphers, DES, 3DES, AES | No |
5) | Public-key Cryptographic Systems: public-key systems (RSA) | No |
6) | MD5 message digest algorithm | No |
7) | Message authentication codes, hash functions | No |
8) | Midterm Exam | No |
9) | Digital signatures: definitions and applications | No |
10) | Authenticated key exchange and SSL/TLS session setup | No |
11) | Authentication mechanisms (password-based, biometrics, multifactor) | No |
12) | Network Security Protocols: the man-in-the-middle attacks, mutual authentication, key establishment, security association | No |
13) | Network security protocols (IPsec, TLS), and attacks on TLS | No |
14) | Electronic mail security-pretty good privacy (PGP) - S/MIME | No |
Course Notes / Textbooks: | Cryptography and Network Security, William Stallings, Pearson Education, 2014 |
References: | Introduction to Modern Cryptography (2nd edition) by J. Katz and Y. Lindell. |
Course Learning Outcomes | 1 |
2 |
3 |
|||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Being able to develop and deepen their knowledge at the level of expertise in the same or a different field, based on undergraduate level qualifications. | ||||||||||||
2) To be able to use the theoretical and applied knowledge at the level of expertise acquired in the field. | ||||||||||||
3) To be able to interpret and create new knowledge by integrating the knowledge gained in the field with the knowledge from different disciplines. | ||||||||||||
4) To be able to solve the problems encountered in the field by using research methods. | ||||||||||||
5) To be able to systematically transfer current developments in the field and their own studies to groups in and outside the field, in written, verbal and visual forms, by supporting them with quantitative and qualitative data. | ||||||||||||
6) To be able to communicate orally and in writing using a foreign language at least at the B2 General Level of the European Language Portfolio. | ||||||||||||
7) To be able to critically evaluate the knowledge and skills acquired in the field of expertise and to direct their learning. | ||||||||||||
8) To be able to use information and communication technologies at an advanced level along with computer software at the level required by the field. | ||||||||||||
9) To be able to supervise and teach these values by observing social, scientific, cultural and ethical values in the stages of collecting, interpreting, applying and announcing the data related to the field. | ||||||||||||
10) To be able to use the knowledge, problem solving and/or application skills they have internalized in their field in interdisciplinary studies. | ||||||||||||
11) Being able to independently carry out a work that requires expertise in the field. | ||||||||||||
12) To be able to develop new strategic approaches for the solution of complex and unpredictable problems encountered in applications related to the field and to produce solutions by taking responsibility. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Being able to develop and deepen their knowledge at the level of expertise in the same or a different field, based on undergraduate level qualifications. | 2 |
2) | To be able to use the theoretical and applied knowledge at the level of expertise acquired in the field. | 2 |
3) | To be able to interpret and create new knowledge by integrating the knowledge gained in the field with the knowledge from different disciplines. | 3 |
4) | To be able to solve the problems encountered in the field by using research methods. | 1 |
5) | To be able to systematically transfer current developments in the field and their own studies to groups in and outside the field, in written, verbal and visual forms, by supporting them with quantitative and qualitative data. | 3 |
6) | To be able to communicate orally and in writing using a foreign language at least at the B2 General Level of the European Language Portfolio. | 2 |
7) | To be able to critically evaluate the knowledge and skills acquired in the field of expertise and to direct their learning. | 1 |
8) | To be able to use information and communication technologies at an advanced level along with computer software at the level required by the field. | 2 |
9) | To be able to supervise and teach these values by observing social, scientific, cultural and ethical values in the stages of collecting, interpreting, applying and announcing the data related to the field. | 2 |
10) | To be able to use the knowledge, problem solving and/or application skills they have internalized in their field in interdisciplinary studies. | 2 |
11) | Being able to independently carry out a work that requires expertise in the field. | 1 |
12) | To be able to develop new strategic approaches for the solution of complex and unpredictable problems encountered in applications related to the field and to produce solutions by taking responsibility. | 3 |
Semester Requirements | Number of Activities | Level of Contribution |
Midterms | 1 | % 40 |
Final | 1 | % 60 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Course Hours | 40 | 1 | 40 | ||||
Study Hours Out of Class | 20 | 1 | 20 | ||||
Midterms | 10 | 1 | 10 | ||||
Final | 10 | 1 | 10 | ||||
Total Workload | 80 |