Cyber Security (Master) (without Thesis) (English)
Master TR-NQF-HE: Level 7 QF-EHEA: Second Cycle EQF-LLL: Level 7

Course Introduction and Application Information

Course Code: CYS5003
Course Name: Introductıon To Cryptography And Securıty Protocols
Semester: Spring
Course Credits:
ECTS
6
Language of instruction: English
Course Condition:
Does the Course Require Work Experience?: No
Type of course: Departmental Elective
Course Level:
Master TR-NQF-HE:7. Master`s Degree QF-EHEA:Second Cycle EQF-LLL:7. Master`s Degree
Mode of Delivery: Face to face
Course Coordinator: Dr. Öğr. Üy. FUNDA ÖZDEMİR
Course Lecturer(s): Doç. Dr. Ali Ghaffari
Course Assistants:

Course Objective and Content

Course Objectives: Enable the students to learn fundamental concepts of cryptography and security ptotocold and utilize these techniques in computing systems. To be able to secure a message over insecure channel by various means. To understand various protocols for network security to protect against the threats in the networks. To learn about how to maintain the Confidentiality, Integrity and Availability of a data.
Course Content: General concepts of cryptography, classical cryptosystem and basics of cryptanalysis, symmetric and asymmetric cryptography algorithms (OTP, DES, 3DES, AES, RC5, RSA), public key cryptography, cryptographic hash functions, data integrity and message authentication, digital signatures, secure key exchange (Diffie–Hellman key exchange), authentication mechanisms , authentication protocols, security protocol design, analysis and verification, access control and authorization. Some existing application layer security protocols (such as email security) .

Learning Outcomes

The students who have succeeded in this course;
1) equip with cryptography and security basics in modern computer network and systems.
2) provide security of the data over the network.
3) protect any network from the threats in the world.

Course Flow Plan

Week Subject Related Preparation
1) Introduction to cryptography and system security: cryptology, cryptanalysis, classification of cryptosystems, and basic concepts of secure systems. No
2) Symmetric-key Cryptographic Systems: design principles, cipher systems No
3) One time pad and stream ciphers No
4) Block ciphers, DES, 3DES, AES No
5) Public-key Cryptographic Systems: public-key systems (RSA) No
6) MD5 message digest algorithm No
7) Message authentication codes, hash functions No
8) Midterm Exam No
9) Digital signatures: definitions and applications No
10) Authenticated key exchange and SSL/TLS session setup No
11) Authentication mechanisms (password-based, biometrics, multifactor) No
12) Network Security Protocols: the man-in-the-middle attacks, mutual authentication, key establishment, security association No
13) Network security protocols (IPsec, TLS), and attacks on TLS No
14) Electronic mail security-pretty good privacy (PGP) - S/MIME No

Sources

Course Notes / Textbooks: Cryptography and Network Security, William Stallings, Pearson Education, 2014
References: Introduction to Modern Cryptography (2nd edition) by J. Katz and Y. Lindell.

Course - Program Learning Outcome Relationship

Course Learning Outcomes

1

2

3

Program Outcomes
1) Being able to develop and deepen their knowledge at the level of expertise in the same or a different field, based on undergraduate level qualifications.
2) To be able to use the theoretical and applied knowledge at the level of expertise acquired in the field.
3) To be able to interpret and create new knowledge by integrating the knowledge gained in the field with the knowledge from different disciplines.
4) To be able to solve the problems encountered in the field by using research methods.
5) To be able to systematically transfer current developments in the field and their own studies to groups in and outside the field, in written, verbal and visual forms, by supporting them with quantitative and qualitative data.
6) To be able to communicate orally and in writing using a foreign language at least at the B2 General Level of the European Language Portfolio.
7) To be able to critically evaluate the knowledge and skills acquired in the field of expertise and to direct their learning.
8) To be able to use information and communication technologies at an advanced level along with computer software at the level required by the field.
9) To be able to supervise and teach these values ​​by observing social, scientific, cultural and ethical values ​​in the stages of collecting, interpreting, applying and announcing the data related to the field.
10) To be able to use the knowledge, problem solving and/or application skills they have internalized in their field in interdisciplinary studies.
11) Being able to independently carry out a work that requires expertise in the field.
12) To be able to develop new strategic approaches for the solution of complex and unpredictable problems encountered in applications related to the field and to produce solutions by taking responsibility.

Course - Learning Outcome Relationship

No Effect 1 Lowest 2 Average 3 Highest
       
Program Outcomes Level of Contribution
1) Being able to develop and deepen their knowledge at the level of expertise in the same or a different field, based on undergraduate level qualifications.
2) To be able to use the theoretical and applied knowledge at the level of expertise acquired in the field.
3) To be able to interpret and create new knowledge by integrating the knowledge gained in the field with the knowledge from different disciplines.
4) To be able to solve the problems encountered in the field by using research methods.
5) To be able to systematically transfer current developments in the field and their own studies to groups in and outside the field, in written, verbal and visual forms, by supporting them with quantitative and qualitative data.
6) To be able to communicate orally and in writing using a foreign language at least at the B2 General Level of the European Language Portfolio.
7) To be able to critically evaluate the knowledge and skills acquired in the field of expertise and to direct their learning.
8) To be able to use information and communication technologies at an advanced level along with computer software at the level required by the field.
9) To be able to supervise and teach these values ​​by observing social, scientific, cultural and ethical values ​​in the stages of collecting, interpreting, applying and announcing the data related to the field.
10) To be able to use the knowledge, problem solving and/or application skills they have internalized in their field in interdisciplinary studies.
11) Being able to independently carry out a work that requires expertise in the field.
12) To be able to develop new strategic approaches for the solution of complex and unpredictable problems encountered in applications related to the field and to produce solutions by taking responsibility.

Assessment & Grading

Semester Requirements Number of Activities Level of Contribution
Midterms 1 % 40
Final 1 % 60
total % 100
PERCENTAGE OF SEMESTER WORK % 40
PERCENTAGE OF FINAL WORK % 60
total % 100

Workload and ECTS Credit Calculation

Activities Number of Activities Preparation for the Activity Spent for the Activity Itself Completing the Activity Requirements Workload
Course Hours 40 1 40
Study Hours Out of Class 20 1 20
Midterms 10 1 10
Final 10 1 10
Total Workload 80