Learning Outcomes |
PO |
MME |
The students who succeeded in this course: |
|
|
LO-1 |
Can learn basic encoding methods. |
PO-1 Fundamental theorems of about some sub-theories of Analysis, Applied Mathematics, Geometry, and Algebra can apply to new problems.
|
Examination |
LO-2 |
Can perceive classical cryptosystems and attacks against these systems. |
PO-2 Ability to assimilate mathematic related concepts and associate these concepts with each other. PO-3 Mathematics, natural sciences and their branches in these areas and related issues has sufficient infrastructure solutions for the problems of theoretical and practical uses of mathematics.
|
Examination |
LO-3 |
Can know the encryption standards (DES,AES). Can learn the basic building of the RSA algorithm and perceive what their difficulties are based on. |
PO-2 Ability to assimilate mathematic related concepts and associate these concepts with each other. PO-11 Ability to make individual and team work on issues related to working and social life.
|
Examination |
PO: Programme Outcomes MME:Method of measurement & Evaluation |
Course Contents |
Introduction to cryptography, Classical cryptosystems ( Sezar, Affine), Classical cryptosystems (Vigenere, Permutation), Block cryptosystems (Hill), The data encryption standart (DES), The advanced encryption standart (AES), Public key cryptosystems (RSA), Primality testing, Factorization algorithms |
Weekly Course Content |
Week |
Subject |
Learning Activities and Teaching Methods |
1 |
Introduction to crytography |
Lecturing |
2 |
Classical cryptosystems ( Sezar, Affine) |
Lecturing |
3 |
Classical cryptosystems (Vigenere, Permutation) |
Lecturing |
4 |
Block cryptosystems (Hill) |
Lecturing |
5 |
Cryptoanalysis |
Lecturing |
6 |
The data encryption standart (DES) |
Lecturing |
7 |
The data encryption standart (DES) |
Lecturing |
8 |
mid-term exam |
|
9 |
The advanced encryption standart (AES) |
Lecturing |
10 |
The advanced encryption standart (AES) |
Lecturing |
11 |
Public key cryptosystems (RSA) |
Lecturing |
12 |
Public key cryptosystems (RSA) |
Lecturing |
13 |
Primality testing |
Lecturing |
14 |
Primality testing |
Lecturing |
15 |
Factorization algorithms |
Lecturing |
16 |
final exam |
|
Recommend Course Book / Supplementary Book/Reading |
1 |
Wade Trappe, Lawrence C. Washington, Introduction to Cryptography with Coding Theory, second ed., Pearson Education, 2007. |
2 |
Douglas Stinson, "Cryptography: Theory and Practice", CRC Press, 2002. |
3 |
Johannes Buchmann, "Introduction to Cryptography", Springer-Verlag, New York, 2001. |
4 |
Cryptography and Network Security: Principles and Practice, 5/E William Stallings, Prentice Hall 2011. |
Required Course instruments and materials |
|