Nevşehir Hacı Bektaş Veli University Course Catalogue

Information Of Programmes

INSTITUTE OF SCIENCE / MAT520 - MATHEMATICS

Code: MAT520 Course Title: CRYPTOLOGY II Theoretical+Practice: 3+0 ECTS: 6
Year/Semester of Study 1 / Spring Semester
Level of Course 2nd Cycle Degree Programme
Type of Course Optional
Department MATHEMATICS
Pre-requisities and Co-requisites None
Mode of Delivery Face to Face
Teaching Period 14 Weeks
Name of Lecturer HAYRULLAH ÖZİMAMOĞLU (h.ozimamoglu@nevsehir.edu.tr)
Name of Lecturer(s)
Language of Instruction Turkish
Work Placement(s) None
Objectives of the Course
To give information about Diffie-Hellman key exchange and public key cryptosystems (ElGamal) and show the significant of their application areas to students.

Learning Outcomes PO MME
The students who succeeded in this course:
LO-1 Can know Diffie-Hellman key exchange. Can perceive public key cryptosystems (ElGamal) and attacks against these systems. PO-1 Fundamental theorems of about some sub-theories of Analysis, Applied Mathematics, Geometry, and Algebra can apply to new problems.
PO-2 Ability to assimilate mathematic related concepts and associate these concepts with each other.
Examination
LO-2 Can learn using Hash functions to encrypt, the digital signature algorithms and security protocols. PO-2 Ability to assimilate mathematic related concepts and associate these concepts with each other.
PO-3 Mathematics, natural sciences and their branches in these areas and related issues has sufficient infrastructure solutions for the problems of theoretical and practical uses of mathematics.
PO-11 Ability to make individual and team work on issues related to working and social life.
Examination
PO: Programme Outcomes
MME:Method of measurement & Evaluation

Course Contents
Discrete logarithms, Diffie-Hellman key exchange, Public key cryptosystems (ElGamal), Hash functions, Birthday attacks, The secure Hash algorithm, Using Hash functions to encrypt, RSA signatures and the ElGamal signature scheme, The digital signature algorithm, Security protocols
Weekly Course Content
Week Subject Learning Activities and Teaching Methods
1 Discrete logarithms Lecturing
2 Discrete logarithms Lecturing
3 Diffie-Hellman key exchange Lecturing
4 Diffie-Hellman key exchange Lecturing
5 Public key cryptosystems (ElGamal) Lecturing
6 Public key cryptosystems (ElGamal) Lecturing
7 Hash functions Lecturing
8 mid-term exam
9 Birthday attacks Lecturing
10 The secure Hash algorithm Lecturing
11 Using Hash functions to encrypt Lecturing
12 RSA signatures and the ElGamal signature scheme Lecturing
13 The digital signature algorithm Lecturing
14 Security protocols Lecturing
15 Security protocols Lecturing
16 final exam
Recommend Course Book / Supplementary Book/Reading
1 Wade Trappe, Lawrence C. Washington, Introduction to Cryptography with Coding Theory, second ed., Pearson Education, 2007.
2 Douglas Stinson, "Cryptography: Theory and Practice", CRC Press, 2002.
3 Johannes Buchmann, "Introduction to Cryptography", Springer-Verlag, New York, 2001.
4 Cryptography and Network Security: Principles and Practice, 5/E William Stallings, Prentice Hall 2011.
Required Course instruments and materials

Assessment Methods
Type of Assessment Week Hours Weight(%)
mid-term exam 8 2 40
Other assessment methods
1.Oral Examination
2.Quiz
3.Laboratory exam
4.Presentation
5.Report
6.Workshop
7.Performance Project
8.Term Paper
9.Project
final exam 16 2 60

Student Work Load
Type of Work Weekly Hours Number of Weeks Work Load
Weekly Course Hours (Theoretical+Practice) 3 14 42
Outside Class
       a) Reading 5 14 70
       b) Search in internet/Library 2 14 28
       c) Performance Project 0
       d) Prepare a workshop/Presentation/Report 0
       e) Term paper/Project 0
Oral Examination 0
Quiz 0
Laboratory exam 0
Own study for mid-term exam 4 4 16
mid-term exam 2 1 2
Own study for final exam 5 4 20
final exam 2 1 2
0
0
Total work load; 180