>
Course Unit Title | Course Unit Code | Type of Course Unit | Level of Course Unit | Year of Study | Semester | ECTS Credits |
---|---|---|---|---|---|---|
Cryptography | MAT631 | Elective | Doctorate degree | 1 | Spring | 8 |
Associate Prof. Dr. Selda ÇALKAVUR
1) Get all necessary information about the encryption algorithms.
2) Get all necessary information about the secret key encryption methods, DES, TRIPLE DES, AES encryption methods.
3) Get all necessary information about the public key encryption methods, RSA, El-Gamal cryptosystems, Diffie-Hellman key exchange system, Merkle-Hellman Knapsack cryptosystem
4) Get all necessary information about the digital signatures and authentication, Hash functions, MD5, SHA-1, SHA-2, SHA-3 encryptions, Merkle tree.
5) Get all necessary information about blockchains and cryptocurrency, secret sharing schemes, cryptanalysis methods, the future of cryptography, quantum computers.
Program Competencies | ||||||||
1 | 2 | 3 | 4 | 5 | 6 | 7 | ||
Learning Outcomes | ||||||||
1 | No relation | No relation | No relation | No relation | No relation | No relation | No relation | |
2 | No relation | No relation | No relation | No relation | No relation | No relation | No relation | |
3 | No relation | No relation | No relation | No relation | No relation | No relation | No relation | |
4 | No relation | No relation | No relation | No relation | No relation | No relation | No relation | |
5 | No relation | No relation | No relation | No relation | No relation | No relation | No relation |
Face to Face
None
Coding Theory
Encryption algorithms, secret key encryption methods, public key encryption methods, digital signatures and authentication, elliptic curve cryptosystem, quantum cryptography, Hash functions, blockchains and cryptocurrency, secret sharing schemes, cryptanalysis methods, the future of cryptography, quantum computers.
1- 1) Thomas Barr, “Invitation to Cryptology”.
2- 2) Hans Delfs, Helmut Knebl, “Introduction to Cryptography”.
3- 3) Robert Churchhouse, “Codes and Ciphers”.
4- 4) Van Der Lubbe, “Basics Methods of Cryptography”.
5- 5) Wenbo Mao, “Modern Cryptography: Theory and Practice”.
6- 6) Alfred Menezes, Paul van Oorschot, Scott Vanstone, “Handbook of Applied Cryptography”.
7- 7) Nigel Smart, “Cryptography: An Introduction”.
8- 8) Selda Çalkavur, Alexis Bonnecaze, Romar dela Cruz, Patrick Solé, “Code Based Secret Sharing Schemes”, World Scientific publishing, 2022.
1) Lecture
2) Question-Answer
3) Discussion
4) Drill and Practice
5) Problem Solving
Contribution of Midterm Examination to Course Grade |
30% |
---|---|
Contribution of Final Examination to Course Grade |
70% |
Total |
100% |
Turkish
Not Required