>
Course Unit Title Course Unit Code Type of Course Unit Level of Course Unit Year of Study Semester ECTS Credits
Cryptography MAT631 Elective Doctorate degree 1 Spring 8

Name of Lecturer(s)

Associate Prof. Dr. Selda ÇALKAVUR

Learning Outcomes of the Course Unit

1) Get all necessary information about the encryption algorithms.
2) Get all necessary information about the secret key encryption methods, DES, TRIPLE DES, AES encryption methods.
3) Get all necessary information about the public key encryption methods, RSA, El-Gamal cryptosystems, Diffie-Hellman key exchange system, Merkle-Hellman Knapsack cryptosystem
4) Get all necessary information about the digital signatures and authentication, Hash functions, MD5, SHA-1, SHA-2, SHA-3 encryptions, Merkle tree.
5) Get all necessary information about blockchains and cryptocurrency, secret sharing schemes, cryptanalysis methods, the future of cryptography, quantum computers.

Program Competencies-Learning Outcomes Relation

  Program Competencies
1 2 3 4 5 6 7
Learning Outcomes
1 No relation No relation No relation No relation No relation No relation No relation
2 No relation No relation No relation No relation No relation No relation No relation
3 No relation No relation No relation No relation No relation No relation No relation
4 No relation No relation No relation No relation No relation No relation No relation
5 No relation No relation No relation No relation No relation No relation No relation

Mode of Delivery

Face to Face

Prerequisites and Co-Requisites

None

Recommended Optional Programme Components

Coding Theory

Course Contents

Encryption algorithms, secret key encryption methods, public key encryption methods, digital signatures and authentication, elliptic curve cryptosystem, quantum cryptography, Hash functions, blockchains and cryptocurrency, secret sharing schemes, cryptanalysis methods, the future of cryptography, quantum computers.

Weekly Schedule

1) Historical Encryption Techniques, Encryption Algorithms and Protocols
2) Secret Key Encryption Methods
3) DES Encryption Method, TRIPLE DES Encryption Method
4) AES Encryption Method
5) Quantum Cryptography
6) Public Key Encryption Methods
7) RSA Cryptosystem
8) El-Gamal Cryptosystem
9) Diffie-Hellman Key Exchange System, Merkle-Hellman Knapsack Cryptosystem
10) Digital Signatures and Authentication
11) Elliptic Curve Cryptosystem
12) Hash Functions, MD5, SHA-1, SHA-2, SHA-3 Encryptions, Merkle Tree
13) Blockchains and Cryptocurrency, Secret Sharing Schemes
14) Cryptanalysis Methods, Frequency Analysis Method, Kasiski Method, Cryptanalysis Methods used in History and Today, The Future of Cryptography, Quantum Computers, Quantum Encryption, Quantum Key Distribution.
15) General Repetition
16) Final Exam

Recommended or Required Reading

1- 1) Thomas Barr, “Invitation to Cryptology”.
2- 2) Hans Delfs, Helmut Knebl, “Introduction to Cryptography”.
3- 3) Robert Churchhouse, “Codes and Ciphers”.
4- 4) Van Der Lubbe, “Basics Methods of Cryptography”.
5- 5) Wenbo Mao, “Modern Cryptography: Theory and Practice”.
6- 6) Alfred Menezes, Paul van Oorschot, Scott Vanstone, “Handbook of Applied Cryptography”.
7- 7) Nigel Smart, “Cryptography: An Introduction”.
8- 8) Selda Çalkavur, Alexis Bonnecaze, Romar dela Cruz, Patrick Solé, “Code Based Secret Sharing Schemes”, World Scientific publishing, 2022.

Planned Learning Activities and Teaching Methods

1) Lecture
2) Question-Answer
3) Discussion
4) Drill and Practice
5) Problem Solving


Assessment Methods and Criteria

Contribution of Midterm Examination to Course Grade

30%

Contribution of Final Examination to Course Grade

70%

Total

100%

Language of Instruction

Turkish

Work Placement(s)

Not Required