Classical Cryptosystems, Basic Number Theory, Block Cipher Algorithms: DES, 3DES, and AES(Rijndael), Public Key Cryptography: RSA Discrete Logarithms, Elliptic Curve Cryptography(ECC), Digital Signatures, Implementation Issues, Secret Sharing, Zero Knowledge Techniques, Games, Digital Cash, Quantum Cryptography.
Cryptography (CS 507)
2022 Fall
Faculty of Engineering and Natural Sciences
Computer Sci.& Eng.(CS)
3
10
Atıl Utku Ay utku.ay@sabanciuniv.edu,
Click here to view.
English
Doctoral, Master
--
Click
here
to view.
Programs\Type | Required | Core Elective | Area Elective |
Business Analytics - With Thesis | * | ||
Computer Science and Engineering - With Bachelor's Degree | * | ||
Computer Science and Engineering - With Master's Degree | * | ||
Computer Science and Engineering - With Thesis | * | ||
Cyber Security - With Bachelor's Degree | * | ||
Cyber Security - With Master's Degree | * | ||
Cyber Security - With Thesis | * | ||
Data Science - With Thesis | * | ||
Electronics Engineering and Computer Science - With Bachelor's Degree | * | ||
Electronics Engineering and Computer Science - With Master's Degree | * | ||
Electronics Engineering and Computer Science - With Thesis | * | ||
Electronics Engineering - With Bachelor's Degree | * | ||
Electronics Engineering - With Master's Degree | * | ||
Electronics Engineering - With Thesis | * | ||
Energy Technologies and Management-With Thesis | * | ||
Industrial Engineering - With Bachelor's Degree | * | ||
Industrial Engineering - With Master's Degree | * | ||
Industrial Engineering - With Thesis | * | ||
Leaders for Industry Biological Sciences and Bioengineering - Non Thesis | * | ||
Leaders for Industry Computer Science and Engineering - Non Thesis | * | ||
Leaders for Industry Electronics Engineering and Computer Science - Non Thesis | * | ||
Leaders for Industry Electronics Engineering - Non Thesis | * | ||
Leaders for Industry Industrial Engineering - Non Thesis | * | ||
Leaders for Industry Materials Science and Engineering - Non Thesis | * | ||
Leaders for Industry Mechatronics Engineering - Non Thesis | * | ||
Manufacturing Engineering - Non Thesis | * | ||
Manufacturing Engineering - With Bachelor's Degree | * | ||
Manufacturing Engineering - With Master's Degree | * | ||
Manufacturing Engineering - With Thesis | * | ||
Materials Science and Nano Engineering-(Pre:Materials Science and Engineering) | * | ||
Materials Science and Nano Engineering-(Pre:Materials Science and Engineering) | * | ||
Materials Science and Nano Engineering - With Thesis (Pre.Name: Materials Science and Engineering) | * | ||
Mathematics - With Bachelor's Degree | * | ||
Mathematics - With Master's Degree | * | ||
Mathematics - With Thesis | * | ||
Mechatronics Engineering - With Bachelor's Degree | * | ||
Mechatronics Engineering - With Master's Degree | * | ||
Mechatronics Engineering - With Thesis | * | ||
Molecular Biology, Genetics and Bioengineering (Prev. Name: Biological Sciences and Bioengineering) | * | ||
Molecular Biology, Genetics and Bioengineering-(Prev. Name: Biological Sciences and Bioengineering) | * | ||
Molecular Biology,Genetics and Bioengineering-With Thesis (Pre.Name:Biological Sciences and Bioeng.) | * | ||
Physics - Non Thesis | * | ||
Physics - With Bachelor's Degree | * | ||
Physics - With Master's Degree | * | ||
Physics - With Thesis | * |
CONTENT
LEARNING OUTCOMES
- Show a good understanding of security issues in a classical communications scenario.
- Explain why classical ciphers using mono-or poly alphabetic substitution technique are weak.
- Demonstrate a good understanding of introductory number theory pertaining to prime numbers, divisibility, rings, groups, finite fields.
- Use software libraries for number theory and cryptographic operations and build application using these libraries.
- Outline the classic taxonomy of cryptographic algorithms, and give at least one contemporary example for each class in the taxonomy
- Explain the difference between stream ciphers and block ciphers and the difference between symmetric ciphers and asymmetric ciphers, and area of their usage.
- Demonstrate a good understanding of block cipher design principles and one public key algorithm
- Give at least two examples for hard problems on which contemporary cryptographic algorithms are based.
- Calculate the minimum key length that should be used in one symmetric and one public key cryptosystem for at least two different security levels.
- Demonstrate a good understanding of public key certificates and their usage in securing communication channels.
- Design and implement a simple communication protocol that provides basic security functionality including confidentiality, integrity, authentication, non-repudiation for communicating parties.
Update Date:
ASSESSMENT METHODS and CRITERIA
Percentage (%) | |
Final | 35 |
Midterm | 30 |
Quiz | 10 |
Group Project | 15 |
Homework | 10 |