Türkçe | English
FACULTY of ENGINEERING / DEPARTMENT of INDUSTRIAL ENGINEERING

Course Catalog
http://www.ktu.edu.tr/endustri
Phone: +90 0462 3773824
MF
FACULTY of ENGINEERING / DEPARTMENT of INDUSTRIAL ENGINEERING /
Katalog Ana Sayfa
  Katalog Ana Sayfa  KTÜ Ana Sayfa   Katalog Ana Sayfa
 
 

BILL7192Cryptography and Network Security3+0+0ECTS:7.5
Year / SemesterFall Semester
Level of CourseThird Cycle
Status Elective
DepartmentDEPARTMENT of COMPUTER ENGINEERING
Prerequisites and co-requisitesNone
Mode of Delivery
Contact Hours14 weeks - 3 hours of lectures per week
Lecturer--
Co-LecturerNone
Language of instructionTurkish
Professional practise ( internship ) None
 
The aim of the course:
To give detailed information about cryptography and security
 
Programme OutcomesCTPOTOA
Upon successful completion of the course, the students will be able to :
PO - 1 : Has general information about the cryptographic techniques1,2,3,4,5,6,7,8,9,101
PO - 2 : Can suggest techniques to ensure the data security1,2,3,4,5,6,7,8,9,101
PO - 3 : can solve the network problems about the security and suggest techniques to deal with these problems1,2,3,4,5,6,7,8,9,101,6
PO - 4 : can propose techniques about the image security1,2,3,4,5,6,7,8,9,101,6
CTPO : Contribution to programme outcomes, TOA :Type of assessment (1: written exam, 2: Oral exam, 3: Homework assignment, 4: Laboratory exercise/exam, 5: Seminar / presentation, 6: Term paper), PO : Learning Outcome

 
Contents of the Course
Conventional encryption techniques and algorithms: DES, Block chipher, Blowfish, RES, CAST-128. Confidentiality: Key distribution, Random number generation. Public key cryptography, Number theory, Message authentication and Hash function, Hash and Mac algorithms, Digital Signature and authentication protocols. Authentication and applications, Electronic mail security, IP security, Web security, Intruders, viruses, worms and firewalls
 
Course Syllabus
 WeekSubjectRelated Notes / Files
 Week 1Introduction to data security
 Week 2Conventional encryption, classical techniques, modern techniques
 Week 3Ensuring the data security using symmetrical key cryptography, DES, AES
 Week 4Public key cryptography and hash functions
 Week 5Introduction to Number theory
 Week 6Digital signatures and authentication protocols
 Week 7Used techniques for ensuring the image security, watermarking and image cryptography
 Week 8Threshold schemes and secret image sharing
 Week 9midterm exam
 Week 10Network security practice and system security
 Week 11Authentication applications
 Week 12Electronic Mail Security
 Week 13Internet Protocol Security
 Week 14Viruses and Worms, Firewall
 Week 15Digital Watermarking Techniques
 Week 16Final term
 
Textbook / Material
1Cryptography and Network Security: Principles and Practice; Fourth or Fifth Edition. By William Stallings, Prentice Hall, Hardcover
 
Recommended Reading
1Cryptography: Theory and Practice by Douglas R. Stinson, CRC press, hardcover, Pub- lished March, 1995
2Network Security Essentials: Applications and Standards by William Stallings. Prentice Hall, Hardcover, Published November 1999
 
Method of Assessment
Type of assessmentWeek NoDate

Duration (hours)Weight (%)
Mid-term exam 9 2 30
In-term studies (second mid-term exam) 14 2 20
End-of-term exam 14 2 50
 
Student Work Load and its Distribution
Type of workDuration (hours pw)

No of weeks / Number of activity

Hours in total per term
Yüz yüze eğitim 3 14 42
Sınıf dışı çalışma 5 14 70
Arasınav için hazırlık 15 1 15
Arasınav 2 1 2
Ödev 30 1 30
Dönem sonu sınavı için hazırlık 20 1 20
Dönem sonu sınavı 2 1 2
Total work load181