Türkçe | English
OF FACULTY of TECHNOLOGY / DEPARTMENT of SOFTWARE ENGINEERING

Course Catalog
http://www.ktu.edu.tr/ofyazilim
Phone: +90 0462 3778353
OFTF
OF FACULTY of TECHNOLOGY / DEPARTMENT of SOFTWARE ENGINEERING /
Katalog Ana Sayfa
  Katalog Ana Sayfa  KTÜ Ana Sayfa   Katalog Ana Sayfa
 
 

YZM3031Information Security and Cryptology2+0+0ECTS:4
Year / SemesterFall Semester
Level of CourseFirst Cycle
Status Elective
DepartmentDEPARTMENT of SOFTWARE ENGINEERING
Prerequisites and co-requisitesNone
Mode of DeliveryFace to face, Group study
Contact Hours14 weeks - 2 hours of lectures per week
LecturerDr. Öğr. Üyesi Asuman GÜNAY YILMAZ
Co-Lecturer
Language of instructionTurkish
Professional practise ( internship ) None
 
The aim of the course:
The aim of the course is to teach basic knowledge about information security and network security, to provide the basic principles of cryptography and the ability of data encryption.
 
Learning OutcomesCTPOTOA
Upon successful completion of the course, the students will be able to :
LO - 1 : Learn the goals, principles, of information security and types of security attacks .3,7,8,111,3,
LO - 2 : Learn basic security mechanisms and secure network designs.3,7,8,111,3,
LO - 3 : Learn the basic concepts of cryptography and cryptographic systems.3,7,8,111,3,
LO - 4 : Know symmetric and asymmetric cryptographic systems, hashing algorithms.3,7,8,111,3,
LO - 5 : Have information about public key cryptography and digital signatures3,7,8,111,3,
LO - 6 : Know security certificates and make security related risk analysis.3,7,8,111,3,
CTPO : Contribution to programme outcomes, TOA :Type of assessment (1: written exam, 2: Oral exam, 3: Homework assignment, 4: Laboratory exercise/exam, 5: Seminar / presentation, 6: Term paper), LO : Learning Outcome

 
Contents of the Course
Information Security / Cyber security related definitions and security attacks,Information security principals and objectives, General definitions of cryptography, Basic security mechanisms and secure network designs, Number theory and modular arithmetic, The history and types of cryptography, Symmetric, asymmetric encryption methods, Hashing algorithms, Public key cryptographic algorithms, RSA, Hand-Gamal Encryption Methods, Elliptic Curve Cryptography, Digital signatures, Security certificates, Security risk analysis and planning
 
Course Syllabus
 WeekSubjectRelated Notes / Files
 Week 1Information Security / Cyber security related definitions and security attacks
 Week 2Information Security / Cyber security related definitions and security attacks
 Week 3Basic security mechanisms and secure network designs,
 Week 4Number theory and modular arithmetic
 Week 5The history and types of cryptography,
 Week 6Symmetric encryption methods-DES
 Week 7AES and block-based encryption methods
 Week 8Hashing Algorithms-MD5
 Week 9Midterm exam
 Week 10Public key encyrption- RSA
 Week 11Public key encyrption- El Gamal
 Week 12Elliptic Curve Cryptography
 Week 13Digital Signatures
 Week 14Security certificates-SSL
 Week 15Security risk analysis and planning
 Week 16Final exam
 
Textbook / Material
1Eşref Adalı, Bilgisayar ve Bilgi Güvenliği ve Yönetimi
 
Recommended Reading
1Forouzan, Behrouz, McGraw Hill, 2009, Cryptography and Network Security
 
Method of Assessment
Type of assessmentWeek NoDate

Duration (hours)Weight (%)
Mid-term exam 9 2 30
Project 12 1 20
End-of-term exam 16 2 50
 
Student Work Load and its Distribution
Type of workDuration (hours pw)

No of weeks / Number of activity

Hours in total per term
Yüz yüze eğitim 2 14 28
Sınıf dışı çalışma 2 14 28
Arasınav için hazırlık 4 5 20
Arasınav 2 1 2
Proje 4 5 20
Dönem sonu sınavı için hazırlık 3 5 15
Dönem sonu sınavı 2 1 2
Total work load115