|
BIL4004 | Network and Data Security | 3+0+0 | ECTS:4 | Year / Semester | Spring Semester | Level of Course | First Cycle | Status | Elective | Department | DEPARTMENT of COMPUTER ENGINEERING | Prerequisites and co-requisites | None | Mode of Delivery | Face to face | Contact Hours | 14 weeks - 3 hours of lectures per week | Lecturer | Prof. Dr. Güzin ULUTAŞ | Co-Lecturer | None | Language of instruction | Turkish | Professional practise ( internship ) | None | | The aim of the course: | To learn the problems of information security and to propose new techniques to deal with these problems |
Learning Outcomes | CTPO | TOA | Upon successful completion of the course, the students will be able to : | | | LO - 1 : | To design a new cryptograhic system | 2,3,4,12 | 1 | LO - 2 : | To determine the vulnerabilities of an existing cryptographic system | 2,3,4,12 | 1 | LO - 3 : | To evaluate the current cryptographic systems | 2,3,4,12 | 3 | LO - 4 : | To detect existing security problems of a syatem and to propose a new method to deal with this problem | 2,3,4,12 | 1 | LO - 5 : | To realize an authentication procedure and to ensure the integrity of data | 2,3,4,12 | 3 | CTPO : Contribution to programme outcomes, TOA :Type of assessment (1: written exam, 2: Oral exam, 3: Homework assignment, 4: Laboratory exercise/exam, 5: Seminar / presentation, 6: Term paper), LO : Learning Outcome | |
The aims of the ensuring the security of information, the techniques to be used for ensuring the information security, modular arithmetics, linear and quadratic equations, traditional symmetric ciphers, algebric structures, Galois fields, modern symmetric ciphers, AES, DES, asymmetric key ciphers, cryptographic hash functions, digital signatures, key distribution methods |
|
Course Syllabus | Week | Subject | Related Notes / Files | Week 1 | Security goals, attacks, services and mechanism, cryptography, steganography, secret sharing, secret image sharing, watermarking. | | Week 2 | mathematics of cryptography, integer arithmetic, modular arithmetic, modulo operator, matrices, linear congruence, single variable linear equations. | | Week 3 | Traditional symmetric key ciphers, kerckhoff's principle, substitution ciphers, monoalphabetic ciphers, polyalphabetic ciphers, trasposition ciphers, keyless and keyed transpoisition ciphers, stream and block ciphers | | Week 4 | algebraic structures, groups, rings, field, Galois Field, polynomial in GF, using a generator. | | Week 5 | Introduction to modern symmetric key ciphers, modern block ciphers, componenents of a modern block cipher, s boxes, product ciphers, two classes of product ciphers, modern stream ciphers | | Week 6 | Data Encryption Standart, DES structure, DES analysis, Multiple DES, Security of DES | | Week 7 | Advanced Encryption Standart, Transformations, key expansion, ciphers, analyisis of AES | | Week 8 | Encipherment using modern symmetric key ciphers, ECB, CBC, CFB, OFB, CTR modes, Use of stream ciphers, RC4, A5/1 | | Week 9 | Midterm Exam | | Week 10 | Primes,cardinality of primes, checking for primeness, euler's phi function, fermat's little theorem, generating primes, primarily testing, deterministic and undeterministic algorithms, factorization, chinese remainder theorem, quadratic congruence, exponentation and logarithm | | Week 11 | asymmetic key cryptography, RSA cryptosystem, Rabin cryptosystem, ElGamal cryptosystem, Elliptic Curve cryptosystem | | Week 12 | Message integrity and Message authentication, document and fingerprint, message and message digest, checking integrity, cryptographic hash function criteria, random oracle model, message authentication | | Week 13 | cryptographic hash functions, iterated hash functions, SHA-512, Whirlpool | | Week 14 | Digital signature, comparision, process, signing the digest, need for keys, services, message authentication, message integrity, nonrepudiation, confidentiality, attacks on digital signatures, RSA signature scheme, ElGamal signature scheme, Schnorr, DSS, Elliptic Curve Signature scheme | | Week 15 | Entity authentication, passwords, challenge response, zero knowledge, biometrics, key managements,symmetric key distribution, symmetric key aggrement, public key distribution | | Week 16 | Final Exam | | |
1 | Forouzan, Behrouz, McGraw Hill, 2009, Cryptography and Network Security | | |
Method of Assessment | Type of assessment | Week No | Date | Duration (hours) | Weight (%) | Mid-term exam | 9 | 08/04/2013 | 2 | 30 | Project | 15 | 21/05/2013 | 2 | 20 | End-of-term exam | 16 | 28/05/2012 | 2 | 50 | |
Student Work Load and its Distribution | Type of work | Duration (hours pw) | No of weeks / Number of activity | Hours in total per term | Yüz yüze eğitim | 3 | 15 | 45 | Sınıf dışı çalışma | 1 | 15 | 15 | Arasınav için hazırlık | 2 | 4 | 8 | Arasınav | 2 | 1 | 2 | Proje | 1 | 10 | 10 | Dönem sonu sınavı için hazırlık | 1 | 15 | 15 | Dönem sonu sınavı | 2 | 1 | 2 | Total work load | | | 97 |
|