Türkçe | English
FACULTY of ENGINEERING / DEPARTMENT of COMPUTER ENGINEERING
(30%) English
Course Catalog
https://www.ktu.edu.tr/bilgisayar
Phone: +90 0462 377 2080
MF
FACULTY of ENGINEERING / DEPARTMENT of COMPUTER ENGINEERING / (30%) English
Katalog Ana Sayfa
  Katalog Ana Sayfa  KTÜ Ana Sayfa   Katalog Ana Sayfa
 
 

BIL4004Network and Data Security3+0+0ECTS:4
Year / SemesterSpring Semester
Level of CourseFirst Cycle
Status Elective
DepartmentDEPARTMENT of COMPUTER ENGINEERING
Prerequisites and co-requisitesNone
Mode of DeliveryFace to face
Contact Hours14 weeks - 3 hours of lectures per week
LecturerProf. Dr. Güzin ULUTAŞ
Co-LecturerNone
Language of instructionTurkish
Professional practise ( internship ) None
 
The aim of the course:
To learn the problems of information security and to propose new techniques to deal with these problems
 
Learning OutcomesCTPOTOA
Upon successful completion of the course, the students will be able to :
LO - 1 : To design a new cryptograhic system2,3,4,121
LO - 2 : To determine the vulnerabilities of an existing cryptographic system2,3,4,121
LO - 3 : To evaluate the current cryptographic systems2,3,4,123
LO - 4 : To detect existing security problems of a syatem and to propose a new method to deal with this problem2,3,4,121
LO - 5 : To realize an authentication procedure and to ensure the integrity of data2,3,4,123
CTPO : Contribution to programme outcomes, TOA :Type of assessment (1: written exam, 2: Oral exam, 3: Homework assignment, 4: Laboratory exercise/exam, 5: Seminar / presentation, 6: Term paper), LO : Learning Outcome

 
Contents of the Course
The aims of the ensuring the security of information, the techniques to be used for ensuring the information security, modular arithmetics, linear and quadratic equations, traditional symmetric ciphers, algebric structures, Galois fields, modern symmetric ciphers, AES, DES, asymmetric key ciphers, cryptographic hash functions, digital signatures, key distribution methods
 
Course Syllabus
 WeekSubjectRelated Notes / Files
 Week 1Security goals, attacks, services and mechanism, cryptography, steganography, secret sharing, secret image sharing, watermarking.
 Week 2mathematics of cryptography, integer arithmetic, modular arithmetic, modulo operator, matrices, linear congruence, single variable linear equations.
 Week 3Traditional symmetric key ciphers, kerckhoff's principle, substitution ciphers, monoalphabetic ciphers, polyalphabetic ciphers, trasposition ciphers, keyless and keyed transpoisition ciphers, stream and block ciphers
 Week 4algebraic structures, groups, rings, field, Galois Field, polynomial in GF, using a generator.
 Week 5Introduction to modern symmetric key ciphers, modern block ciphers, componenents of a modern block cipher, s boxes, product ciphers, two classes of product ciphers, modern stream ciphers
 Week 6Data Encryption Standart, DES structure, DES analysis, Multiple DES, Security of DES
 Week 7Advanced Encryption Standart, Transformations, key expansion, ciphers, analyisis of AES
 Week 8Encipherment using modern symmetric key ciphers, ECB, CBC, CFB, OFB, CTR modes, Use of stream ciphers, RC4, A5/1
 Week 9Midterm Exam
 Week 10Primes,cardinality of primes, checking for primeness, euler's phi function, fermat's little theorem, generating primes, primarily testing, deterministic and undeterministic algorithms, factorization, chinese remainder theorem, quadratic congruence, exponentation and logarithm
 Week 11asymmetic key cryptography, RSA cryptosystem, Rabin cryptosystem, ElGamal cryptosystem, Elliptic Curve cryptosystem
 Week 12Message integrity and Message authentication, document and fingerprint, message and message digest, checking integrity, cryptographic hash function criteria, random oracle model, message authentication
 Week 13cryptographic hash functions, iterated hash functions, SHA-512, Whirlpool
 Week 14Digital signature, comparision, process, signing the digest, need for keys, services, message authentication, message integrity, nonrepudiation, confidentiality, attacks on digital signatures, RSA signature scheme, ElGamal signature scheme, Schnorr, DSS, Elliptic Curve Signature scheme
 Week 15Entity authentication, passwords, challenge response, zero knowledge, biometrics, key managements,symmetric key distribution, symmetric key aggrement, public key distribution
 Week 16Final Exam
 
Textbook / Material
1Forouzan, Behrouz, McGraw Hill, 2009, Cryptography and Network Security
 
Recommended Reading
 
Method of Assessment
Type of assessmentWeek NoDate

Duration (hours)Weight (%)
Mid-term exam 9 08/04/2013 2 30
Project 15 21/05/2013 2 20
End-of-term exam 16 28/05/2012 2 50
 
Student Work Load and its Distribution
Type of workDuration (hours pw)

No of weeks / Number of activity

Hours in total per term
Yüz yüze eğitim 3 15 45
Sınıf dışı çalışma 1 15 15
Arasınav için hazırlık 2 4 8
Arasınav 2 1 2
Proje 1 10 10
Dönem sonu sınavı için hazırlık 1 15 15
Dönem sonu sınavı 2 1 2
Total work load97