ECTS - Introduction to Authenticated Encryption
Introduction to Authenticated Encryption (MATH545) Course Detail
Course Name | Course Code | Season | Lecture Hours | Application Hours | Lab Hours | Credit | ECTS |
---|---|---|---|---|---|---|---|
Introduction to Authenticated Encryption | MATH545 | Area Elective | 3 | 0 | 0 | 3 | 5 |
Pre-requisite Course(s) |
---|
N/A |
Course Language | English |
---|---|
Course Type | Elective Courses |
Course Level | Ph.D. |
Mode of Delivery | Face To Face |
Learning and Teaching Strategies | Lecture, Question and Answer, Team/Group. |
Course Lecturer(s) |
|
Course Objectives | This course is designed to introduce the fundamental concepts of symmetric key cryptography and statistical methods in cryptography. |
Course Learning Outcomes |
The students who succeeded in this course;
|
Course Content | Fundamentals of cryptography, block ciphers, DES, AES competition, authentication, mode of operations, cryptographic hash functions, collision resistance, birthday paradox, Merkle Damgard construction, MD5, SHA-1, SHA-3 competition, Keccak, authenticated encryption, CAESAR competition, success probability of cryptanalytic attacks, LLR method, hypot |
Weekly Subjects and Releated Preparation Studies
Week | Subjects | Preparation |
---|---|---|
1 | Fundamentals of cryptography | Book 1: 1-25 |
2 | Fundamentals of cryptography | Book 1: 25-45 |
3 | Block ciphers, mode of operations | Book 1: 223-250 |
4 | DES, AES competition | Book 1: 250-259, Book 2:1-9, Book 2: 81-89 |
5 | Cryptographic Hash Functions, Birthday Paradox, collision resistance | Book 1: 321-376 |
6 | Merkle-Damgard construction, MD5, SHA-1 | Book 1: 321-376 |
7 | SHA-3 competition, Keccak | |
8 | Authentication with mode of operations | Book 3: 93-125 |
9 | Authenticated Encryption | Paper 1, Paper 2 |
10 | Authenticated Encryption Schemes | Book 3: 125-141 |
11 | CAESAR competition | |
12 | Pseudorandom Bits and Sequences, Randomness Tests, hypothesis testing | Book 1: 169-187 |
13 | Differential cryptanalysis, Linear cryptanalysis, DDT, LAT | |
14 | Success probability of cryptanalytic attacks, LLR method, | |
15 | Review | |
16 | Final Exam |
Sources
Course Book | 1. A handbook of applied cryptography, Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone |
---|---|
Other Sources | 2. The Design of Rijndael AES - The Advanced Encryption Standard, Daemen, Joan, Rijmen, Vincent, Springer-Verlag, 2002. |
3. Introduction to Cryptography, J. A. Buchmann, Springer-Verlag, 2000. | |
6. Tez: Analysis and Design of Authenticated Encryption Modes, Elena Andreeva, master thesis. | |
6. Makale 1: OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption, Crypto 2001, Rogaway et. al. | |
6. Makale 2: Authenticated-Encryption with Associated-Data, Phillip Rogaway, http://web.cs.ucdavis.edu/~rogaway/papers/ad.pdf |
Evaluation System
Requirements | Number | Percentage of Grade |
---|---|---|
Attendance/Participation | - | - |
Laboratory | - | - |
Application | - | - |
Field Work | - | - |
Special Course Internship | - | - |
Quizzes/Studio Critics | - | - |
Homework Assignments | 5 | 10 |
Presentation | 1 | 10 |
Project | 1 | 10 |
Report | - | - |
Seminar | - | - |
Midterms Exams/Midterms Jury | 1 | 30 |
Final Exam/Final Jury | 1 | 40 |
Toplam | 9 | 100 |
Percentage of Semester Work | 60 |
---|---|
Percentage of Final Work | 40 |
Total | 100 |
Course Category
Core Courses | X |
---|---|
Major Area Courses | |
Supportive Courses | |
Media and Managment Skills Courses | |
Transferable Skill Courses |
The Relation Between Course Learning Competencies and Program Qualifications
# | Program Qualifications / Competencies | Level of Contribution | ||||
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | ||
1 | Ability to carry out advanced research activities, both individual and as a member of a team | |||||
2 | Ability to evaluate research topics and comment with scientific reasoning | |||||
3 | Ability to initiate and create new methodologies, implement them on novel research areas and topics | |||||
4 | Ability to produce experimental and/or analytical data in systematic manner, discuss and evaluate data to lead scintific conclusions | |||||
5 | Ability to apply scientific philosophy on analysis, modelling and design of engineering systems | |||||
6 | Ability to synthesis available knowledge on his/her domain to initiate, to carry, complete and present novel research at international level | |||||
7 | Contribute scientific and technological advancements on engineering domain of his/her interest area | |||||
8 | Contribute industrial and scientific advancements to improve the society through research activities |
ECTS/Workload Table
Activities | Number | Duration (Hours) | Total Workload |
---|---|---|---|
Course Hours (Including Exam Week: 16 x Total Hours) | 16 | 3 | 48 |
Laboratory | |||
Application | |||
Special Course Internship | |||
Field Work | |||
Study Hours Out of Class | 14 | 2 | 28 |
Presentation/Seminar Prepration | 1 | 9 | 9 |
Project | 1 | 10 | 10 |
Report | |||
Homework Assignments | 5 | 2 | 10 |
Quizzes/Studio Critics | |||
Prepration of Midterm Exams/Midterm Jury | 1 | 10 | 10 |
Prepration of Final Exams/Final Jury | 1 | 10 | 10 |
Total Workload | 125 |