ECTS - Introduction to Authenticated Encryption

Introduction to Authenticated Encryption (MATH545) Course Detail

Course Name Course Code Season Lecture Hours Application Hours Lab Hours Credit ECTS
Introduction to Authenticated Encryption MATH545 Area Elective 3 0 0 3 5
Pre-requisite Course(s)
N/A
Course Language English
Course Type Elective Courses
Course Level Natural & Applied Sciences Master's Degree
Mode of Delivery Face To Face
Learning and Teaching Strategies Lecture, Question and Answer, Team/Group.
Course Coordinator
Course Lecturer(s)
Course Assistants
Course Objectives This course is designed to introduce the fundamental concepts of symmetric key cryptography and statistical methods in cryptography.
Course Learning Outcomes The students who succeeded in this course;
  • understand the fundamentals of symmetric key cryptography
  • understand the basic concepts of block ciphers
  • understand the basic concepts of authenticated encryption
  • understand the basic concepts of cryptographic hash functions
  • know the symmetric key competitions
  • understand the statistical methods in cryptograhy
Course Content Fundamentals of cryptography, block ciphers, DES, AES competition, authentication, mode of operations, cryptographic hash functions, collision resistance, birthday paradox, Merkle Damgard construction, MD5, SHA-1, SHA-3 competition, Keccak, authenticated encryption, CAESAR competition, success probability of cryptanalytic attacks, LLR method, hypot

Weekly Subjects and Releated Preparation Studies

Week Subjects Preparation
1 Fundamentals of cryptography Book 1: 1-25
2 Fundamentals of cryptography Book 1: 25-45
3 Block ciphers, mode of operations Book 1: 223-250
4 DES, AES competition Book 1: 250-259, Book 2:1-9, Book 2: 81-89
5 Cryptographic Hash Functions, Birthday Paradox, collision resistance Book 1: 321-376
6 Merkle-Damgard construction, MD5, SHA-1 Book 1: 321-376
7 SHA-3 competition, Keccak
8 Authentication with mode of operations Book 3: 93-125
9 Authenticated Encryption Paper 1, Paper 2
10 Authenticated Encryption Schemes Book 3: 125-141
11 CAESAR competition
12 Pseudorandom Bits and Sequences, Randomness Tests, hypothesis testing Book 1: 169-187
13 Differential cryptanalysis, Linear cryptanalysis, DDT, LAT
14 Success probability of cryptanalytic attacks, LLR method,
15 Review
16 Final Exam

Sources

Course Book 1. A handbook of applied cryptography, Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
Other Sources 2. The Design of Rijndael AES - The Advanced Encryption Standard, Daemen, Joan, Rijmen, Vincent, Springer-Verlag, 2002.
3. Introduction to Cryptography, J. A. Buchmann, Springer-Verlag, 2000.
6. Tez: Analysis and Design of Authenticated Encryption Modes, Elena Andreeva, master thesis.
6. Makale 1: OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption, Crypto 2001, Rogaway et. al.
6. Makale 2: Authenticated-Encryption with Associated-Data, Phillip Rogaway, http://web.cs.ucdavis.edu/~rogaway/papers/ad.pdf

Evaluation System

Requirements Number Percentage of Grade
Attendance/Participation - -
Laboratory - -
Application - -
Field Work - -
Special Course Internship - -
Quizzes/Studio Critics - -
Homework Assignments 5 10
Presentation 1 10
Project 1 10
Report - -
Seminar - -
Midterms Exams/Midterms Jury 1 30
Final Exam/Final Jury 1 40
Toplam 9 100
Percentage of Semester Work 60
Percentage of Final Work 40
Total 100

Course Category

Core Courses
Major Area Courses
Supportive Courses X
Media and Managment Skills Courses
Transferable Skill Courses

The Relation Between Course Learning Competencies and Program Qualifications

# Program Qualifications / Competencies Level of Contribution
1 2 3 4 5
1 Has the ability to apply scientific knowledge gained in the undergraduate education and to expand and extend knowledge in the same or in a different area.
2 Has the ability to obtain, to evaluate, to interpret and to apply information by doing scientific research.
3 Can apply gained knowledge and problem solving abilities in inter-disciplinary research.
4 Has the ability to work independently within research area, to state the problem, to develop solution techniques, to solve the problem, to evaluate the obtained results and to apply them when necessary.
5 Takes responsibility individually and as a team member to improve systematic approaches to produce solutions in unexpected complicated situations related to the area of study.
6 Can develop strategies, implement plans and principles on the area of study and can evaluate obtained results within the framework.
7 Can develop and extend the knowledge in the area and to use them with scientific, social and ethical responsibility.
8 Has the ability to follow recent developments within the area of research, to support research with scientific arguments and data, to communicate the information on the area of expertise in a systematically by means of written report and oral/visual presentation.
9 Has proficiency in English language and has the ability to communicate with colleagues and to follow the innovations in mathematics and related fields.
10 Has software and hardware knowledge in the area of expertise, and has proficient information and communication technology knowledge.
11 Has professional ethical consciousness and responsibility which takes into account the universal and social dimensions in the process of data collection, interpretation, implementation and declaration of results in mathematics and its applications.

ECTS/Workload Table

Activities Number Duration (Hours) Total Workload
Course Hours (Including Exam Week: 16 x Total Hours) 16 3 48
Laboratory
Application
Special Course Internship
Field Work
Study Hours Out of Class 14 2 28
Presentation/Seminar Prepration 1 9 9
Project 1 10 10
Report
Homework Assignments 5 2 10
Quizzes/Studio Critics
Prepration of Midterm Exams/Midterm Jury 1 10 10
Prepration of Final Exams/Final Jury 1 10 10
Total Workload 125