ECTS - Introduction to Authenticated Encryption

Introduction to Authenticated Encryption (MATH545) Course Detail

Course Name Course Code Season Lecture Hours Application Hours Lab Hours Credit ECTS
Introduction to Authenticated Encryption MATH545 Area Elective 3 0 0 3 5
Pre-requisite Course(s)
N/A
Course Language English
Course Type Elective Courses
Course Level Ph.D.
Mode of Delivery Face To Face
Learning and Teaching Strategies Lecture, Question and Answer, Team/Group.
Course Coordinator
Course Lecturer(s)
Course Assistants
Course Objectives This course is designed to introduce the fundamental concepts of symmetric key cryptography and statistical methods in cryptography.
Course Learning Outcomes The students who succeeded in this course;
  • understand the fundamentals of symmetric key cryptography
  • understand the basic concepts of block ciphers
  • understand the basic concepts of authenticated encryption
  • understand the basic concepts of cryptographic hash functions
  • know the symmetric key competitions
  • understand the statistical methods in cryptograhy
Course Content Fundamentals of cryptography, block ciphers, DES, AES competition, authentication, mode of operations, cryptographic hash functions, collision resistance, birthday paradox, Merkle Damgard construction, MD5, SHA-1, SHA-3 competition, Keccak, authenticated encryption, CAESAR competition, success probability of cryptanalytic attacks, LLR method, hypot

Weekly Subjects and Releated Preparation Studies

Week Subjects Preparation
1 Fundamentals of cryptography Book 1: 1-25
2 Fundamentals of cryptography Book 1: 25-45
3 Block ciphers, mode of operations Book 1: 223-250
4 DES, AES competition Book 1: 250-259, Book 2:1-9, Book 2: 81-89
5 Cryptographic Hash Functions, Birthday Paradox, collision resistance Book 1: 321-376
6 Merkle-Damgard construction, MD5, SHA-1 Book 1: 321-376
7 SHA-3 competition, Keccak
8 Authentication with mode of operations Book 3: 93-125
9 Authenticated Encryption Paper 1, Paper 2
10 Authenticated Encryption Schemes Book 3: 125-141
11 CAESAR competition
12 Pseudorandom Bits and Sequences, Randomness Tests, hypothesis testing Book 1: 169-187
13 Differential cryptanalysis, Linear cryptanalysis, DDT, LAT
14 Success probability of cryptanalytic attacks, LLR method,
15 Review
16 Final Exam

Sources

Course Book 1. A handbook of applied cryptography, Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
Other Sources 2. The Design of Rijndael AES - The Advanced Encryption Standard, Daemen, Joan, Rijmen, Vincent, Springer-Verlag, 2002.
3. Introduction to Cryptography, J. A. Buchmann, Springer-Verlag, 2000.
6. Tez: Analysis and Design of Authenticated Encryption Modes, Elena Andreeva, master thesis.
6. Makale 1: OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption, Crypto 2001, Rogaway et. al.
6. Makale 2: Authenticated-Encryption with Associated-Data, Phillip Rogaway, http://web.cs.ucdavis.edu/~rogaway/papers/ad.pdf

Evaluation System

Requirements Number Percentage of Grade
Attendance/Participation - -
Laboratory - -
Application - -
Field Work - -
Special Course Internship - -
Quizzes/Studio Critics - -
Homework Assignments 5 10
Presentation 1 10
Project 1 10
Report - -
Seminar - -
Midterms Exams/Midterms Jury 1 30
Final Exam/Final Jury 1 40
Toplam 9 100
Percentage of Semester Work 60
Percentage of Final Work 40
Total 100

Course Category

Core Courses X
Major Area Courses
Supportive Courses
Media and Managment Skills Courses
Transferable Skill Courses

The Relation Between Course Learning Competencies and Program Qualifications

# Program Qualifications / Competencies Level of Contribution
1 2 3 4 5
1 Is independently able to build a problem in the area of study, solve the problem by developing solution techniques and assess the solutions. X
2 Is capable of creating a groundwork in the fundamental branches of mathematics as well as in his/her research area X
3 follows the latest national and international literature in Mathematics and in his/her area of research; and uses them in his/her related studies X
4 observes and adopts the scientific ethical values in his/her professional and social life X
5 presents in Turkish and English in academic/scientific events the results of his/her research or the latest studies and findings on a special topic and participates in discussions X
6 Develops skills to work independently or as a member of a team X
7 Develops competences in the areas of creative and critical thinking, problem solving and producing original studies. Follows recent scientific studies, is capable of making an analysis, synthesis and assessment of the knowledge acquired X
8 Is open to lifelong improvement of his/her acquired knowledge, skills and competences. X
9 Is able to apply the acquired knowledge and problem-solving skills to interdisciplinary studies, proposes different solution methods to problems in terms of mathematical models and from a mathematical point of view X
10 Uses the mathematical based softwares, informatics and communication technologies for scientific purposes X

ECTS/Workload Table

Activities Number Duration (Hours) Total Workload
Course Hours (Including Exam Week: 16 x Total Hours) 16 3 48
Laboratory
Application
Special Course Internship
Field Work
Study Hours Out of Class 14 2 28
Presentation/Seminar Prepration 1 9 9
Project 1 10 10
Report
Homework Assignments 5 2 10
Quizzes/Studio Critics
Prepration of Midterm Exams/Midterm Jury 1 10 10
Prepration of Final Exams/Final Jury 1 10 10
Total Workload 125