ECTS - Introduction to Authenticated Encryption

Introduction to Authenticated Encryption (MATH545) Course Detail

Course Name Course Code Season Lecture Hours Application Hours Lab Hours Credit ECTS
Introduction to Authenticated Encryption MATH545 Area Elective 3 0 0 3 5
Pre-requisite Course(s)
N/A
Course Language English
Course Type Elective Courses
Course Level Ph.D.
Mode of Delivery Face To Face
Learning and Teaching Strategies Lecture, Question and Answer, Team/Group.
Course Coordinator
Course Lecturer(s)
Course Assistants
Course Objectives This course is designed to introduce the fundamental concepts of symmetric key cryptography and statistical methods in cryptography.
Course Learning Outcomes The students who succeeded in this course;
  • understand the fundamentals of symmetric key cryptography
  • understand the basic concepts of block ciphers
  • understand the basic concepts of authenticated encryption
  • understand the basic concepts of cryptographic hash functions
  • know the symmetric key competitions
  • understand the statistical methods in cryptograhy
Course Content Fundamentals of cryptography, block ciphers, DES, AES competition, authentication, mode of operations, cryptographic hash functions, collision resistance, birthday paradox, Merkle Damgard construction, MD5, SHA-1, SHA-3 competition, Keccak, authenticated encryption, CAESAR competition, success probability of cryptanalytic attacks, LLR method, hypot

Weekly Subjects and Releated Preparation Studies

Week Subjects Preparation
1 Fundamentals of cryptography Book 1: 1-25
2 Fundamentals of cryptography Book 1: 25-45
3 Block ciphers, mode of operations Book 1: 223-250
4 DES, AES competition Book 1: 250-259, Book 2:1-9, Book 2: 81-89
5 Cryptographic Hash Functions, Birthday Paradox, collision resistance Book 1: 321-376
6 Merkle-Damgard construction, MD5, SHA-1 Book 1: 321-376
7 SHA-3 competition, Keccak
8 Authentication with mode of operations Book 3: 93-125
9 Authenticated Encryption Paper 1, Paper 2
10 Authenticated Encryption Schemes Book 3: 125-141
11 CAESAR competition
12 Pseudorandom Bits and Sequences, Randomness Tests, hypothesis testing Book 1: 169-187
13 Differential cryptanalysis, Linear cryptanalysis, DDT, LAT
14 Success probability of cryptanalytic attacks, LLR method,
15 Review
16 Final Exam

Sources

Course Book 1. A handbook of applied cryptography, Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
Other Sources 2. The Design of Rijndael AES - The Advanced Encryption Standard, Daemen, Joan, Rijmen, Vincent, Springer-Verlag, 2002.
3. Introduction to Cryptography, J. A. Buchmann, Springer-Verlag, 2000.
6. Tez: Analysis and Design of Authenticated Encryption Modes, Elena Andreeva, master thesis.
6. Makale 1: OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption, Crypto 2001, Rogaway et. al.
6. Makale 2: Authenticated-Encryption with Associated-Data, Phillip Rogaway, http://web.cs.ucdavis.edu/~rogaway/papers/ad.pdf

Evaluation System

Requirements Number Percentage of Grade
Attendance/Participation - -
Laboratory - -
Application - -
Field Work - -
Special Course Internship - -
Quizzes/Studio Critics - -
Homework Assignments 5 10
Presentation 1 10
Project 1 10
Report - -
Seminar - -
Midterms Exams/Midterms Jury 1 30
Final Exam/Final Jury 1 40
Toplam 9 100
Percentage of Semester Work 60
Percentage of Final Work 40
Total 100

Course Category

Core Courses X
Major Area Courses
Supportive Courses
Media and Managment Skills Courses
Transferable Skill Courses

The Relation Between Course Learning Competencies and Program Qualifications

# Program Qualifications / Competencies Level of Contribution
1 2 3 4 5
1 Alanında, bağımsız olarak, bir problem kurgulayabilir, çözüm yöntemi geliştirerek problemi çözebilir ve sonuçları değerlendirebilir X
2 Matematiğin temel alanlarında ve kendi uzmanlığı olarak seçtiği alanda gerekli alt yapıyı oluşturur. X
3 Matematik literatürünü ve özel olarak kendi araştırma konusu ile ilgili ulusal ve uluslararası güncel yayınları takip edebilir ve bunlardan kendi araştırma konusu ile ilgili olanları çalışmalarında kullanabilir X
4 Bilimsel etik değerleri ve kuralları dikkate alır ve mesleki ve toplumsal yaşamda kullanabilir X
5 Kendi çalışmalarının sonuçlarını veya belli bir konudaki güncel çalışmaları ve bulguları, çeşitli bilimsel toplantılarda topluluk önünde Türkçe ve İngilizce olarak sunabilir ve tartışmalara katılabilir. X
6 Gerek bireysel, gerek bir çalışma grubunun üyesi olarak çalışabilme becerisini geliştirir X
7 Yaratıcı ve eleştirel düşünme, problem çözme, özgün bir çalışma üretme becerisini geliştirir. Bilimsel gelişmeleri takip eder, özümsediği bilgilerin analiz, sentez ve değerlendirmesini yapabilir. X
8 Kazandığı bilgi, beceri ve yetkinlikleri yaşam boyu geliştirmeye açık olur. X
9 Alanında özümsediği bilgiyi ve problem çözme yeteneğini disiplinler arası çalışmalarda uygulayabilir; karşılaşılan problemleri matematiksel modellerle ifade ederek, matematiksel bakış açısı ile farklı çözüm yöntemleri önerir. X
10 Matematik temelli yazılımları, bilişim ve iletişim teknolojilerini bilimsel amaçlı kullanabilir. X

ECTS/Workload Table

Activities Number Duration (Hours) Total Workload
Course Hours (Including Exam Week: 16 x Total Hours) 16 3 48
Laboratory
Application
Special Course Internship
Field Work
Study Hours Out of Class 14 2 28
Presentation/Seminar Prepration 1 9 9
Project 1 10 10
Report
Homework Assignments 5 2 10
Quizzes/Studio Critics
Prepration of Midterm Exams/Midterm Jury 1 10 10
Prepration of Final Exams/Final Jury 1 10 10
Total Workload 125