|
Language of Instruction
|
Turkish
|
|
Level of Course Unit
|
Bachelor's Degree
|
|
Department / Program
|
Computer Engineering
|
|
Type of Program
|
Formal Education
|
|
Type of Course Unit
|
Elective
|
|
Course Delivery Method
|
Face To Face
|
|
Objectives of the Course
|
The aim of this course is to introduce the fundamental concepts of cryptology and its historical development, and to present the mathematical foundations, algorithmic structures, and engineering applications of classical, modern, and public-key encryption methods in a clear and accessible manner. Within the scope of the course, students are expected to examine encryption and decryption processes through mathematical modeling and analytical problem-solving approaches, and to evaluate the security assumptions and potential weaknesses of different cryptographic methods. In addition, by addressing modern cryptographic systems in terms of key management, security level, and computational complexity, the course aims to develop a systematic and critical perspective on cryptographic methods. The course content will be supported with example applications and problem-solving activities.
|
|
Course Content
|
The scope of the course includes the definition of cryptology, its historical development, and basic terminology; the fundamental principles, design approaches, and evaluation criteria of cryptographic systems, as well as a conceptual comparison of symmetric and asymmetric encryption approaches. Encryption and decryption processes, the concept of cryptanalysis, attack models, and evaluation criteria are addressed within the main framework of the course. In addition, an introduction to the concept of digital signatures is provided, and current application areas of cryptography are presented.
The course emphasizes the mathematical foundations of cryptography, including modular arithmetic, relative primality, the concept of modular inverses, and matrices. Among classical encryption methods, Caesar, shift, affine, and Atbash ciphers are examined; within polyalphabetic substitution methods, the Vigenère cipher and the effect of key length on security are discussed; and within transposition-based methods, route, rail fence (sequence), and rectangular transposition ciphers are covered.
As a matrix-based encryption approach, the Hill cipher is analyzed in terms of key selection, invertibility conditions, and basic security considerations. Block-based classical methods such as the Playfair and Four-Square ciphers are also examined, together with their structural weaknesses. In the later part of the course, more advanced classical encryption approaches such as ADFGX and ADFGVX are discussed, along with modern block cipher methods including the DES and AES algorithms. Public-key cryptographic systems, specifically the RSA and El-Gamal algorithms, are addressed with respect to their mathematical foundations, security assumptions, and general characteristics.
|
|
Course Methods and Techniques
|
|
|
Prerequisites and co-requisities
|
None
|
|
Course Coordinator
|
Asist Prof. Fatma Zehra UZEKMEK
|
|
Name of Lecturers
|
Asist Prof. Fatma Zehra UZEKMEK
|
|
Assistants
|
None
|
|
Work Placement(s)
|
No
|
Recommended or Required Reading
|
Resources
|
Leung, L. R. N., Introduction to Cryptography with Coding Theory, Pearson Education, 2019. Banoth, R., & Regar, R., Classical and Modern Cryptography for Beginners, Springer, 2023. Klima, R. E., & Sigmon, N. P., Cryptology: Classical and Modern, 2nd Edition, CRC Press, 2019.
|
|
Course Notes
|
1. Narration 2. Question and Answer 3. Discussion 4. Practice and Application 5. Problem Solving
|
|
Exams
|
1 Ara sınav, 1 Final sınavı
|
Course Category
|
Mathematics and Basic Sciences
|
%100
|
|
|
Engineering
|
%30
|
|
|
Engineering Design
|
%0
|
|
|
Social Sciences
|
%0
|
|
|
Education
|
%0
|
|
|
Science
|
%0
|
|
|
Health
|
%0
|
|
|
Field
|
%0
|
|
|