CE 340 | Course Introduction and Application Information

Course Name
Cryptography and Network Security
Code
Semester
Theory
(hour/week)
Application/Lab
(hour/week)
Local Credits
ECTS
CE 340
Fall/Spring
3
0
3
5

Prerequisites
None
Course Language
English
Course Type
Elective
Course Level
First Cycle
Course Coordinator -
Course Lecturer(s)
Assistant(s) -
Course Objectives This course will introduce cryptography theories, algorithms, and systems. It will also consider necessary approaches and techniques to build protection mechanisms in order to secure computer networks
Course Description The students who succeeded in this course;
  • will be able to define threats to computer networks and protection mechanisms and methods needed to thwart these threats,
  • will be able to describe the theory of the fundamental cryptography, encryption, and decryption algorithms,
  • will be able to build simple cryptosystems by applying encryption algorithms with Python,
  • will be able to classify secure identity management (authentication), message authentication, and digital signature techniques,
  • will be able to practice packet generation and observation tools such as Python/scapy and Wireshark.
Course Content To acquaint students with the major cryptography algorithms, systems, functions, and development techniques applied to network security mechanisms, and to introduce literature and terminology used for cryptography and network security.

 



Course Category

Core Courses
X
Major Area Courses
Supportive Courses
Media and Management Skills Courses
Transferable Skill Courses

 

WEEKLY SUBJECTS AND RELATED PREPARATION STUDIES

Week Subjects Related Preparation
1 Fundamental Concepts Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch1.1 pp. 1-14
2 Cryptographic Concepts Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch1.2 pp. 19-31
3 Symmetric Cryptography Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.1 pp. 53-68
4 Publi-Key Cryptography Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.2 pp. 72-81
5 Cryptographic Hash Functions Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.3-Ch2.4 pp. 83-88
6 Digital Signatures Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.4-Ch2.5 pp. 89-97
7 Operating Systems Security Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch3 pp. 111-157
8 Malicious Software Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch4 pp. 167-208
9 Network Security Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch5.1-Ch5.2 pp. 215-227
10 Network Security Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch5.3-Ch5.6 pp. 230-256
11 Network Services & Security Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch6 pp. 261-310
12 Browser Security Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch7 pp. 319-372
13 Security Models & Practice Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch9 pp. 435-474
14 Project Presentations -
15 Project Presentations
16 Final Examination

 

Course Notes/Textbooks Introduction to Computer Security - M. T. Goodrich and R. Tamassia, © 2011 | Pearson Prentice Hall | ISBN-13: 978-0-321-70201-2, ISBN-10: 0-321-70201-8
Suggested Readings/Materials Information Security Lecture Notes: Süleyman Kondakcı

 

EVALUATION SYSTEM

Semester Activities Number Weigthing
Participation
16
10
Laboratory / Application
Field Work
Quizzes / Studio Critiques
Homework / Assignments
Presentation / Jury
Project
2
60
Seminar / Workshop
Oral Exams
Midterm
Final Exam
1
30
Total

Weighting of Semester Activities on the Final Grade
18
70
Weighting of End-of-Semester Activities on the Final Grade
1
30
Total

ECTS / WORKLOAD TABLE

Semester Activities Number Duration (Hours) Workload
Theoretical Course Hours
(Including exam week: 16 x total hours)
16
1
16
Laboratory / Application Hours
(Including exam week: 16 x total hours)
16
2
Study Hours Out of Class
10
2
Field Work
Quizzes / Studio Critiques
Homework / Assignments
Presentation / Jury
Project
2
27
Seminar / Workshop
Oral Exam
Midterms
Final Exam
1
28
    Total
150

 

COURSE LEARNING OUTCOMES AND PROGRAM QUALIFICATIONS RELATIONSHIP

#
Program Competencies/Outcomes
* Contribution Level
1
2
3
4
5
1

To have adequate knowledge in Mathematics, Science, Computer Science and Software Engineering; to be able to use theoretical and applied information in these areas on complex engineering problems.

X
2

To be able to identify, define, formulate, and solve complex Software Engineering problems; to be able to select and apply proper analysis and modeling methods for this purpose.

X
3

To be able to design, implement, verify, validate, document, measure and maintain a complex software system, process, or product under realistic constraints and conditions, in such a way as to meet the requirements; ability to apply modern methods for this purpose.

X
4

To be able to devise, select, and use modern techniques and tools needed for analysis and solution of complex problems in software engineering applications; to be able to use information technologies effectively.

X
5

To be able to design and conduct experiments, gather data, analyze and interpret results for investigating complex Software Engineering problems.

X
6

To be able to work effectively in Software Engineering disciplinary and multi-disciplinary teams; to be able to work individually.

X
7

To be able to communicate effectively in Turkish, both orally and in writing; to be able to author and comprehend written reports, to be able to prepare design and implementation reports, to be able to present effectively, to be able to give and receive clear and comprehensible instructions.

8

To have knowledge about global and social impact of engineering practices and software applications on health, environment, and safety; to have knowledge about contemporary issues as they pertain to engineering; to be aware of the legal ramifications of Engineering and Software Engineering solutions.

9

To be aware of ethical behavior, professional and ethical responsibility; to have knowledge about standards utilized in engineering applications.

10

To have knowledge about industrial practices such as project management, risk management, and change management; to have awareness of entrepreneurship and innovation; to have knowledge about sustainable development.

11

To be able to collect data in the area of Software Engineering, and to be able to communicate with colleagues in a foreign language.

X
12

To be able to speak a second foreign language at a medium level of fluency efficiently.

X
13

To recognize the need for lifelong learning; to be able to access information, to be able to stay current with developments in science and technology; to be able to relate the knowledge accumulated throughout the human history to Software Engineering.

X

*1 Lowest, 2 Low, 3 Average, 4 High, 5 Highest