Skip to main content

CryptologyLaajuus (5 cr)

Code: 5051156

Credits

5 op

Objective

After completing the course the student:
is familiar with the basic concepts and principles of cryptology
understands some mathematical backgrounds of cryptography
knows how symmetric and asymmetric ciphers function
can explain the workings of some cryptographic applications

Content

• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications

Qualifications

Basics of Mathematical Analysis, Number Theory and Algorithmics

Enrollment

01.06.2024 - 08.09.2024

Timing

02.09.2024 - 18.12.2024

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Engineering and Business

Campus

Kupittaa Campus

Teaching languages
  • English
Seats

20 - 40

Degree programmes
  • Degree Programme in Information and Communication Technology
Teachers
  • Paula Steinby
Groups
  • ICTMODembeddedSem
  • VAVA2425
  • ICTMODictprojSem

Objective

After completing the course the student:
is familiar with the basic concepts and principles of cryptology
understands some mathematical backgrounds of cryptography
knows how symmetric and asymmetric ciphers function
can explain the workings of some cryptographic applications

Content

• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications

Location and time

September – December 2018.

Materials

Lecture notes, exercises, various internet sources, links & descriptions are provided in Itslearning.

Understanding Cryptography by C. Paar and J. Pelz (Springer, 2010). Available in the library. Some chapters are available for free online.

Teaching methods

Classroom activities, group work and independent work; project work, task-based (homework).

Exam schedules

TBA

International connections

The contents of the course give understanding of the basic cryptographic tools and devices which are essential in the operating environment of an ICT engineer, such as all electronic and wireless communications, e-commerce applications etc.

Students will team up for a project work on some current and relevant aspect of cryptology. The teams will present their work to the whole group, which gives everyone a broader understanding on the topic.

Task-based assessment supports learning and is continuous throughout the course. Studying in an international group develops students’ ability to intercultural communication and multicultural collaboration.

Completion alternatives

-

Student workload

Classroom activities participation + preparation 35 h
Homework 35 h
Project work 50 h
Final exam + preparation 15 h

Content scheduling

• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications

September - December 2024

Further information

For timetables, see lukkari.turkuamk.fi.
Other practical information & materials available in Itslearning.

Evaluation scale

H-5

Assessment methods and criteria

Weekly classroom activities + homework 50 %.
Project report and presentation 25 %.
Final exam 25 %. (A written exam on specified material.)

You need to achieve 40 % of total points to pass the course.
Additionally, you need to
1. attain 75 % active classroom attendance + participate in a project
OR
2. attain at least 40 % of the final exam.

Assessment criteria, fail (0)

Student has not demonstrated achieving the learning objectives of the course. They recognize and can use only few of the concepts of the course topics, and show no skills to apply them.

Student has not achieved 40 % of total points OR met one of the conditions 1. or 2. to pass the course.

Assessment criteria, satisfactory (1-2)

Student has demonstrated having achieved the learning objectives of the course on satisfactory level. They recognize and can to some extent use most of the concepts of the course topics.

Assessment criteria, good (3-4)

Student has demonstrated having achieved the learning objectives of the course well.
They recognize and can use most of the concepts of the course topics, and are able to apply them on various study and work contexts.

Assessment criteria, excellent (5)

Student has demonstrated having achieved the learning objectives of the course on excellent level. They master the concepts of the course topics, and are able to fluently apply them on study and work contexts.

Qualifications

Basics of Mathematical Analysis, Number Theory and Algorithmics

Enrollment

13.12.2023 - 01.02.2024

Timing

22.01.2024 - 30.04.2024

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Engineering and Business

Campus

Kupittaa Campus

Teaching languages
  • English
Seats

0 - 35

Degree programmes
  • Degree Programme in Information and Communication Technology
Teachers
  • Ali Khan
Groups
  • ICTMODembeddedSem
  • VAVA2324

Objective

After completing the course the student:
is familiar with the basic concepts and principles of cryptology
understands some mathematical backgrounds of cryptography
knows how symmetric and asymmetric ciphers function
can explain the workings of some cryptographic applications

Content

• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications

Location and time

September – December 2018.

Materials

Understanding Cryptography by C. Paar and J. Pelz (Springer, 2010). Available in the library. Some chapters are available for free online.
Various internet sources, links & descriptions are provided in Itslearning.

Teaching methods

Classroom activities, group work and independent work; project work, task-based (homework).

Exam schedules

Exam dates will be published on ItsLearning

International connections

The contents of the course give understanding of the basic cryptographic tools and devices which are essential in the operating environment of an ICT engineer, such as all electronic and wireless communications, e-commerce applications etc.
Students will team up for a project work on some current and relevant aspect of cryptology. The teams will share their work to the whole group, which gives everyone a broader understanding on the topic.
Task-based assessment supports learning and is continuous throughout the course. Studying in an international group develops students’ ability to intercultural communication and multicultural collaboration.

Completion alternatives

By Exam:
If you choose to take the exam, your grading will be based on the following criteria:

Exercises: 40%
Project: 20%
Final Exam: 40%

By Assignments:
If you choose to complete the course by assignments then the following grading will be followed:

Exercises: 80%
Project: 20%

Regardless of the option you choose, we will follow the grading scale below:

Below 40%: F
40-59%: 1
60-79%: 2
80-85%: 3
86-90%: 4
90-100%: 5

.

Student workload

Classroom activities participation
Homework
Project work
Final exam (optional)

Content scheduling

• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications

January – April 2024.

Further information

Timetables in lukkari.turkuamk.fi.
Other practical information & materials in Itslearning.

Evaluation scale

H-5

Assessment methods and criteria

If you choose to take the exam, your grading will be based on the following criteria:

Exercises: 40%
Project: 20%
Final Exam: 40%

Otherwise, the grading will be as follows:

Exercises: 80%
Project: 20%

Regardless of the option you choose, we will follow the grading scale below:

Below 40%: F
40-59%: 1
60-79%: 2
80-85%: 3
86-90%: 4
90-100%: 5

.

Assessment criteria, fail (0)

Below 40%: F

Assessment criteria, satisfactory (1-2)

40-59%: 1
60-79%: 2

Assessment criteria, good (3-4)

80-85%: 3
86-90%: 4

Assessment criteria, excellent (5)

90-100%: 5

Qualifications

Basics of Mathematical Analysis, Number Theory and Algorithmics

Enrollment

01.12.2022 - 19.01.2023

Timing

10.01.2023 - 30.04.2023

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Engineering and Business

Campus

Kupittaa Campus

Teaching languages
  • English
Seats

20 - 40

Degree programmes
  • Degree Programme in Information and Communication Technology
Teachers
  • Paula Steinby
Groups
  • VAVA2223
  • PTIVIS21
  • PINFOS21

Objective

After completing the course the student:
is familiar with the basic concepts and principles of cryptology
understands some mathematical backgrounds of cryptography
knows how symmetric and asymmetric ciphers function
can explain the workings of some cryptographic applications

Content

• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications

Location and time

September – December 2018.

Materials

Understanding Cryptography by C. Paar and J. Pelz (Springer, 2010). Available in the library. Some chapters are available for free online.
Various internet sources, links & descriptions are provided in Itslearning.

Teaching methods

Classroom activities, group work and independent work; project work, task-based (homework).

Exam schedules

TBA

International connections

The contents of the course give understanding of the basic cryptographic tools and devices which are essential in the operating environment of an ICT engineer, such as all electronic and wireless communications, e-commerce applications etc.
Students will team up for a project work on some current and relevant aspect of cryptology. The teams will share their work to the whole group, which gives everyone a broader understanding on the topic.
Task-based assessment supports learning and is continuous throughout the course. Studying in an international group develops students’ ability to intercultural communication and multicultural collaboration.

Completion alternatives

-

Student workload

Classroom activities participation
Homework
Project work
Final exam

Content scheduling

• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications

January – April 2023.

Further information

Timetables in lukkari.turkuamk.fi.
Other practical information & materials in Itslearning.

Evaluation scale

H-5

Assessment methods and criteria

Classroom activities + homework 50 %.
Project report and presentation 20 %.
Final exam 30 %. A written exam (1,5 hrs) on specified material.

You need to achieve 40 % of total points and 40 % of the final exam points to pass the course.

.

Qualifications

Basics of Mathematical Analysis, Number Theory and Algorithmics

Enrollment

01.12.2021 - 19.01.2022

Timing

10.01.2022 - 30.04.2022

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Engineering and Business

Campus

Kupittaa Campus

Teaching languages
  • English
Seats

20 - 40

Degree programmes
  • Degree Programme in Information and Communication Technology
  • Degree Programme in Information and Communications Technology
Teachers
  • Paula Steinby
Groups
  • PINFOS20
  • PTIVIS20
  • VAVA2122

Objective

After completing the course the student:
is familiar with the basic concepts and principles of cryptology
understands some mathematical backgrounds of cryptography
knows how symmetric and asymmetric ciphers function
can explain the workings of some cryptographic applications

Content

• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications

Location and time

September – December 2018.

Materials

Understanding Cryptography by C. Paar and J. Pelz (Springer, 2010). Some chapters of it are available for free.
Various internet sources, links & descriptions are provided in Itslearning.

Teaching methods

Online activities, group work and independent work; project work, task-based (homework).

International connections

The contents of the course give understanding of the basic cryptographic tools and devices which are essential in the operating environment of an ICT engineer, such as all electronic and wireless communications, e-commerce applications etc.
Students will team up for a project work on some current and relevant aspect of cryptology. The teams will share their work to the whole group, which gives everyone a broader understanding on the topic.
Task-based assessment supports learning and is continuous throughout the course. Studying in an international group develops students’ ability to intercultural communication and multicultural collaboration.

Completion alternatives

Online implementation

Student workload

Online activities participation
Working on homework sets
Project work
Final exam: Preparing for and taking the final exam

Content scheduling

• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications

January – April 2022.

Further information

All practical information on timetables, project work, grading etc., as well as links to web materials are provided in Itslearning.

Evaluation scale

H-5

Assessment methods and criteria

Homework 50 %. Homework consists of weekly homework sets exercises based on reading material and classroom activities and notes.
Project report and presentation 20 %.
Final exam 30 %. A written exam (1,5 hrs) on specified material.
You need to achieve 40 % of total points and 40 % of the final exam points to pass the course.
.

Qualifications

Basics of Mathematical Analysis, Number Theory and Algorithmics