CryptologyLaajuus (5 cr)
Code: 5051156
Credits
5 op
Objective
After completing the course the student:
is familiar with the basic concepts and principles of cryptology
understands some mathematical backgrounds of cryptography
knows how symmetric and asymmetric ciphers function
can explain the workings of some cryptographic applications
Content
• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications
Qualifications
Basics of Mathematical Analysis, Number Theory and Algorithmics
Enrollment
01.06.2024 - 08.09.2024
Timing
02.09.2024 - 18.12.2024
Number of ECTS credits allocated
5 op
Mode of delivery
Contact teaching
Unit
Engineering and Business
Campus
Kupittaa Campus
Teaching languages
- English
Seats
20 - 40
Degree programmes
- Degree Programme in Information and Communication Technology
- Degree Programme in Information and Communications Technology
Teachers
- Paula Steinby
Groups
-
ICTMODembeddedSem
-
VAVA2425
-
ICTMODictprojSem
Objective
After completing the course the student:
is familiar with the basic concepts and principles of cryptology
understands some mathematical backgrounds of cryptography
knows how symmetric and asymmetric ciphers function
can explain the workings of some cryptographic applications
Content
• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications
Location and time
September – December 2018.
Materials
Lecture notes, exercises, various internet sources, links & descriptions are provided in Itslearning.
A Graduate Course in Applied Cryptography by D. Boneh and V. Shoup (Version 0.6, January 2023). Available online: https://toc.cryptobook.us/book.pdf
Understanding Cryptography by C. Paar and J. Pelz (Springer, 2010). Available in the library. Some chapters are available for free online.
Teaching methods
Classroom activities, group work and independent work; project work, task-based (homework).
Exam schedules
Final exam 10.12.2024
International connections
The contents of the course give understanding of the basic cryptographic tools and devices which are essential in the operating environment of an ICT engineer, such as all electronic and wireless communications, e-commerce applications etc.
Students will team up for a project work on some current and relevant aspect of cryptology. The teams will present their work to the whole group, which gives everyone a broader understanding on the topic.
Task-based assessment supports learning and is continuous throughout the course. Studying in an international group develops students’ ability to intercultural communication and multicultural collaboration.
Completion alternatives
You get points from the homework, the project work, and the final exam.
Homework points are granted only when it's done properly and submitted in time in the respective Itslearning HW box.
Project work points are granted separately from the report and the presentation.
There is no way to compensate for missing a homework deadline or the project work submission deadline.
To pass the course, you need to gain at least 40 % of the total points
and either
a) at least 40 % of the final exam points
or
b) 75 % classroom attendance and an approved project participation.
Student workload
Classroom activities participation + preparation 40 h
Homework 40 h
Project work 30 h
Final exam + preparation 15 h
Content scheduling
• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications
September - December 2024
Further information
For timetables, see lukkari.turkuamk.fi.
Other practical information & materials available in Itslearning.
Evaluation scale
H-5
Assessment methods and criteria
Weekly classroom activities + homework 60 %.
Project report and presentation 20 %.
Final exam 20 %. (A written exam on specified material.)
You need to achieve 40 % of total points to pass the course.
Additionally, you need to
1. attain 75 % active classroom attendance + approved project participation
OR
2. attain at least 40 % of the final exam points.
Assessment criteria, fail (0)
Student has not demonstrated achieving the learning objectives of the course. They recognize and can use only few of the concepts of the course topics, and show no skills to apply them.
Student has not achieved 40 % of total points OR has failed to meet one of the passing conditions of the course.
Assessment criteria, satisfactory (1-2)
Student has demonstrated having achieved the learning objectives of the course on satisfactory level. They recognize and can to some extent use most of the concepts of the course topics.
Assessment criteria, good (3-4)
Student has demonstrated having achieved the learning objectives of the course well.
They recognize and can use most of the concepts of the course topics, and are able to apply them on various study and work contexts.
Assessment criteria, excellent (5)
Student has demonstrated having achieved the learning objectives of the course on excellent level. They master the concepts of the course topics, and are able to fluently apply them on study and work contexts.
Qualifications
Basics of Mathematical Analysis, Number Theory and Algorithmics
Enrollment
13.12.2023 - 01.02.2024
Timing
22.01.2024 - 30.04.2024
Number of ECTS credits allocated
5 op
Mode of delivery
Contact teaching
Unit
Engineering and Business
Campus
Kupittaa Campus
Teaching languages
- English
Seats
0 - 35
Degree programmes
- Degree Programme in Information and Communication Technology
Teachers
- Ali Khan
Groups
-
ICTMODembeddedSem
-
VAVA2324
Objective
After completing the course the student:
is familiar with the basic concepts and principles of cryptology
understands some mathematical backgrounds of cryptography
knows how symmetric and asymmetric ciphers function
can explain the workings of some cryptographic applications
Content
• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications
Location and time
September – December 2018.
Materials
Understanding Cryptography by C. Paar and J. Pelz (Springer, 2010). Available in the library. Some chapters are available for free online.
Various internet sources, links & descriptions are provided in Itslearning.
Teaching methods
Classroom activities, group work and independent work; project work, task-based (homework).
Exam schedules
Exam dates will be published on ItsLearning
International connections
The contents of the course give understanding of the basic cryptographic tools and devices which are essential in the operating environment of an ICT engineer, such as all electronic and wireless communications, e-commerce applications etc.
Students will team up for a project work on some current and relevant aspect of cryptology. The teams will share their work to the whole group, which gives everyone a broader understanding on the topic.
Task-based assessment supports learning and is continuous throughout the course. Studying in an international group develops students’ ability to intercultural communication and multicultural collaboration.
Completion alternatives
By Exam:
If you choose to take the exam, your grading will be based on the following criteria:
Exercises: 40%
Project: 20%
Final Exam: 40%
By Assignments:
If you choose to complete the course by assignments then the following grading will be followed:
Exercises: 80%
Project: 20%
Regardless of the option you choose, we will follow the grading scale below:
Below 40%: F
40-59%: 1
60-79%: 2
80-85%: 3
86-90%: 4
90-100%: 5
.
Student workload
Classroom activities participation
Homework
Project work
Final exam (optional)
Content scheduling
• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications
January – April 2024.
Further information
Timetables in lukkari.turkuamk.fi.
Other practical information & materials in Itslearning.
Evaluation scale
H-5
Assessment methods and criteria
If you choose to take the exam, your grading will be based on the following criteria:
Exercises: 40%
Project: 20%
Final Exam: 40%
Otherwise, the grading will be as follows:
Exercises: 80%
Project: 20%
Regardless of the option you choose, we will follow the grading scale below:
Below 40%: F
40-59%: 1
60-79%: 2
80-85%: 3
86-90%: 4
90-100%: 5
.
Assessment criteria, fail (0)
Below 40%: F
Assessment criteria, satisfactory (1-2)
40-59%: 1
60-79%: 2
Assessment criteria, good (3-4)
80-85%: 3
86-90%: 4
Assessment criteria, excellent (5)
90-100%: 5
Qualifications
Basics of Mathematical Analysis, Number Theory and Algorithmics
Enrollment
01.12.2022 - 19.01.2023
Timing
10.01.2023 - 30.04.2023
Number of ECTS credits allocated
5 op
Mode of delivery
Contact teaching
Unit
Engineering and Business
Campus
Kupittaa Campus
Teaching languages
- English
Seats
20 - 40
Degree programmes
- Degree Programme in Information and Communication Technology
Teachers
- Paula Steinby
Groups
-
VAVA2223
-
PTIVIS21
-
PINFOS21
Objective
After completing the course the student:
is familiar with the basic concepts and principles of cryptology
understands some mathematical backgrounds of cryptography
knows how symmetric and asymmetric ciphers function
can explain the workings of some cryptographic applications
Content
• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications
Location and time
September – December 2018.
Materials
Understanding Cryptography by C. Paar and J. Pelz (Springer, 2010). Available in the library. Some chapters are available for free online.
Various internet sources, links & descriptions are provided in Itslearning.
Teaching methods
Classroom activities, group work and independent work; project work, task-based (homework).
Exam schedules
TBA
International connections
The contents of the course give understanding of the basic cryptographic tools and devices which are essential in the operating environment of an ICT engineer, such as all electronic and wireless communications, e-commerce applications etc.
Students will team up for a project work on some current and relevant aspect of cryptology. The teams will share their work to the whole group, which gives everyone a broader understanding on the topic.
Task-based assessment supports learning and is continuous throughout the course. Studying in an international group develops students’ ability to intercultural communication and multicultural collaboration.
Completion alternatives
-
Student workload
Classroom activities participation
Homework
Project work
Final exam
Content scheduling
• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications
January – April 2023.
Further information
Timetables in lukkari.turkuamk.fi.
Other practical information & materials in Itslearning.
Evaluation scale
H-5
Assessment methods and criteria
Classroom activities + homework 50 %.
Project report and presentation 20 %.
Final exam 30 %. A written exam (1,5 hrs) on specified material.
You need to achieve 40 % of total points and 40 % of the final exam points to pass the course.
.
Qualifications
Basics of Mathematical Analysis, Number Theory and Algorithmics
Enrollment
01.12.2021 - 19.01.2022
Timing
10.01.2022 - 30.04.2022
Number of ECTS credits allocated
5 op
Mode of delivery
Contact teaching
Unit
Engineering and Business
Campus
Kupittaa Campus
Teaching languages
- English
Seats
20 - 40
Degree programmes
- Degree Programme in Information and Communication Technology
- Degree Programme in Information and Communications Technology
Teachers
- Paula Steinby
Groups
-
PINFOS20
-
PTIVIS20
-
VAVA2122
Objective
After completing the course the student:
is familiar with the basic concepts and principles of cryptology
understands some mathematical backgrounds of cryptography
knows how symmetric and asymmetric ciphers function
can explain the workings of some cryptographic applications
Content
• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications
Location and time
September – December 2018.
Materials
Understanding Cryptography by C. Paar and J. Pelz (Springer, 2010). Some chapters of it are available for free.
Various internet sources, links & descriptions are provided in Itslearning.
Teaching methods
Online activities, group work and independent work; project work, task-based (homework).
International connections
The contents of the course give understanding of the basic cryptographic tools and devices which are essential in the operating environment of an ICT engineer, such as all electronic and wireless communications, e-commerce applications etc.
Students will team up for a project work on some current and relevant aspect of cryptology. The teams will share their work to the whole group, which gives everyone a broader understanding on the topic.
Task-based assessment supports learning and is continuous throughout the course. Studying in an international group develops students’ ability to intercultural communication and multicultural collaboration.
Completion alternatives
Online implementation
Student workload
Online activities participation
Working on homework sets
Project work
Final exam: Preparing for and taking the final exam
Content scheduling
• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications
January – April 2022.
Further information
All practical information on timetables, project work, grading etc., as well as links to web materials are provided in Itslearning.
Evaluation scale
H-5
Assessment methods and criteria
Homework 50 %. Homework consists of weekly homework sets exercises based on reading material and classroom activities and notes.
Project report and presentation 20 %.
Final exam 30 %. A written exam (1,5 hrs) on specified material.
You need to achieve 40 % of total points and 40 % of the final exam points to pass the course.
.
Qualifications
Basics of Mathematical Analysis, Number Theory and Algorithmics