Siirry suoraan sisältöön

Cryptology (5 op)

Toteutuksen tunnus: 5051156-3008

Toteutuksen perustiedot


Ilmoittautumisaika

01.06.2024 - 08.09.2024

Ajoitus

02.09.2024 - 18.12.2024

Opintopistemäärä

5 op

Toteutustapa

Lähiopetus

Yksikkö

Tekniikka ja liiketoiminta

Toimipiste

Kupittaan kampus

Opetuskielet

  • Englanti

Paikat

20 - 40

Koulutus

  • Tieto- ja viestintätekniikan koulutus
  • Degree Programme in Information and Communications Technology

Opettaja

  • Paula Steinby

Ryhmät

  • ICTMODembeddedSem
    MOD Embedded System (International Semester)
  • VAVA2425
    Ammattikorkeakoulun yhteiset vapaasti valittavat
  • ICTMODictprojSem
    MOD ICT Projects & Cybersecurity (International Semester)
  • 03.09.2024 13:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 10.09.2024 13:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 17.09.2024 13:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 24.09.2024 13:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 01.10.2024 13:00 - 15:00, Classroom work, Cryptology 5051156-3008
  • 08.10.2024 14:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 29.10.2024 13:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 05.11.2024 13:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 12.11.2024 13:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 19.11.2024 13:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 26.11.2024 13:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 03.12.2024 13:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 04.12.2024 12:00 - 14:00, Reservation, Cryptology 5051156-3008
  • 10.12.2024 12:00 - 14:00, Exam, Cryptology 5051156-3008

Tavoitteet

After completing the course the student:
is familiar with the basic concepts and principles of cryptology
understands some mathematical backgrounds of cryptography
knows how symmetric and asymmetric ciphers function
can explain the workings of some cryptographic applications

Sisältö

• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications

Aika ja paikka

September – December 2018.

Oppimateriaalit

Lecture notes, exercises, various internet sources, links & descriptions are provided in Itslearning.

A Graduate Course in Applied Cryptography by D. Boneh and V. Shoup (Version 0.6, January 2023). Available online: https://toc.cryptobook.us/book.pdf
Understanding Cryptography by C. Paar and J. Pelz (Springer, 2010). Available in the library. Some chapters are available for free online.

Opetusmenetelmät

Classroom activities, group work and independent work; project work, task-based (homework).

Tenttien ajankohdat ja uusintamahdollisuudet

Final exam 10.12.2024

Pedagogiset toimintatavat ja kestävä kehitys

The contents of the course give understanding of the basic cryptographic tools and devices which are essential in the operating environment of an ICT engineer, such as all electronic and wireless communications, e-commerce applications etc.

Students will team up for a project work on some current and relevant aspect of cryptology. The teams will present their work to the whole group, which gives everyone a broader understanding on the topic.

Task-based assessment supports learning and is continuous throughout the course. Studying in an international group develops students’ ability to intercultural communication and multicultural collaboration.

Toteutuksen valinnaiset suoritustavat

You get points from the homework, the project work, and the final exam.
Homework points are granted only when it's done properly and submitted in time in the respective Itslearning HW box.
Project work points are granted separately from the report and the presentation.
There is no way to compensate for missing a homework deadline or the project work submission deadline.

To pass the course, you need to gain at least 40 % of the total points
and either

a) at least 40 % of the final exam points
or

b) 75 % classroom attendance and an approved project participation.

Opiskelijan ajankäyttö ja kuormitus

Classroom activities participation + preparation 40 h
Homework 40 h
Project work 30 h
Final exam + preparation 15 h

Sisällön jaksotus

• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications

September - December 2024

Viestintäkanava ja lisätietoja

For timetables, see lukkari.turkuamk.fi.
Other practical information & materials available in Itslearning.

Arviointiasteikko

H-5

Arviointimenetelmät ja arvioinnin perusteet

Weekly classroom activities + homework 60 %.
Project report and presentation 20 %.
Final exam 20 %. (A written exam on specified material.)

You need to achieve 40 % of total points to pass the course.
Additionally, you need to
1. attain 75 % active classroom attendance + approved project participation
OR
2. attain at least 40 % of the final exam points.

Hylätty (0)

Student has not demonstrated achieving the learning objectives of the course. They recognize and can use only few of the concepts of the course topics, and show no skills to apply them.
Student has not achieved 40 % of total points OR has failed to meet one of the passing conditions of the course.

Arviointikriteerit, tyydyttävä (1-2)

Student has demonstrated having achieved the learning objectives of the course on satisfactory level. They recognize and can to some extent use most of the concepts of the course topics.

Arviointikriteerit, hyvä (3-4)

Student has demonstrated having achieved the learning objectives of the course well.
They recognize and can use most of the concepts of the course topics, and are able to apply them on various study and work contexts.

Arviointikriteerit, kiitettävä (5)

Student has demonstrated having achieved the learning objectives of the course on excellent level. They master the concepts of the course topics, and are able to fluently apply them on study and work contexts.

Esitietovaatimukset

Basics of Mathematical Analysis, Number Theory and Algorithmics