Skip to main content

Cryptology (5 cr)

Code: 5051156-3008

General information


Enrollment

01.06.2024 - 08.09.2024

Timing

02.09.2024 - 18.12.2024

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Engineering and Business

Campus

Kupittaa Campus

Teaching languages

  • English

Seats

20 - 40

Degree programmes

  • Degree Programme in Information and Communication Technology
  • Degree Programme in Information and Communications Technology

Teachers

  • Paula Steinby

Groups

  • ICTMODembeddedSem
  • VAVA2425
  • ICTMODictprojSem
  • 03.09.2024 13:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 10.09.2024 13:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 17.09.2024 13:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 24.09.2024 13:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 01.10.2024 13:00 - 15:00, Classroom work, Cryptology 5051156-3008
  • 08.10.2024 14:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 29.10.2024 13:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 05.11.2024 13:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 12.11.2024 13:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 19.11.2024 13:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 26.11.2024 13:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 03.12.2024 13:00 - 16:00, Classroom work, Cryptology 5051156-3008
  • 04.12.2024 12:00 - 14:00, Reservation, Cryptology 5051156-3008
  • 10.12.2024 12:00 - 14:00, Exam, Cryptology 5051156-3008

Objective

After completing the course the student:
is familiar with the basic concepts and principles of cryptology
understands some mathematical backgrounds of cryptography
knows how symmetric and asymmetric ciphers function
can explain the workings of some cryptographic applications

Content

• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications

Location and time

September – December 2018.

Materials

Lecture notes, exercises, various internet sources, links & descriptions are provided in Itslearning.

A Graduate Course in Applied Cryptography by D. Boneh and V. Shoup (Version 0.6, January 2023). Available online: https://toc.cryptobook.us/book.pdf
Understanding Cryptography by C. Paar and J. Pelz (Springer, 2010). Available in the library. Some chapters are available for free online.

Teaching methods

Classroom activities, group work and independent work; project work, task-based (homework).

Exam schedules

Final exam 10.12.2024

International connections

The contents of the course give understanding of the basic cryptographic tools and devices which are essential in the operating environment of an ICT engineer, such as all electronic and wireless communications, e-commerce applications etc.

Students will team up for a project work on some current and relevant aspect of cryptology. The teams will present their work to the whole group, which gives everyone a broader understanding on the topic.

Task-based assessment supports learning and is continuous throughout the course. Studying in an international group develops students’ ability to intercultural communication and multicultural collaboration.

Completion alternatives

You get points from the homework, the project work, and the final exam.
Homework points are granted only when it's done properly and submitted in time in the respective Itslearning HW box.
Project work points are granted separately from the report and the presentation.
There is no way to compensate for missing a homework deadline or the project work submission deadline.

To pass the course, you need to gain at least 40 % of the total points
and either

a) at least 40 % of the final exam points
or

b) 75 % classroom attendance and an approved project participation.

Student workload

Classroom activities participation + preparation 40 h
Homework 40 h
Project work 30 h
Final exam + preparation 15 h

Content scheduling

• basic concepts and principles of cryptology
• mathematical backgrounds of cryptography
• symmetric and asymmetric ciphers
• some up to date cryptographic applications

September - December 2024

Further information

For timetables, see lukkari.turkuamk.fi.
Other practical information & materials available in Itslearning.

Evaluation scale

H-5

Assessment methods and criteria

Weekly classroom activities + homework 60 %.
Project report and presentation 20 %.
Final exam 20 %. (A written exam on specified material.)

You need to achieve 40 % of total points to pass the course.
Additionally, you need to
1. attain 75 % active classroom attendance + approved project participation
OR
2. attain at least 40 % of the final exam points.

Assessment criteria, fail (0)

Student has not demonstrated achieving the learning objectives of the course. They recognize and can use only few of the concepts of the course topics, and show no skills to apply them.
Student has not achieved 40 % of total points OR has failed to meet one of the passing conditions of the course.

Assessment criteria, satisfactory (1-2)

Student has demonstrated having achieved the learning objectives of the course on satisfactory level. They recognize and can to some extent use most of the concepts of the course topics.

Assessment criteria, good (3-4)

Student has demonstrated having achieved the learning objectives of the course well.
They recognize and can use most of the concepts of the course topics, and are able to apply them on various study and work contexts.

Assessment criteria, excellent (5)

Student has demonstrated having achieved the learning objectives of the course on excellent level. They master the concepts of the course topics, and are able to fluently apply them on study and work contexts.

Qualifications

Basics of Mathematical Analysis, Number Theory and Algorithmics