SALEIE logo that when clicked will open a new window to access the SALEIE home page.

Strategic ALignment of Electrical and Information Engineering in European Higher Education Institutions

European Union flag.

Accessibility

 

User guide

 

SALEIE Home

Click on the image to the left to select the project website section to go to.

Click on the images to the left and above to select the project website section to go to (Technical Challenge Areas, Student and Staff Support Hub or Governance) OR select the Student and Staff Support Hub below.

Technical Global Challenges Areas Student and Staff Support HUB Higher Education Policy Hub

 

Higher Education Technical Challenges Hub: Module Specification

ICT07M1 Introduction in Cryptography and Security Codes

pdf version of module specification

Download the module specification

pdf version of module specification


Module:

Programme:

ICT

ECTS:

6

Type:

Masters

Module name:

Introduction in Cryptography and Security Codes


Scope and form:

Compulsory; face to face


Duration (weeks; Hours/week):

15 weeks, 2h lectures/week and 2 h lab/week; 7h workload

Type of assessment:

continuous assessment and final written exam

Qualified Prerequisites:

The module is based on the knowledge acquired by the students from previous classes included in the bachelor degree on: Advanced mathematics, Data Transmission and Computer Communication, Telecommunication Safety, Coding in Telecommunication systems.


General module objectives:

It aims to introduce the students to the models of telecommunication networks, the theoretical bases of cryptography and crypto analysis, methods for block and stream encoding of the information and their application in modern telecommunication networks.


Topics and short description:

Basics of the protection of information. Introduction to cryptology. Algebraic semi-groups, groups and lattices. Linear congruencies with one indeterminate. Finite algebraic fields. Linear recurrence sequences. P-adic and N-adic generators of pseudo-noise sequences. Block ciphers. Public key cryptosystems. Methods for data verification.


Learning outcomes:

Knowledge

Skills

Competences

Able to understand the basic concepts, principles and practice of cryptography and network security

ability to design, realize and document a security solution in a network

implementing security systems based on current best practices

able to understand the various classes of cryptographic algorithms, explain their relative properties and the interplay of algorithms in network security applications

ability to analyze the threats for information security in the communication and computer networks

competences to develop measures for information security in the communication and computer networks

knowledge of the basic factors, influencing on the information security in the communication and computer networks

ability to find solutions of problems in the sphere of the information security by the means of the abstract algebraic structures

competences to solve equations in finite algebraic fields

knowledge of the basics concepts of the finite algebraic structures

ability to perfect their knowledge in accordance with the requirements of their job positions

competences for application of adequate stream and block ciphers in a concrete communication or computer network

knowledge of the basics principles of the stream and block ciphers

ability to realize decisions, made by their supervisors

competences for application of adequate public key cryptosystems in a concrete communication or computer network

knowledge of the basics concepts of the public key cryptosystems

ability to contact and to develop positive work relations with their colleagues

competences for application of adequate protocols for message integrity and data verification in a concrete communication or computer network

knowledge of the basics approaches and protocols, providing message integrity and data verification


Recommended literature:

B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition, John Wiley & Sons, 1996
S. Y. Yan, Computational Number Theory and Modern Cryptography, John Wiley & Sons Singapore Pte. Ltd., 2013
Z. Cao, New directions of Modern Cryptography, CRC Press, 2012
B. Bedzhev, Coding and Security in Telecommunication Networks (Set of lections), University of Ruse “Angel Kanchev”, 2012