Course Syllabus: Course Title Ects Department

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Course Syllabus

Course Title ECTS Department

Cryptography and Data School of Secure


3
Security information technologies

Year of Study Semester Type of Course

2 Fall Mandatory

Lectures Practice (Labs) Coursework

8 32 No

Field Language of Instruction Lecturer(s)

Computer Science.
English Prof. Sergei V. Bezzateev
Cryptography

Course Objectives:
The course targets on basics of the modern cryptographic protocols and their application for
electronic voting, digital currency, sensor networks, IoT, IoV, smart home, etc.
The course main aims are:
• emphasizes on how to apply and implement cryptography in practice;
• learning the fundamental principles and theories underlying cryptographic algorithms,
including the mathematical foundations of cryptography;
• learning to apply cryptography to solving data security problems;
• introduce the concepts how cryptographic algorithms and protocols work and how to
use them;
• provides a broad view of security with practical applications of cryptography to data
security.
This course

Page 1 | 3
• focuses on how cryptographic algorithms and protocols work and how to use them;
• provides students with opportunity to judge whether a cryptographic building block is
suitable for use in a particular application, and give them possibility to assess security
models for applications critically.
• provides students with deep knowledge for new approaches for future implementation;
• Presenting symmetric and asymmetric cryptographic systems and covering most
important parts of cryptology through introducing many cryptography techniques and
algorithms.

Learning Outcomes:
After completion of the course students are expected to be able to:
1. understand why today’s secure cryptosystems have been designed the way they are.
2. understand how to perform basic attacks on cryptography.
3. understand the issues involved in using asymmetric encryption to distribute symmetric
keys.
4. avoid common pitfalls when integrating cryptography in practical applications.

Course Content:
1. Principles of cryptography, classical ciphers and general cryptanalysis.
2. Symmetric primitives: Modern encryption methods and secure hashing.
3. Public key cryptography: Key exchange, asymmetric encryption and digital signatures.
4. Advanced applications: protocols, key management and special cryptographic
services.

Learning Activities and Teaching Methods:


Lectures, presentations, practical exercises, assignments and research report.

Assessment Methods:
• Final assessment: Mid-term and Final Examinations.
• Continuous assessment: practice reports assessments.

Required Textbooks / Readings:


Title Author(s) Publisher Year ISBN

Page 2 | 3
A Graduate Course in D. Boneh https://toc.cryptobook.us/book.pdf 2020 -
Applied Cryptographyby V. Shoup
Handbook of Applied A. http://bookfi.net/dl/463532/9fec62 2017 -
Cryptography Menezes,
P. Van
Oorschot,
S.
Vanstone
Recommended Textbooks / Readings:
Title Author(s) Publisher Year ISBN
Cryptography and Network William Pearson 2007 , ISBN-
Security: Principles and Stallings 10: 1292158581 •
Practice, Global Edition, ISBN-
13: 9781292158587
Introduction to Cryptography: Hans Delfs , Springer 2007 0-387-95273-X
Principles and Applications., Helmut
Knebl

Page 3 | 3

You might also like