INTERNATIONAL BURCH UNIVERSITY
Graduate Study - Faculty of Engineering and Natural Sciences
Information Technology PhD
||Cryptography and Network Security
||Number of ECTS Credits
||Class Hours Per Week
||Total Hours Per Semester
|Abdülhamit Subaşı, Prof. Dr.
||Abdülhamit Subaşı, Prof. Dr.
|Introduce computer and network security concepts. Introduce confidentiality, integrity and availability.
Develop some general design decisions that should be made when constructing secure systems.
Present cryptography concepts.
- Introduction to Cryptography
- Classical Encryption Techniques, Block Ciphers and the Data Encryption Standard
- Advanced Encryption Standard, Block Cipher Operation
- Public-Key Cryptography and RSA, Other Public-Key Cryptosystems
- Cryptographic Hash Functions, Message Authentication Codes
- Digital Signatures, Key Management and Distribution
- User Authentication, Network Access Control and Cloud Security
- Transport-Level Security, Wireless Network Security
- Electronic Mail Security, IP Security
- Web Security, Intruders
- Malicious Software, Firewalls
- Database security
- Biometrics authentication systems, Watermarking and information hiding
- JAVA security, .NET Security, PHP security
| Midterm Exam(s)||1||20|
| Final Exam||1||40|
- Demonstrate a systematic and critical understanding of the theories, principles and practices of Cryptography and Network Security;
- Critically review the role of a “professional computing practitioner” with particular regard to an understanding of legal and ethical issues;
- Creatively apply contemporary theories, processes and tools in the development and evaluation of solutions to problems of Network Security;
- Actively participate in, reflect upon, and take responsibility for, personal learning and development, within a framework of lifelong learning and continued professional development;
- Present issues and solutions in appropriate form to communicate effectively with peers and clients from specialist and non-specialist backgrounds;
- 1. William Stallings, Cryptography and Network Security, Principles and Practices, Fourth Edition, Prentice Hall, 2005.
|ECTS (Allocated based on student) WORKLOAD
|Lecture (14 weeks x Lecture hours per week)|| ||0|
|Laboratory / Practice (14 weeks x Laboratory/Practice hours per week)|| || ||0|
|Midterm Examination (1 week)|| || ||0|
|Final Examination(1 week)|| || ||0|
|Preparation for Midterm Examination|| || ||0|
|Preparation for Final Examination||7.5||0|