Skip to main content

CryptographyLaajuus (5 cr)

Code: R504TL156

Credits

5 op

Objective

The student is familiar with the basic concepts of cryptography. He/she knows the basic types of cryptographic algorithms and is able the assess their security. The student knows the working principles of secure communication protocols and the required Public Key Infrastructure.

Content

PART 1: Discrete mathematics of cryptography

Divisibility, primes, Euclid’s algorithm, congruence, Euler’s and Fermat's theorems

PART 2: Encryption algorithms and software

Basic concepts and principles of cryptology, classical ciphers and their cryptanalysis, types of modern cryptographic algorithms, hash functions and digital signature, mathematical foundations of most common encryption methods

Assessment criteria, satisfactory (1)

The student knows the concepts and can solve basic level problems

Assessment criteria, good (3)

The student understands the concepts and is able to solve varied tasks related to applications of cryptography

Assessment criteria, excellent (5)

The student understands the concepts and is able to apply methods of cryptography in solving and handling new types of tasks and problems.

Enrollment

01.10.2024 - 06.01.2025

Timing

07.01.2025 - 18.05.2025

Credits

5 op

Mode of delivery

Contact teaching

Unit

Bachelor of Engineering, Information Technology

Teaching languages
  • English
Teachers
  • Veikko Keränen
  • Jouko Teeriaho
Responsible person

Jouko Teeriaho

Student groups
  • RA54T22S
    Bachelor of Engineering, Information Technology (online studies), autumn 2022
  • R54T22S
    Bachelor of Engineering, Information Technology (full time day studies), autumn 2022

Objective

The student is familiar with the basic concepts of cryptography. He/she knows the basic types of cryptographic algorithms and is able the assess their security. The student knows the working principles of secure communication protocols and the required Public Key Infrastructure.

Content

PART 1: Discrete mathematics of cryptography

Divisibility, primes, Euclid’s algorithm, congruence, Euler’s and Fermat's theorems

PART 2: Encryption algorithms and software

Basic concepts and principles of cryptology, classical ciphers and their cryptanalysis, types of modern cryptographic algorithms, hash functions and digital signature, mathematical foundations of most common encryption methods

Location and time

Spring semester 2025. Studying takes place online. After the initial information, studying is independent of time and place. Guidance times and method will be announced at the beginning of the study period

Materials

Learning materials in the Moodle workspace of the course.

Teaching methods

The form of study is self-study. Evaluation is based on answers to questions and assignments given in Moodle learning environment The Moodle workspace of the course includes written learning materials , a series of video lectures and assignments.
Guidance is available for completing tasks.

Content scheduling

Students can decide how to use their time independently

Evaluation scale

H-5

Assessment criteria, satisfactory (1)

The student knows the concepts and can solve basic level problems

Assessment criteria, good (3)

The student understands the concepts and is able to solve varied tasks related to applications of cryptography

Assessment criteria, excellent (5)

The student understands the concepts and is able to apply methods of cryptography in solving and handling new types of tasks and problems.

Assessment methods and criteria

Evaluation scale: 0 = failed, 1.2 = satisfactory, 3.4 = good, 5 = excellent
The evaluation is based on assignments to be returned in Moodle environment.
There are no exams.

Assessment criteria, fail (0)

Completion of the tasks and mastery of concepts remain incomplete. There are big gaps in knowledge of the topic.

Assessment criteria, satisfactory (1-2)

The concept has been reasonably adopted. There are errors in the assignments or some of the assignments have not been completed.

Assessment criteria, good (3-4)

Adoption of the concept is at a good level. There are some errors and shortcomings in the assignments

Assessment criteria, excellent (5)

Concept acquisition is at a good level. The tasks have been performed almost flawlessly.

Enrollment

02.10.2023 - 31.01.2024

Timing

15.01.2024 - 22.05.2024

Credits

5 op

Virtual proportion (cr)

5 op

Mode of delivery

Distance learning

Unit

Bachelor of Engineering, Information Technology

Teaching languages
  • English
Seats

0 - 120

Teachers
  • Jouko Teeriaho
  • Veikko Keränen
Responsible person

Veikko Keränen

Student groups
  • R54T21S
    Bachelor of Engineering, Information Technology (full time day studies), autumn 2021
  • RA54T21S
    Bachelor of Engineering, Information Technology (online studies), autumn 2021

Objective

The student is familiar with the basic concepts of cryptography. He/she knows the basic types of cryptographic algorithms and is able the assess their security. The student knows the working principles of secure communication protocols and the required Public Key Infrastructure.

Content

PART 1: Discrete mathematics of cryptography

Divisibility, primes, Euclid’s algorithm, congruence, Euler’s and Fermat's theorems

PART 2: Encryption algorithms and software

Basic concepts and principles of cryptology, classical ciphers and their cryptanalysis, types of modern cryptographic algorithms, hash functions and digital signature, mathematical foundations of most common encryption methods

Location and time

Spring semester 2024. Studying takes place online. After the initial information, studying is independent of time and place. Guidance times and method will be announced at the beginning of the study period

Materials

Learning materials in the Moodle workspace of the course.

Teaching methods

The form of study is self-study. Evaluation is based on answers to questions and assignments given in Moodle learning environment The Moodle workspace of the course includes written learning materials , a series of video lectures and assignments.
Guidance is available for completing tasks.

Content scheduling

Students can decide how to use their time independently

Evaluation scale

H-5

Assessment criteria, satisfactory (1)

The student knows the concepts and can solve basic level problems

Assessment criteria, good (3)

The student understands the concepts and is able to solve varied tasks related to applications of cryptography

Assessment criteria, excellent (5)

The student understands the concepts and is able to apply methods of cryptography in solving and handling new types of tasks and problems.

Assessment methods and criteria

Evaluation scale: 0 = failed, 1.2 = satisfactory, 3.4 = good, 5 = excellent
The evaluation is based on assignments to be returned in Moodle environment.
There are no exams.

Assessment criteria, fail (0)

Completion of the tasks and mastery of concepts remain incomplete. There are big gaps in knowledge of the topic.

Assessment criteria, satisfactory (1-2)

The concept has been reasonably adopted. There are errors in the assignments or some of the assignments have not been completed.

Assessment criteria, good (3-4)

Adoption of the concept is at a good level. There are some errors and shortcomings in the assignments

Assessment criteria, excellent (5)

Concept acquisition is at a good level. The tasks have been performed almost flawlessly.

Enrollment

03.10.2022 - 31.12.2022

Timing

09.01.2023 - 15.05.2023

Credits

5 op

Virtual proportion (cr)

5 op

Mode of delivery

Distance learning

Unit

Bachelor of Engineering, Information Technology

Teaching languages
  • Finnish
Seats

0 - 65

Teachers
  • Jouko Teeriaho
  • Veikko Keränen
Responsible person

Jouko Teeriaho

Student groups
  • R54T20S

Objective

The student is familiar with the basic concepts of cryptography. He/she knows the basic types of cryptographic algorithms and is able the assess their security. The student knows the working principles of secure communication protocols and the required Public Key Infrastructure.

Content

PART 1: Discrete mathematics of cryptography

Divisibility, primes, Euclid’s algorithm, congruence, Euler’s and Fermat's theorems

PART 2: Encryption algorithms and software

Basic concepts and principles of cryptology, classical ciphers and their cryptanalysis, types of modern cryptographic algorithms, hash functions and digital signature, mathematical foundations of most common encryption methods

Evaluation scale

H-5

Assessment criteria, satisfactory (1)

The student knows the concepts and can solve basic level problems

Assessment criteria, good (3)

The student understands the concepts and is able to solve varied tasks related to applications of cryptography

Assessment criteria, excellent (5)

The student understands the concepts and is able to apply methods of cryptography in solving and handling new types of tasks and problems.

Enrollment

01.10.2021 - 25.12.2021

Timing

10.01.2022 - 31.05.2022

Credits

5 op

Mode of delivery

Contact teaching

Unit

Bachelor of Engineering, Information Technology

Teaching languages
  • Finnish
Seats

0 - 90

Teachers
  • Veikko Keränen
  • Jouko Teeriaho
Responsible person

Jouko Teeriaho

Student groups
  • R54T19S

Objective

The student is familiar with the basic concepts of cryptography. He/she knows the basic types of cryptographic algorithms and is able the assess their security. The student knows the working principles of secure communication protocols and the required Public Key Infrastructure.

Content

PART 1: Discrete mathematics of cryptography

Divisibility, primes, Euclid’s algorithm, congruence, Euler’s and Fermat's theorems

PART 2: Encryption algorithms and software

Basic concepts and principles of cryptology, classical ciphers and their cryptanalysis, types of modern cryptographic algorithms, hash functions and digital signature, mathematical foundations of most common encryption methods

Evaluation scale

H-5

Assessment criteria, satisfactory (1)

The student knows the concepts and can solve basic level problems

Assessment criteria, good (3)

The student understands the concepts and is able to solve varied tasks related to applications of cryptography

Assessment criteria, excellent (5)

The student understands the concepts and is able to apply methods of cryptography in solving and handling new types of tasks and problems.