CryptographyLaajuus (5 cr)
Code: R504TL156
Credits
5 op
Objective
The student is familiar with the basic concepts of cryptography. He/she knows the basic types of cryptographic algorithms and is able the assess their security. The student knows the working principles of secure communication protocols and the required Public Key Infrastructure.
Content
PART 1: Discrete mathematics of cryptography
Divisibility, primes, Euclid’s algorithm, congruence, Euler’s and Fermat's theorems
PART 2: Encryption algorithms and software
Basic concepts and principles of cryptology, classical ciphers and their cryptanalysis, types of modern cryptographic algorithms, hash functions and digital signature, mathematical foundations of most common encryption methods
Assessment criteria, satisfactory (1)
The student knows the concepts and can solve basic level problems
Assessment criteria, good (3)
The student understands the concepts and is able to solve varied tasks related to applications of cryptography
Assessment criteria, excellent (5)
The student understands the concepts and is able to apply methods of cryptography in solving and handling new types of tasks and problems.
Enrollment
01.10.2024 - 06.01.2025
Timing
07.01.2025 - 18.05.2025
Credits
5 op
Mode of delivery
Contact teaching
Unit
Bachelor of Engineering, Information Technology
Teaching languages
- English
Teachers
- Veikko Keränen
- Jouko Teeriaho
Responsible person
Jouko Teeriaho
Student groups
-
RA54T22SBachelor of Engineering, Information Technology (online studies), autumn 2022
-
R54T22SBachelor of Engineering, Information Technology (full time day studies), autumn 2022
Objective
The student is familiar with the basic concepts of cryptography. He/she knows the basic types of cryptographic algorithms and is able the assess their security. The student knows the working principles of secure communication protocols and the required Public Key Infrastructure.
Content
PART 1: Discrete mathematics of cryptography
Divisibility, primes, Euclid’s algorithm, congruence, Euler’s and Fermat's theorems
PART 2: Encryption algorithms and software
Basic concepts and principles of cryptology, classical ciphers and their cryptanalysis, types of modern cryptographic algorithms, hash functions and digital signature, mathematical foundations of most common encryption methods
Location and time
Spring semester 2025. Studying takes place online. After the initial information, studying is independent of time and place. Guidance times and method will be announced at the beginning of the study period
Materials
Learning materials in the Moodle workspace of the course.
Teaching methods
The form of study is self-study. Evaluation is based on answers to questions and assignments given in Moodle learning environment The Moodle workspace of the course includes written learning materials , a series of video lectures and assignments.
Guidance is available for completing tasks.
Content scheduling
Students can decide how to use their time independently
Evaluation scale
H-5
Assessment criteria, satisfactory (1)
The student knows the concepts and can solve basic level problems
Assessment criteria, good (3)
The student understands the concepts and is able to solve varied tasks related to applications of cryptography
Assessment criteria, excellent (5)
The student understands the concepts and is able to apply methods of cryptography in solving and handling new types of tasks and problems.
Assessment methods and criteria
Evaluation scale: 0 = failed, 1.2 = satisfactory, 3.4 = good, 5 = excellent
The evaluation is based on assignments to be returned in Moodle environment.
There are no exams.
Assessment criteria, fail (0)
Completion of the tasks and mastery of concepts remain incomplete. There are big gaps in knowledge of the topic.
Assessment criteria, satisfactory (1-2)
The concept has been reasonably adopted. There are errors in the assignments or some of the assignments have not been completed.
Assessment criteria, good (3-4)
Adoption of the concept is at a good level. There are some errors and shortcomings in the assignments
Assessment criteria, excellent (5)
Concept acquisition is at a good level. The tasks have been performed almost flawlessly.
Enrollment
02.10.2023 - 31.01.2024
Timing
15.01.2024 - 22.05.2024
Credits
5 op
Virtual proportion (cr)
5 op
Mode of delivery
Distance learning
Unit
Bachelor of Engineering, Information Technology
Teaching languages
- English
Seats
0 - 120
Teachers
- Jouko Teeriaho
- Veikko Keränen
Responsible person
Veikko Keränen
Student groups
-
R54T21SBachelor of Engineering, Information Technology (full time day studies), autumn 2021
-
RA54T21SBachelor of Engineering, Information Technology (online studies), autumn 2021
Objective
The student is familiar with the basic concepts of cryptography. He/she knows the basic types of cryptographic algorithms and is able the assess their security. The student knows the working principles of secure communication protocols and the required Public Key Infrastructure.
Content
PART 1: Discrete mathematics of cryptography
Divisibility, primes, Euclid’s algorithm, congruence, Euler’s and Fermat's theorems
PART 2: Encryption algorithms and software
Basic concepts and principles of cryptology, classical ciphers and their cryptanalysis, types of modern cryptographic algorithms, hash functions and digital signature, mathematical foundations of most common encryption methods
Location and time
Spring semester 2024. Studying takes place online. After the initial information, studying is independent of time and place. Guidance times and method will be announced at the beginning of the study period
Materials
Learning materials in the Moodle workspace of the course.
Teaching methods
The form of study is self-study. Evaluation is based on answers to questions and assignments given in Moodle learning environment The Moodle workspace of the course includes written learning materials , a series of video lectures and assignments.
Guidance is available for completing tasks.
Content scheduling
Students can decide how to use their time independently
Evaluation scale
H-5
Assessment criteria, satisfactory (1)
The student knows the concepts and can solve basic level problems
Assessment criteria, good (3)
The student understands the concepts and is able to solve varied tasks related to applications of cryptography
Assessment criteria, excellent (5)
The student understands the concepts and is able to apply methods of cryptography in solving and handling new types of tasks and problems.
Assessment methods and criteria
Evaluation scale: 0 = failed, 1.2 = satisfactory, 3.4 = good, 5 = excellent
The evaluation is based on assignments to be returned in Moodle environment.
There are no exams.
Assessment criteria, fail (0)
Completion of the tasks and mastery of concepts remain incomplete. There are big gaps in knowledge of the topic.
Assessment criteria, satisfactory (1-2)
The concept has been reasonably adopted. There are errors in the assignments or some of the assignments have not been completed.
Assessment criteria, good (3-4)
Adoption of the concept is at a good level. There are some errors and shortcomings in the assignments
Assessment criteria, excellent (5)
Concept acquisition is at a good level. The tasks have been performed almost flawlessly.
Enrollment
03.10.2022 - 31.12.2022
Timing
09.01.2023 - 15.05.2023
Credits
5 op
Virtual proportion (cr)
5 op
Mode of delivery
Distance learning
Unit
Bachelor of Engineering, Information Technology
Teaching languages
- Finnish
Seats
0 - 65
Teachers
- Jouko Teeriaho
- Veikko Keränen
Responsible person
Jouko Teeriaho
Student groups
-
R54T20S
Objective
The student is familiar with the basic concepts of cryptography. He/she knows the basic types of cryptographic algorithms and is able the assess their security. The student knows the working principles of secure communication protocols and the required Public Key Infrastructure.
Content
PART 1: Discrete mathematics of cryptography
Divisibility, primes, Euclid’s algorithm, congruence, Euler’s and Fermat's theorems
PART 2: Encryption algorithms and software
Basic concepts and principles of cryptology, classical ciphers and their cryptanalysis, types of modern cryptographic algorithms, hash functions and digital signature, mathematical foundations of most common encryption methods
Evaluation scale
H-5
Assessment criteria, satisfactory (1)
The student knows the concepts and can solve basic level problems
Assessment criteria, good (3)
The student understands the concepts and is able to solve varied tasks related to applications of cryptography
Assessment criteria, excellent (5)
The student understands the concepts and is able to apply methods of cryptography in solving and handling new types of tasks and problems.
Enrollment
01.10.2021 - 25.12.2021
Timing
10.01.2022 - 31.05.2022
Credits
5 op
Mode of delivery
Contact teaching
Unit
Bachelor of Engineering, Information Technology
Teaching languages
- Finnish
Seats
0 - 90
Teachers
- Veikko Keränen
- Jouko Teeriaho
Responsible person
Jouko Teeriaho
Student groups
-
R54T19S
Objective
The student is familiar with the basic concepts of cryptography. He/she knows the basic types of cryptographic algorithms and is able the assess their security. The student knows the working principles of secure communication protocols and the required Public Key Infrastructure.
Content
PART 1: Discrete mathematics of cryptography
Divisibility, primes, Euclid’s algorithm, congruence, Euler’s and Fermat's theorems
PART 2: Encryption algorithms and software
Basic concepts and principles of cryptology, classical ciphers and their cryptanalysis, types of modern cryptographic algorithms, hash functions and digital signature, mathematical foundations of most common encryption methods
Evaluation scale
H-5
Assessment criteria, satisfactory (1)
The student knows the concepts and can solve basic level problems
Assessment criteria, good (3)
The student understands the concepts and is able to solve varied tasks related to applications of cryptography
Assessment criteria, excellent (5)
The student understands the concepts and is able to apply methods of cryptography in solving and handling new types of tasks and problems.