Skip to main content

Cryptography (5cr)

Code: R504TL207-3001

General information


Enrollment
06.10.2025 - 11.01.2026
Registration for the implementation has begun.
Timing
12.01.2026 - 15.05.2026
The implementation has not yet started.
Number of ECTS credits allocated
5 cr
Virtual portion
5 cr
Mode of delivery
Distance learning
Teaching languages
english
Seats
0 - 100
Degree programmes
Degree Programme in Information and Communication Technology
Teachers
Jouko Teeriaho
Veikko Keränen
Teacher in charge
Veikko Keränen
Course
R504TL207

Evaluation scale

H-5

Content scheduling

Students can decide how to use their time independently.

Objective

The student is familiar with the basic concepts of cryptography. He/she knows the basic types of cryptographic algorithms and is able the assess their security. The student knows the working principles of secure communication protocols and the required Public Key Infrastructure.

Content

PART 1: Discrete mathematics of cryptography

Divisibility, primes, Euclid’s algorithm, congruence, Euler’s and Fermat's theorems

PART 2: Encryption algorithms and software

Basic concepts and principles of cryptology, classical ciphers and their cryptanalysis, types of modern cryptographic algorithms, hash functions and digital signature, mathematical foundations of most common encryption methods

Location and time

Spring semester 2026. The study will be conducted online. After the initial information, learning is independent of time and location. Guidance timings and methods will be announced at the start of the study period.

Materials

Learning materials are in the Moodle workspace of the training course.


Teaching methods

The study method is self-directed learning. Evaluation relies on responses to questions and assignments provided within the Moodle learning platform. The Moodle workspace for the course includes written learning materials, a series of video lectures, and assignments. Guidance is available to assist with completing tasks.

Student workload

The student's workload is 133 hours.

Assessment criteria, satisfactory (1)

The student is familiar with the basic terms of cryptography and can solve basic cryptography problems.

Assessment criteria, good (3)

The student is familiar with the basic terms of cryptography and can solve diverse cryptography problems.

Assessment criteria, excellent (5)

The student understands the cryptography terms and can apply his/her knowledge in diverse, and even new type of cryptography problems

Further information

Evaluation scale: 0 = failed, 1.2 = satisfactory, 3.4 = good, 5 = excellent
The assessment is based on tasks to be submitted via the Moodle platform.
There are no exams.

Go back to top of page