COURSE UNIT TITLE

: SECURITY AND PRIVACY ENGINEERING

Description of Individual Course Units

Course Unit Code Course Unit Title Type Of Course D U L ECTS
CSE 5065 SECURITY AND PRIVACY ENGINEERING ELECTIVE 3 0 0 8

Offered By

Graduate School of Natural and Applied Sciences

Level of Course Unit

Second Cycle Programmes (Master's Degree)

Course Coordinator

ASSOCIATE PROFESSOR GÖKHAN DALKILIÇ

Offered to

Computer Engineering Non-Thesis
COMPUTER ENGINEERING
Computer Science
Computer Engineering
Ph.D. in Computer Science
Computer Engineering
Computer Engineering (Non-Thesis-Evening)

Course Objective

The course intends to introduce students to principles of engineering secure systems and to equip students with working knowledge of Mathematics of security algorithms, privacy issues, computer network security and ancryption algorithms

Learning Outcomes of the Course Unit

1   Identify and apply number theory techniques to data encryption and security problems
2   Present a functional knowledge of privacy.
3   Specify, analyze and prove correctness for security and privacy algorithms
4   Design secure systems that respect privacy laws.
5   Identify security and privacy threats

Mode of Delivery

Face -to- Face

Prerequisites and Co-requisites

None

Recomended Optional Programme Components

None

Course Contents

Week Subject Description
1 Introduction to Security and Privacy Issues, Authentication, Threats to Security and Privacy
2 Elementary Number Theory, Modular Arithmetic, Euclid s GCD, Diophantine Equations, Fınding Modular Inverses
3 Prime Numbers, Fermat s Little Theorem, Primality Testing
4 Substitution Ciphers, Symmetric Cyphers, DES
5 Discrete Logarithm Problem, RSA
6 Authentication, Hashing, Digital Signatures
7 Midterm Exam Review
8 Introduction to Security and Privacy Issues, Authentication, Threats to Security and Privacy
9 Secret Sharing Algorithms
10 Privacy Related Algorithms
11 Security at Systems Level, Engineering Security and Privacy into Design of Systems
12 Network Security Threats, Monitoring, Designing Secure Networks
13 Secure Electronic Voting Example
14 Advanced Data Encryption Algorithms and Review

Recomended or Required Reading

Textbook(s):
Stallings, W., Network Security Essentials 4th Edition, Prentice Hall, New Jersey, 2010, ISBN 0137067925
Edited by G. Goos, J. Hartmanis and J. van Leeuwen, IT-Security And Privacy, Design and Useof Privacy-Enhancing Security Systems, Lecture Notes in Computer Science, Springer, 2001.
Supplementary Book(s): Eynden, Charles, V. Elementary Number Theory, Mc Graw Hill, 2001.
References: Schneier, Bruce. Applied Cryptography, John Wiley and Sons, 1996.
Anderson Ross J., Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley Publishing, 2008, ISBN: 978-0-470-06852-6
Materials: Lecture Notes,problem sets.

Planned Learning Activities and Teaching Methods

Assessment Methods

SORTING NUMBER SHORT CODE LONG CODE FORMULA
1 MTE MIDTERM EXAM
2 ASG ASSIGNMENT
3 FIN FINAL EXAM
4 FCG FINAL COURSE GRADE MTE * 0.30 +ASG * 0.20 +FIN * 0.50
5 RST RESIT
6 FCGR FINAL COURSE GRADE (RESIT) MTE * 0.30 + ASG * 0.20 + RST * 0.50


*** Resit Exam is Not Administered in Institutions Where Resit is not Applicable.

Further Notes About Assessment Methods

None

Assessment Criteria

To be announced.

Language of Instruction

English

Course Policies and Rules

To be announced.

Contact Details for the Lecturer(s)

Prof.Dr. Suleyman Sevinc
Dokuz Eylul University
Department of Computer Engineering
Tinaztepe Campus 35160 BUCA/IZMIR
Tel: +90 (232) 301 74 01
e-mail: suleyman.sevinc@cs.deu.edu.tr

Office Hours

TBA in the first lecture

Work Placement(s)

None

Workload Calculation

Activities Number Time (hours) Total Work Load (hours)
Lectures 39 1 39
Preparations before/after weekly lectures 13 5 65
Preparation for midterm exam 2 10 20
Preparation for final exam 1 15 15
Preparation for quiz etc. 3 3 9
Preparing assignments 4 4 16
Reading 3 7 21
Final 1 2 2
Midterm 2 2 4
Quiz etc. 3 3 9
TOTAL WORKLOAD (hours) 200

Contribution of Learning Outcomes to Programme Outcomes

PO/LOPO.1PO.2PO.3PO.4PO.5PO.6PO.7PO.8PO.9PO.10
LO.1445
LO.2345
LO.3445
LO.4434
LO.5434