3 ECTS credits
90 h study time

Offer 1 with catalog number 4016448FNR for all students in the 2nd semester at a (F) Master - specialised level.

Semester
2nd semester
Enrollment based on exam contract
Impossible
Grading method
Grading (scale from 0 to 20)
Can retake in second session
Yes
Taught in
English
Partnership Agreement
Under interuniversity agreement for degree program
Faculty
Faculty of Sciences and Bioengineering Sciences
Department
Mathematics
Educational team
Ann Dooms
Decaan WE (course titular)
Activities and contact hours
18 contact hours Lecture
24 contact hours Seminar, Exercises or Practicals
Course Content

This course provides an introduction to cryptography - from the past over the present to the future. We treat the basis building blocks of cryptography with the underlying mathematical concepts and theory. Thereafter, we combine these techniques into systems we encounter in our daily life so that the importance and applications of mathematics become apparant. Along the way, we gather insights in the current technologies in the field of security and identify their pros and cons. The student learns to reason about how the cons could be improved in the future. 

Practical examples are treated in the exercise classes using a problem solving methodology.

By means of a project, the student is introduced to aspects not yet treated in the course. Thereafter the student gives a presentation to his fellow students explaining his topic and underlying theories.

 

Table of contents:

1. Introduction

2. Basis concepts

3. Symmetric cryptosystems

4. Public Key cryptosystems

5. Hash functions

6. Digital signatures and Identification

7. Complementing Crypto: Digital Watermarking

8. Projects

Course material
Digital course material (Required) : The slides in PDF format, Canvas
Additional info

The slides in PDF format are available on the learning platform.

 

The course is based on:

 

Johanes A. Buchmann, Introduction to Cryptography, Springer, 2000.

 

Richard Mollin, Codes: The Guide to Secrecy From Ancient to Modern Times, Chapman & Hall, 2005.

 

Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.

Learning Outcomes

Competency1

This course is an introduction to cryptography in the past until now and the future. We cover the basis building blocks of cryptography founded with the necessary mathematical tools. Hereafter we combine these techniques in systems we encounter in every day life. As such one learns to appreciate the importance and applications of mathematics. In this way one develops insight in the recent technologies and is it possible to identify its pros and cons. We end by reasoning on how to overcome the cons in the future. 

Competency2

Practical examples are handled in detail during the exercise classes in a problem solving way.

Competency3

By means of a project one encounters some aspects not covered in the course and one needs to identify which mathematical techniques are needed. Then the student communicates in a clear way with a lecture on his subject to his fellow students.

Grading

The final grade is composed based on the following categories:
Oral Exam determines 50% of the final mark.
Written Exam determines 40% of the final mark.
SELF Practical Assignment determines 10% of the final mark.

Within the Oral Exam category, the following assignments need to be completed:

  • oral exam theory with a relative weight of 1 which comprises 50% of the final mark.

Within the Written Exam category, the following assignments need to be completed:

  • written exam exercises with a relative weight of 1 which comprises 40% of the final mark.

Within the SELF Practical Assignment category, the following assignments need to be completed:

  • project with a relative weight of 1 which comprises 10% of the final mark.

Additional info regarding evaluation

Written exam (50% theory - 40% exercises) and project work (10%).

 

The student needs to take part in all the evaluations to be able to pass the exam. A student can only pass this course on the condition that he scores at least 10 on one of the two parts of the written exam. The grade of the project is retained if one participates in the second examination period. In case of legitimate absence from the project in the first examination period, this part will be replaced by a written assignment and extra question on the exam in the second examination period. An exemption from part of the written examination for the second examination period can be requested from a 12 on that part.

 

 

 
Allowed unsatisfactory mark
The supplementary Teaching and Examination Regulations of your faculty stipulate whether an allowed unsatisfactory mark for this programme unit is permitted.

Academic context

This offer is part of the following study plans:
Master in Applied Sciences and Engineering: Applied Computer Science: Standaard traject
Master of Applied Sciences and Engineering: Computer Science: Artificial Intelligence
Master of Applied Sciences and Engineering: Computer Science: Multimedia
Master of Applied Sciences and Engineering: Computer Science: Software Languages and Software Engineering
Master of Applied Sciences and Engineering: Computer Science: Data Management and Analytics
Master of Electrical Engineering: Standaard traject BRUFACE J