Encryption Techniques and SystemsLaajuus (5 cr)
Code: TTC6540
Credits
5 op
Teaching language
- Finnish
- English
Responsible person
- Monika Wolfmayr
Objective
The objective of the course
--------------------------------
By conducting the course, the student masters both the principles and practice of cryptography based network security.
Course Competences
----------------------------
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
The learning objectives of the course
-------------------------------------------------
The student masters the most essential areas in data encryption: concepts, theory, the used technical implementations and systems. In addition, the student masters the principles of encryption techniques and is able to design and implement an encryption system based on requirement specification considering the existing restrictions of chosen techniques. The student is also capable of producing documentation of the implemented solution and giving a presentation of the implementation.
Content
The course contains the commonly used encryption algorithms with design and implementation of encryption systems. In addition, encryption use cases suitable for certain systems are practiced. Encryption systems are programmed during the course. Documentation of implemented solutions is created, and the implementation is presented.
The course consist of following:
-Terminology of cryptography
-Classical encryption algorithms
-Advanced symmetric and asymmetric ciphers
-Relevant data integrity algorithms
-Key management and distribution
Qualifications
Knowledge of digital technology, cyber security concepts, standards, algorithms, network protocols and layered structure of telecommunication. Capability of programming and basic knowledge of Linux environment are required.
Assessment criteria, satisfactory (1)
Sufficient 1: The student can identify most common encryption techniques and solutions for network and computer infrastructure. The student is able to implement an encryption system based on given requirements. The student is capable of listing the requirements in documentation and presenting their assignment.
Satisfactory 2: The student understands most of the used encryption techniques and solutions for network and computer infrastructure. The student is able to design and implement a suitable encryption system based on given requirement specification considering general restrictions of given techniques. The student is capable of explaining the requirements to documentation and giving a presentation of his/her assignment.
Assessment criteria, good (3)
Good 3: The student can select mostly used encryption techniques and solutions for network and computer infrastructure. The student is able to design and implement a suitable encryption system based on requirement specification considering known restrictions of chosen techniques. The student’s reflection on his/her learning is analytical. Generated documents meet the requirements and the student is capable of giving a presentation of his/her assignment.
Very good 4: The student is able to evaluate encryption techniques and solutions for network and computer infrastructure. The student is able to design and implement encryption system based on evaluated requirement specifications considering the assessed restrictions of chosen techniques. The student is able to reflect on their learning as planned. Generated documents are comprehensive and the student is capable of giving a fluent presentation of his/her assignment.
Assessment criteria, excellent (5)
Excellent 5: The student is able to analytically conclude encryption technique and solutions for network and computer infrastructure. The student is able to design and implement an encryption system with produced requirement specification considering categorised restrictions of chosen techniques. The student is capable of producing analysed reflection on their learning. Generated documents are comprehensive and the student is capable of producing a fluent and analytical presentation of their assignment.
Enrollment
18.11.2024 - 09.01.2025
Timing
13.01.2025 - 30.04.2025
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- English
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Monika Wolfmayr
Groups
-
TTV22S5Tieto- ja viestintätekniikka (AMK)
-
TTV22S2Tieto- ja viestintätekniikka (AMK)
-
TTV22S3Tieto- ja viestintätekniikka (AMK)
-
TIC22S1Bachelor's Degree Programme in Information and Communications Technology
-
TTV22S1Tieto- ja viestintätekniikka (AMK)
-
TTV22S4Tieto- ja viestintätekniikka (AMK)
Objectives
The objective of the course
--------------------------------
By conducting the course, the student masters both the principles and practice of cryptography based network security.
Course Competences
----------------------------
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
The learning objectives of the course
-------------------------------------------------
The student masters the most essential areas in data encryption: concepts, theory, the used technical implementations and systems. In addition, the student masters the principles of encryption techniques and is able to design and implement an encryption system based on requirement specification considering the existing restrictions of chosen techniques. The student is also capable of producing documentation of the implemented solution and giving a presentation of the implementation.
Content
The course contains the commonly used encryption algorithms with design and implementation of encryption systems. In addition, encryption use cases suitable for certain systems are practiced. Encryption systems are programmed during the course. Documentation of implemented solutions is created, and the implementation is presented.
The course consist of following:
-Terminology of cryptography
-Classical encryption algorithms
-Advanced symmetric and asymmetric ciphers
-Relevant data integrity algorithms
-Key management and distribution
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student can identify most common encryption techniques and solutions for network and computer infrastructure. The student is able to implement an encryption system based on given requirements. The student is capable of listing the requirements in documentation and presenting their assignment.
Satisfactory 2: The student understands most of the used encryption techniques and solutions for network and computer infrastructure. The student is able to design and implement a suitable encryption system based on given requirement specification considering general restrictions of given techniques. The student is capable of explaining the requirements to documentation and giving a presentation of his/her assignment.
Evaluation criteria, good (3-4)
Good 3: The student can select mostly used encryption techniques and solutions for network and computer infrastructure. The student is able to design and implement a suitable encryption system based on requirement specification considering known restrictions of chosen techniques. The student’s reflection on his/her learning is analytical. Generated documents meet the requirements and the student is capable of giving a presentation of his/her assignment.
Very good 4: The student is able to evaluate encryption techniques and solutions for network and computer infrastructure. The student is able to design and implement encryption system based on evaluated requirement specifications considering the assessed restrictions of chosen techniques. The student is able to reflect on their learning as planned. Generated documents are comprehensive and the student is capable of giving a fluent presentation of his/her assignment.
Evaluation criteria, excellent (5)
Excellent 5: The student is able to analytically conclude encryption technique and solutions for network and computer infrastructure. The student is able to design and implement an encryption system with produced requirement specification considering categorised restrictions of chosen techniques. The student is capable of producing analysed reflection on their learning. Generated documents are comprehensive and the student is capable of producing a fluent and analytical presentation of their assignment.
Prerequisites
Knowledge of digital technology, cyber security concepts, standards, algorithms, network protocols and layered structure of telecommunication. Capability of programming and basic knowledge of Linux environment are required.
Enrollment
01.08.2024 - 22.08.2024
Timing
26.08.2024 - 18.12.2024
Number of ECTS credits allocated
5 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- English
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Monika Wolfmayr
Groups
-
TTV22S5Tieto- ja viestintätekniikka (AMK)
-
TTV22S2Tieto- ja viestintätekniikka (AMK)
-
TTV22S3Tieto- ja viestintätekniikka (AMK)
-
TIC22S1Bachelor's Degree Programme in Information and Communications Technology
-
TTV22S1Tieto- ja viestintätekniikka (AMK)
-
TTV22S4Tieto- ja viestintätekniikka (AMK)
Objectives
The objective of the course
--------------------------------
By conducting the course, the student masters both the principles and practice of cryptography based network security.
Course Competences
----------------------------
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
The learning objectives of the course
-------------------------------------------------
The student masters the most essential areas in data encryption: concepts, theory, the used technical implementations and systems. In addition, the student masters the principles of encryption techniques and is able to design and implement an encryption system based on requirement specification considering the existing restrictions of chosen techniques. The student is also capable of producing documentation of the implemented solution and giving a presentation of the implementation.
Content
The course contains the commonly used encryption algorithms with design and implementation of encryption systems. In addition, encryption use cases suitable for certain systems are practiced. Encryption systems are programmed during the course. Documentation of implemented solutions is created, and the implementation is presented.
The course consist of following:
-Terminology of cryptography
-Classical encryption algorithms
-Advanced symmetric and asymmetric ciphers
-Relevant data integrity algorithms
-Key management and distribution
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student can identify most common encryption techniques and solutions for network and computer infrastructure. The student is able to implement an encryption system based on given requirements. The student is capable of listing the requirements in documentation and presenting their assignment.
Satisfactory 2: The student understands most of the used encryption techniques and solutions for network and computer infrastructure. The student is able to design and implement a suitable encryption system based on given requirement specification considering general restrictions of given techniques. The student is capable of explaining the requirements to documentation and giving a presentation of his/her assignment.
Evaluation criteria, good (3-4)
Good 3: The student can select mostly used encryption techniques and solutions for network and computer infrastructure. The student is able to design and implement a suitable encryption system based on requirement specification considering known restrictions of chosen techniques. The student’s reflection on his/her learning is analytical. Generated documents meet the requirements and the student is capable of giving a presentation of his/her assignment.
Very good 4: The student is able to evaluate encryption techniques and solutions for network and computer infrastructure. The student is able to design and implement encryption system based on evaluated requirement specifications considering the assessed restrictions of chosen techniques. The student is able to reflect on their learning as planned. Generated documents are comprehensive and the student is capable of giving a fluent presentation of his/her assignment.
Evaluation criteria, excellent (5)
Excellent 5: The student is able to analytically conclude encryption technique and solutions for network and computer infrastructure. The student is able to design and implement an encryption system with produced requirement specification considering categorised restrictions of chosen techniques. The student is capable of producing analysed reflection on their learning. Generated documents are comprehensive and the student is capable of producing a fluent and analytical presentation of their assignment.
Prerequisites
Knowledge of digital technology, cyber security concepts, standards, algorithms, network protocols and layered structure of telecommunication. Capability of programming and basic knowledge of Linux environment are required.
Enrollment
01.08.2023 - 24.08.2023
Timing
04.09.2023 - 19.12.2023
Number of ECTS credits allocated
5 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- English
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Monika Wolfmayr
Groups
-
TTV21S3Tieto- ja viestintätekniikka (AMK)
-
TTV21S5Tieto- ja viestintätekniikka (AMK)
-
TIC21S1Bachelor's Degree Programme in Information and Communications Technology
-
TTV21S2Tieto- ja viestintätekniikka (AMK)
-
TTV21S1Tieto- ja viestintätekniikka (AMK)
Objectives
The objective of the course
--------------------------------
By conducting the course, the student masters both the principles and practice of cryptography based network security.
Course Competences
----------------------------
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
The learning objectives of the course
-------------------------------------------------
The student masters the most essential areas in data encryption: concepts, theory, the used technical implementations and systems. In addition, the student masters the principles of encryption techniques and is able to design and implement an encryption system based on requirement specification considering the existing restrictions of chosen techniques. The student is also capable of producing documentation of the implemented solution and giving a presentation of the implementation.
Content
The course contains the commonly used encryption algorithms with design and implementation of encryption systems. In addition, encryption use cases suitable for certain systems are practiced. Encryption systems are programmed during the course. Documentation of implemented solutions is created, and the implementation is presented.
The course consist of following:
-Terminology of cryptography
-Classical encryption algorithms
-Advanced symmetric and asymmetric ciphers
-Relevant data integrity algorithms
-Key management and distribution
Learning materials and recommended literature
Lecture material will be provided by the lecturer in form of PDF presentations. The contents of the
lecture are based on the following literature:
William Stallings, Cryptography and Network Security, Principles and Practice
Bruce Schneider, Applied Cryptography, Protocols, Algorithms and Source Code in C
Jean-Philippe Aumasson, Serious Cryptography, A Practical Introduction to Modern Encryption
Teaching methods
The course consists of lectures and assignments. The course will be held every week. However, it is
possible to conduct the course mainly virtually based on the lecture materials and assignments except of
a few special lectures including a lecture given by a guest lecturer, who is highly experienced in
encryption techniques. The times of all special lectures will be announced in the beginning of the course.
The course assessment will be based on the submitted assignments during the course.
Alternative completion methods
There is no exam in the course. The assessment is based on the submitted assignments. The lecture
assignments are theoretical and practical exercises based on the topics discussed in the lectures.
Additionally, there is a practical course assignment, on which the students will work throughout the
semester, and a research assignment. The assignments are assessed based on their implementation and
the corresponding documentation.
Student workload
Totally 120h.
The course will start in week 36.
Further information for students
The course will be assessed by several smaller lecture assignments, one course assignment and one
research assignment.
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student can identify most common encryption techniques and solutions for network and computer infrastructure. The student is able to implement an encryption system based on given requirements. The student is capable of listing the requirements in documentation and presenting their assignment.
Satisfactory 2: The student understands most of the used encryption techniques and solutions for network and computer infrastructure. The student is able to design and implement a suitable encryption system based on given requirement specification considering general restrictions of given techniques. The student is capable of explaining the requirements to documentation and giving a presentation of his/her assignment.
Evaluation criteria, good (3-4)
Good 3: The student can select mostly used encryption techniques and solutions for network and computer infrastructure. The student is able to design and implement a suitable encryption system based on requirement specification considering known restrictions of chosen techniques. The student’s reflection on his/her learning is analytical. Generated documents meet the requirements and the student is capable of giving a presentation of his/her assignment.
Very good 4: The student is able to evaluate encryption techniques and solutions for network and computer infrastructure. The student is able to design and implement encryption system based on evaluated requirement specifications considering the assessed restrictions of chosen techniques. The student is able to reflect on their learning as planned. Generated documents are comprehensive and the student is capable of giving a fluent presentation of his/her assignment.
Evaluation criteria, excellent (5)
Excellent 5: The student is able to analytically conclude encryption technique and solutions for network and computer infrastructure. The student is able to design and implement an encryption system with produced requirement specification considering categorised restrictions of chosen techniques. The student is capable of producing analysed reflection on their learning. Generated documents are comprehensive and the student is capable of producing a fluent and analytical presentation of their assignment.
Prerequisites
Knowledge of digital technology, cyber security concepts, standards, algorithms, network protocols and layered structure of telecommunication. Capability of programming and basic knowledge of Linux environment are required.
Enrollment
01.08.2022 - 25.08.2022
Timing
28.09.2022 - 16.12.2022
Number of ECTS credits allocated
5 op
Virtual portion
3 op
Mode of delivery
40 % Face-to-face, 60 % Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- English
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Monika Wolfmayr
Objectives
The objective of the course
--------------------------------
By conducting the course, the student masters both the principles and practice of cryptography based network security.
Course Competences
----------------------------
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
The learning objectives of the course
-------------------------------------------------
The student masters the most essential areas in data encryption: concepts, theory, the used technical implementations and systems. In addition, the student masters the principles of encryption techniques and is able to design and implement an encryption system based on requirement specification considering the existing restrictions of chosen techniques. The student is also capable of producing documentation of the implemented solution and giving a presentation of the implementation.
Content
The course contains the commonly used encryption algorithms with design and implementation of encryption systems. In addition, encryption use cases suitable for certain systems are practiced. Encryption systems are programmed during the course. Documentation of implemented solutions is created, and the implementation is presented.
The course consist of following:
-Terminology of cryptography
-Classical encryption algorithms
-Advanced symmetric and asymmetric ciphers
-Relevant data integrity algorithms
-Key management and distribution
Time and location
Recommended literature:
- William Stalling, Cryptography and Network Security, Principles and practise. Publisher Pearson
More reading
- Bruce Schneier, Applied Cryptography. Publisher Wiley
- Jean-Philippe Aumasson, Serious Cryptography, A Practical Introduction to Modern Encryption. Publisher No starch press San Fransisco
Lecture materials are provided by the lecturer. Lecture material consists of PDF presentations based on course book.
Learning materials and recommended literature
If available, there will be visiting lecturer from industry or governmental organisation.
Teaching methods
Course is implemented by lectures and assignments. Course can be conducted virtually based on lecture materials and assignments except the lecture of visitor from industry and presentation of course assignments.
Assessment is based on assignments during the course. There is no exam in the course. Assignments are theoretical and practical exercises based on items from lectures. In addition, there is a practical course assignment and a research to be made. All the assignments are assessed based on generated implementation and documentations.
Alternative completion methods
There is no exam in the course. Assessment is based on assignments during the course. Assignments are theoretical and practical exercises based on items from lectures. In addition, there is a practical course assignment and a research to be made. All the assignments are assessed based on generated implementation and documentations.
Student workload
27h/cr, totally 135h
Further information for students
Course will be assessed based on following assignment during the course:
- Lecture assignment1
- Lecture assignment2
- Lecture assignment3
- Lecture assignment4
- Research
- Course assignment
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student can identify most common encryption techniques and solutions for network and computer infrastructure. The student is able to implement an encryption system based on given requirements. The student is capable of listing the requirements in documentation and presenting their assignment.
Satisfactory 2: The student understands most of the used encryption techniques and solutions for network and computer infrastructure. The student is able to design and implement a suitable encryption system based on given requirement specification considering general restrictions of given techniques. The student is capable of explaining the requirements to documentation and giving a presentation of his/her assignment.
Evaluation criteria, good (3-4)
Good 3: The student can select mostly used encryption techniques and solutions for network and computer infrastructure. The student is able to design and implement a suitable encryption system based on requirement specification considering known restrictions of chosen techniques. The student’s reflection on his/her learning is analytical. Generated documents meet the requirements and the student is capable of giving a presentation of his/her assignment.
Very good 4: The student is able to evaluate encryption techniques and solutions for network and computer infrastructure. The student is able to design and implement encryption system based on evaluated requirement specifications considering the assessed restrictions of chosen techniques. The student is able to reflect on their learning as planned. Generated documents are comprehensive and the student is capable of giving a fluent presentation of his/her assignment.
Evaluation criteria, excellent (5)
Excellent 5: The student is able to analytically conclude encryption technique and solutions for network and computer infrastructure. The student is able to design and implement an encryption system with produced requirement specification considering categorised restrictions of chosen techniques. The student is capable of producing analysed reflection on their learning. Generated documents are comprehensive and the student is capable of producing a fluent and analytical presentation of their assignment.
Prerequisites
Knowledge of digital technology, cyber security concepts, standards, algorithms, network protocols and layered structure of telecommunication. Capability of programming and basic knowledge of Linux environment are required.