Siirry suoraan sisältöön

Applied mathematics: Cryptology (3 cr)

Code: TZLM7020-3003

General information


Enrollment

01.11.2022 - 05.01.2023

Timing

06.03.2023 - 28.04.2023

Number of ECTS credits allocated

3 op

Virtual portion

1 op

Mode of delivery

67 % Face-to-face, 33 % Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages

  • English

Seats

0 - 35

Degree programmes

  • Bachelor's Degree Programme in Information and Communications Technology

Teachers

  • Sirpa Alestalo

Groups

  • TIC21S1
    Bachelor's Degree Programme in Information and Communications Technology

Objective

Course purpose
Cryptology is an alternative to the applied mathematics course in information and communication technology. In this course, you will focus your knowledge on the mathematics needed in information security and especially encryption methods.

Course competences
EUR-ACE Knowledge and understanding
• knowledge and understanding of mathematics needed in information and communication technology
• knowledge and understanding of engineering fundamentals underlying the specialisation, at a level necessary to achieve the other programme outcomes, including some awareness at their forefront
EUR-ACE Engineering Practice
• understanding of applicable techniques and methods of analysis, design and investigation and of their limitations in their field of study

Learning outcomes
You know and understand the mathematical principles of the most common encryption methods. You can solve simple linear congruences. You know how to choose the encryption method that suits the situation and you have the skills to deepen your knowledge independently.

Content

Properties of functions (surjection, injection, bijection), number theory (divisibility, prime numbers, congruence, modular arithmetic), random number generation, classical encryption methods, symmetric and asymmetric encryption, elliptic curves

Location and time

The course is implemented between 13.3.2023 and 28.4.2023

Oppimateriaali ja suositeltava kirjallisuus

Course material consists of written material and video material available in the e-learning environment (Moodle).

Teaching methods

Contact teaching 2+2 h/week, with lecture and exercises.
Returnable exercises.
Weekly tests in a learning environment.
Voluntary practical work independently.
Video tutorials for independent study

Exam schedules

The timetable of the course is agreed on at the first meeting of the course and then published in the e-learning environment.

Student workload

Lectures and exercises 30 h
Returnable exercises 18 h
Weekly tests 5 h
Independent study and exam 25 h

Further information

The course is evaluated using an exam, returnable exercises, weekly tests and voluntary practice work.
Pass requirements are
-at least 50 % of the maximum course scores
-at least one third of the maximum exam scores

Evaluation scale

Pass/Fail

Assessment criteria, approved/failed

You know and understand the key mathematical concepts and calculation rules related to cryptology. You can solve simple linear congruences. You understand the mathematical principles of encryption methods and know the purposes of different encryption methods. After the course, you will be able to study more about the subject on your own.

Qualifications

You know the basics of set theory and combinatorics, you understand the concept of divisibility and congruence.