Applied mathematics: Cryptology (3 cr)
Code: TZLM7020-3003
General information
Enrollment
01.11.2022 - 05.01.2023
Timing
06.03.2023 - 28.04.2023
Number of ECTS credits allocated
3 op
Virtual portion
1 op
Mode of delivery
67 % Face-to-face, 33 % Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- English
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Sirpa Alestalo
Groups
-
TIC21S1Bachelor's Degree Programme in Information and Communications Technology
Objective
Course purpose
Cryptology is an alternative to the applied mathematics course in information and communication technology. In this course, you will focus your knowledge on the mathematics needed in information security and especially encryption methods.
Course competences
EUR-ACE Knowledge and understanding
• knowledge and understanding of mathematics needed in information and communication technology
• knowledge and understanding of engineering fundamentals underlying the specialisation, at a level necessary to achieve the other programme outcomes, including some awareness at their forefront
EUR-ACE Engineering Practice
• understanding of applicable techniques and methods of analysis, design and investigation and of their limitations in their field of study
Learning outcomes
You know and understand the mathematical principles of the most common encryption methods. You can solve simple linear congruences. You know how to choose the encryption method that suits the situation and you have the skills to deepen your knowledge independently.
Content
Properties of functions (surjection, injection, bijection), number theory (divisibility, prime numbers, congruence, modular arithmetic), random number generation, classical encryption methods, symmetric and asymmetric encryption, elliptic curves
Location and time
The course is implemented between 13.3.2023 and 28.4.2023
Oppimateriaali ja suositeltava kirjallisuus
Course material consists of written material and video material available in the e-learning environment (Moodle).
Teaching methods
Contact teaching 2+2 h/week, with lecture and exercises.
Returnable exercises.
Weekly tests in a learning environment.
Voluntary practical work independently.
Video tutorials for independent study
Exam schedules
The timetable of the course is agreed on at the first meeting of the course and then published in the e-learning environment.
Student workload
Lectures and exercises 30 h
Returnable exercises 18 h
Weekly tests 5 h
Independent study and exam 25 h
Further information
The course is evaluated using an exam, returnable exercises, weekly tests and voluntary practice work.
Pass requirements are
-at least 50 % of the maximum course scores
-at least one third of the maximum exam scores
Evaluation scale
Pass/Fail
Assessment criteria, approved/failed
You know and understand the key mathematical concepts and calculation rules related to cryptology. You can solve simple linear congruences. You understand the mathematical principles of encryption methods and know the purposes of different encryption methods. After the course, you will be able to study more about the subject on your own.
Qualifications
You know the basics of set theory and combinatorics, you understand the concept of divisibility and congruence.