Siirry suoraan sisältöön

Salaustekniikat ja -järjestelmät (5 op)

Toteutuksen tunnus: TTC6540-3005

Toteutuksen perustiedot


Ilmoittautumisaika
04.08.2025 - 21.08.2025
Ilmoittautuminen toteutukselle on käynnissä.
Ajoitus
25.08.2025 - 19.12.2025
Toteutus ei ole vielä alkanut.
Opintopistemäärä
5 op
Lähiosuus
5 op
Toteutustapa
Lähiopetus
Yksikkö
Teknologiayksikkö
Toimipiste
Lutakon kampus
Opetuskielet
englanti
Paikat
20 - 35
Koulutus
Tieto- ja viestintätekniikka (AMK)
Bachelor's Degree Programme in Information and Communications Technology
Opettajat
Monika Wolfmayr
Ryhmät
TTV23S2
Tieto- ja viestintätekniikka (AMK)
TTV23S3
Tieto- ja viestintätekniikka (AMK)
TTV23S5
Tieto- ja viestintätekniikka (AMK)
TTV23SM
Tieto- ja viestintätekniikka (AMK)
TIC23S1
Bachelor's Degree Programme in Information and Communications Technology
TTV23S1
Tieto- ja viestintätekniikka (AMK)
Opintojakso
TTC6540

Toteutuksella on 42 opetustapahtumaa joiden yhteenlaskettu kesto on 110 t 0 min.

Aika Aihe Tila
Ma 25.08.2025 klo 09:30 - 11:30
(2 t 0 min)
Encryption Techniques and Systems TTC6540-3005
P2_D330 Ohjelmointiluokka
Ma 01.09.2025 klo 09:30 - 11:30
(2 t 0 min)
Encryption Techniques and Systems TTC6540-3005
P2_D330 Ohjelmointiluokka
Ma 08.09.2025 klo 09:30 - 11:30
(2 t 0 min)
Encryption Techniques and Systems TTC6540-3005
P2_D330 Ohjelmointiluokka
Ma 15.09.2025 klo 09:30 - 11:30
(2 t 0 min)
Encryption Techniques and Systems TTC6540-3005
P2_D330 Ohjelmointiluokka
Ma 15.09.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
P2_D426 Mediatekniikka
To 18.09.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
P2_D426 Mediatekniikka
Ma 22.09.2025 klo 09:30 - 11:30
(2 t 0 min)
Encryption Techniques and Systems TTC6540-3005
Online
Ma 22.09.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
Verkko/Online
To 25.09.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
Verkko/Online
Ma 29.09.2025 klo 09:30 - 11:30
(2 t 0 min)
Encryption Techniques and Systems TTC6540-3005
P2_D330 Ohjelmointiluokka
Ma 29.09.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
P2_D426 Mediatekniikka
To 02.10.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
P2_D426 Mediatekniikka
Ma 06.10.2025 klo 09:30 - 11:30
(2 t 0 min)
Encryption Techniques and Systems TTC6540-3005
P2_D330 Ohjelmointiluokka
Ma 06.10.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
P2_D426 Mediatekniikka
To 09.10.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
P2_D426 Mediatekniikka
Ma 20.10.2025 klo 09:30 - 11:30
(2 t 0 min)
Encryption Techniques and Systems TTC6540-3005
P2_D334 Sulautetut järjestelmät
Ma 20.10.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
P2_D426 Mediatekniikka
To 23.10.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
P2_D426 Mediatekniikka
Ma 27.10.2025 klo 09:30 - 11:30
(2 t 0 min)
Encryption Techniques and Systems TTC6540-3005
P2_D334 Sulautetut järjestelmät
Ma 27.10.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
P2_D426 Mediatekniikka
To 30.10.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
P2_D426 Mediatekniikka
Ma 03.11.2025 klo 09:30 - 11:30
(2 t 0 min)
Encryption Techniques and Systems TTC6540-3005
Online
Ma 03.11.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
Verkko/Online
To 06.11.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
Verkko/Online
Ma 10.11.2025 klo 09:30 - 11:30
(2 t 0 min)
Encryption Techniques and Systems TTC6540-3005
P2_D334 Sulautetut järjestelmät
Ma 10.11.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
P2_D426 Mediatekniikka
To 13.11.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
P2_D426 Mediatekniikka
Ma 17.11.2025 klo 09:30 - 11:30
(2 t 0 min)
Encryption Techniques and Systems TTC6540-3005
P2_D334 Sulautetut järjestelmät
Ma 17.11.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
P2_D426 Mediatekniikka
To 20.11.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
P2_D426 Mediatekniikka
Ma 24.11.2025 klo 09:30 - 11:30
(2 t 0 min)
Encryption Techniques and Systems TTC6540-3005
P2_D426 Mediatekniikka
Ma 24.11.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
P2_D426 Mediatekniikka
To 27.11.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
P2_D426 Mediatekniikka
Ma 01.12.2025 klo 09:30 - 11:30
(2 t 0 min)
Encryption Techniques and Systems TTC6540-3005
P2_D334 Sulautetut järjestelmät
Ma 01.12.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
P2_D426 Mediatekniikka
To 04.12.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
P2_D426 Mediatekniikka
Ma 08.12.2025 klo 09:30 - 11:30
(2 t 0 min)
Encryption Techniques and Systems TTC6540-3005
Online
Ma 08.12.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
Verkko/Online
To 11.12.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
Verkko/Online
Ma 15.12.2025 klo 09:30 - 11:30
(2 t 0 min)
Encryption Techniques and Systems TTC6540-3005
P2_D334 Sulautetut järjestelmät
Ma 15.12.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
P2_D426 Mediatekniikka
To 18.12.2025 klo 12:00 - 15:00
(3 t 0 min)
Ethical Hacking - Workshop
P2_D426 Mediatekniikka
Muutokset varauksiin voivat olla mahdollisia.

Arviointiasteikko

0-5

Tavoitteet

The objective of the course
--------------------------------
By conducting the course, the student masters both the principles and practice of cryptography based network security.


Course Competences
----------------------------
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 


The learning objectives of the course
-------------------------------------------------
The student masters the most essential areas in data encryption: concepts, theory, the used technical implementations and systems. In addition, the student masters the principles of encryption techniques and is able to design and implement an encryption system based on requirement specification considering the existing restrictions of chosen techniques. The student is also capable of producing documentation of the implemented solution and giving a presentation of the implementation.

Sisältö

The course contains the commonly used encryption algorithms with design and implementation of encryption systems. In addition, encryption use cases suitable for certain systems are practiced. Encryption systems are programmed during the course. Documentation of implemented solutions is created, and the implementation is presented.

The course consist of following:
-Terminology of cryptography
-Classical encryption algorithms
-Advanced symmetric and asymmetric ciphers
-Relevant data integrity algorithms
-Key management and distribution

Arviointikriteerit, tyydyttävä (1)

Sufficient 1: The student can identify most common encryption techniques and solutions for network and computer infrastructure. The student is able to implement an encryption system based on given requirements. The student is capable of listing the requirements in documentation and presenting their assignment.

Satisfactory 2: The student understands most of the used encryption techniques and solutions for network and computer infrastructure. The student is able to design and implement a suitable encryption system based on given requirement specification considering general restrictions of given techniques. The student is capable of explaining the requirements to documentation and giving a presentation of his/her assignment.

Arviointikriteerit, hyvä (3)

Good 3: The student can select mostly used encryption techniques and solutions for network and computer infrastructure. The student is able to design and implement a suitable encryption system based on requirement specification considering known restrictions of chosen techniques. The student’s reflection on his/her learning is analytical. Generated documents meet the requirements and the student is capable of giving a presentation of his/her assignment.

Very good 4: The student is able to evaluate encryption techniques and solutions for network and computer infrastructure. The student is able to design and implement encryption system based on evaluated requirement specifications considering the assessed restrictions of chosen techniques. The student is able to reflect on their learning as planned. Generated documents are comprehensive and the student is capable of giving a fluent presentation of his/her assignment.

Arviointikriteerit, kiitettävä (5)

Excellent 5: The student is able to analytically conclude encryption technique and solutions for network and computer infrastructure. The student is able to design and implement an encryption system with produced requirement specification considering categorised restrictions of chosen techniques. The student is capable of producing analysed reflection on their learning. Generated documents are comprehensive and the student is capable of producing a fluent and analytical presentation of their assignment.

Esitietovaatimukset

Knowledge of digital technology, cyber security concepts, standards, algorithms, network protocols and layered structure of telecommunication. Capability of programming and basic knowledge of Linux environment are required.

Siirry alkuun