Encryption Techniques and Systems (5 op)
Toteutuksen tunnus: TTKS0600-9S0V1
Toteutuksen perustiedot
- Ajoitus
-
01.08.2019 - 31.12.2019
Toteutus on päättynyt.
- Opintopistemäärä
- 5 op
- Lähiosuus
- 5 op
- Toteutustapa
- Lähiopetus
- Yksikkö
- Teknologiayksikkö
- Opetuskielet
- englanti
- Koulutus
- Tieto- ja viestintätekniikka (AMK)
Arviointiasteikko
0-5
Tavoitteet
The student masters both the principles and practice of cryptography based network security. The student masters the most essential areas in data encryption: concepts, theory, the used technical implementations and systems. In addition, the student masters the principles of encryption techniques and is able to design and implement an encryption system based on requirement specification considering the existing restrictions of chosen techniques. The student is also capable of producing documentation of the implemented solution and giving a presentation of the implementation.
Course Competences
----------------------------
EU-EE: EUR-ACE Engineering Design
EU-EN: EUR-ACE Engineering Analysis
EU-ER: EUR-ACE Engineering Practice
Sisältö
The course contains the commonly used encryption algorithms with design and implementation of encryption systems. In addition, encryption use cases suitable for certain systems are practiced. Encryption systems are programmed during the course. Documentation of implemented solutions is created.
Oppimateriaalit
Lecture material is provided by the lecturer. Lecture material consists of PDF presentations based on course book and technical reports/technical documents. The course material is located in Optima.(learning platform)
Toteutuksen valinnaiset suoritustavat
Assignments 100%
Opiskelijan ajankäyttö ja kuormitus
o Lectures 21h o Assignments and independent study 114h(including possible excursion if available)
Arviointikriteerit, tyydyttävä (1)
Sufficient 1: The student can identify most common encryption techniques and solutions for network and computer infrastructure. The student is able to implement an encryption system based on given requirements. The student is capable of listing the requirements in documentation and showing presentation of their assignment.
Satisfactory 2: The student understands most of the used encryption techniques and solutions for network and computer infrastructure. The student is able to design and implement suitable encryption system based on given requirement specification considering general restrictions of given techniques. The student is capable of explaining the requirements to documentation and giving a presentation of their assignment.
Arviointikriteerit, hyvä (3)
Good 3: The student can select mostly used encryption techniques and solutions for network and computer infrastructure. The student is able to design and implement suitable encryption system based on requirement specification considering known restrictions of chosen techniques. The student’s reflection on his/her learning is analytical. Generated documents meet the requirements and the student is capable of giving a presentation of their assignment.
Very good 4: The student is able to estimate encryption techniques and solutions for network and computer infrastructure. The student is able to design and implement encryption system based on evaluated requirement specifications considering the assessed restrictions of chosen techniques. The student is able to reflect his/her learning as planned. Generated documents are comprehensive and the student is capable of giving a fluent presentation of their assignment.
Arviointikriteerit, kiitettävä (5)
Excellent 5: The student is able to analytically conclude encryption technique and solutions for network and computer infrastructure. The student is able to design and implement an encryption system with produced requirement specification considering categorised restrictions of chosen techniques. The student is capable for producing analysed reflection on his/her learning. Generated documents are comprehensive and the student is capable of producing a fluent and analytical presentation of their assignment.
Esitietovaatimukset
Knowledge of digital technology, cyber security concepts, standards, algorithms, network protocols and layered structure of telecommunication. Capability of programming.
Lisätiedot
Course consists of following items: Terminology of Internet/computer security and cryptography Classical encryption algorithms Advanced symmetric and asymmetric ciphers Use of algorithms, protocols Data integrity algorithms,Key management and distribution, User authentication, VAHTI document on encryption practices Cryptography in network and Internet security