Educational guide
IDENTIFYING DATA 2023_24
Subject MATHEMATICS FOR CYBERSECURITY I - CRYPTOGRAPHY Code 01732102
Study programme
Descriptors Credit. Type Year Period
6 Compulsory First
Language
Castellano
Prerequisites
Department
Coordinador
E-mail
Lecturers
Web http://
General description
Tribunales de Revisión
Tribunal titular
Cargo Departamento Profesor
Tribunal suplente
Cargo Departamento Profesor

Competencies
Type A Code Competences Specific
Type B Code Competences Transversal
Type C Code Competences Nuclear
  C1
  C2
  C3
  C4
  C5

Learning aims
Competences
Understand and apply cryptographic protocols and the mathematical concepts related. A17031
A17037
A17038
B5214
B5217
B5218
B5219
C1
C2
C3
C4
C5
Apply the concepts learnt doing the assignments. A17031
A17037
A17038
B5214
B5218
B5219
C1
C2
C3
C4
C5

Contents
Topic Sub-topic
1. Modular arithmetic and elliptic and hyperelliptic curves.
2. Basic combinatorics.
3. Information Theory: fundamentals and Definitions.
4. Symmetric Cryptography.
5. Asymmetric Cryptography.
6. Compression functions.
7. Pseudo-random number generation.
8. Cryptanalysis.

Planning
Methodologies  ::  Tests
  Class hours Hours outside the classroom Total hours
Problem solving, classroom exercises 12 18 30
 
Portfolios/Learning folder 5 40 45
Personal tuition 1 0 1
 
Lecture 25 44 69
 
Extended-answer tests 3 0 3
Practical tests 2 0 2
 
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students.

Methodologies
Methodologies   ::  
  Description
Problem solving, classroom exercises Lectures where problems and theoretical questions about the contents of the course are discussed.
Portfolios/Learning folder Technique for learning how to compile and organize evidence that encourages the student to reflect on his or her progress and demonstrates that he or she has achieved the professional competences which enable him or her to work professionally.
Personal tuition Time to provide support to the student's concerns on the topics covered
Lecture The contents of the course are presented.

Personalized attention
 
Personal tuition
Description
Students can have personalized attention by email, using the forum in Moodle or scheduling a videoconference.

Assessment
  Description Qualification
Portfolios/Learning folder Technique for learning how to compile and organize evidence that encourages the student to reflect on his or her progress and demonstrates that he or she has achieved the professional competences which enable him or her to work professionally. 50%
Extended-answer tests Written tests to evaluate the competences acquired in the lectures and problem-solving classes. 50%
 
Other comments and second call
<p>The grade wil be computed attending to two types of assessment: summative and continuous. In order to pass the course, it is necessary to obtain a grade of at least 50% . The final grade will be computed only if the student has a grade of at least 40% in every assignment and test.  </p><p>The sumative part will be assessed with at least a test, accounting for 50% of the total grade, which might contain both theoretical and practical questions. Specific software might be suitable and required to solve some of these questions.  </p><p>As for the continuous assessment, the students will need to elaborate a portfolio, consisting of several assignments (to be done individually and /or in groups) which will be proposed along the term. This part will account for 50% of the total grade. </p><p>The grade of the second call will be the grade obtained in a theoretical-practical test.  </p><p>The use of any electronic device (cell phones, tablets, etc) allowing the student to have communication with other people will be forbidden while doing the tests, as well as any material not explicitly allowed by the professor. </p><p> If a student breaks this rule, he will fail the exam and the Academic Authority of the Center will be informed so that they can follow the procedure approved by the Governing Council of the University on January 29th, 2015.</p>

Sources of information
Access to Recommended Bibliography in the Catalog ULE

Basic Menezes, A., van Oorschot, P., Vanstone, S. , Handbook of Applied Cryptograpy , CRC Press ,
Katz,J, Lindell, Y. , Introduction to modern cryptography , ,
Smart, N. , Cryptography: An Introduction , , www.cs.umd.edu/~waa/414-F11/IntroToCrypto.pdf
González Vasco, M.I., Steinwandt, R. , Group Theoretic Cryptography , Chapman & Hall/ CRC,
Paar, C. , Pelzl, J. , Understanding Cryptography, Springer,

Complementary Niels Ferguson, Bruce Schneier, Tadayoshi Kahna, Cryptography Engineering: Design Principles and Practical Applications, Wiley,


Recommendations


 
Other comments
It is recommended to have attended a course on Discrete Mathematics.