Educational guide | ||||||||||||||||||||||
IDENTIFYING DATA | 2023_24 | |||||||||||||||||||||
Subject | MATHEMATICS FOR CYBERSECURITY I - CRYPTOGRAPHY | Code | 01732102 | |||||||||||||||||||
Study programme | ||||||||||||||||||||||
Descriptors | Credit. | Type | Year | Period | ||||||||||||||||||
6 | Compulsory | First | ||||||||||||||||||||
Language |
|
|||||||||||||||||||||
Prerequisites | ||||||||||||||||||||||
Department | ||||||||||||||||||||||
Coordinador | ||||||||||||||||||||||
Lecturers | |
|||||||||||||||||||||
Web | http:// | |||||||||||||||||||||
General description | ||||||||||||||||||||||
Tribunales de Revisión |
|
|||||||||||||||||||||
Competencies |
Type A | Code | Competences Specific |
Type B | Code | Competences Transversal |
Type C | Code | Competences Nuclear |
C1 | ||
C2 | ||
C3 | ||
C4 | ||
C5 |
Learning aims |
Competences | |||
Understand and apply cryptographic protocols and the mathematical concepts related. | A17031 A17037 A17038 |
B5214 B5217 B5218 B5219 |
C1 C2 C3 C4 C5 |
Apply the concepts learnt doing the assignments. | A17031 A17037 A17038 |
B5214 B5218 B5219 |
C1 C2 C3 C4 C5 |
Contents |
Topic | Sub-topic |
1. Modular arithmetic and elliptic and hyperelliptic curves. | |
2. Basic combinatorics. | |
3. Information Theory: fundamentals and Definitions. | |
4. Symmetric Cryptography. | |
5. Asymmetric Cryptography. | |
6. Compression functions. | |
7. Pseudo-random number generation. | |
8. Cryptanalysis. |
Planning |
Methodologies :: Tests | |||||||||
Class hours | Hours outside the classroom | Total hours | |||||||
Problem solving, classroom exercises | 12 | 18 | 30 | ||||||
Portfolios/Learning folder | 5 | 40 | 45 | ||||||
Personal tuition | 1 | 0 | 1 | ||||||
Lecture | 25 | 44 | 69 | ||||||
Extended-answer tests | 3 | 0 | 3 | ||||||
Practical tests | 2 | 0 | 2 | ||||||
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students. |
Methodologies |
Description | |
Problem solving, classroom exercises | Lectures where problems and theoretical questions about the contents of the course are discussed. |
Portfolios/Learning folder | Technique for learning how to compile and organize evidence that encourages the student to reflect on his or her progress and demonstrates that he or she has achieved the professional competences which enable him or her to work professionally. |
Personal tuition | Time to provide support to the student's concerns on the topics covered |
Lecture | The contents of the course are presented. |
Personalized attention |
|
|
Assessment |
Description | Qualification | ||
Portfolios/Learning folder | Technique for learning how to compile and organize evidence that encourages the student to reflect on his or her progress and demonstrates that he or she has achieved the professional competences which enable him or her to work professionally. | 50% | |
Extended-answer tests | Written tests to evaluate the competences acquired in the lectures and problem-solving classes. | 50% | |
Other comments and second call | |||
<p>The grade wil be computed attending to two types of assessment: summative and continuous. In order to pass the course, it is necessary to obtain a grade of at least 50% . The final grade will be computed only if the student has a grade of at least 40% in every assignment and test. &nbsp;</p><p>The sumative part will be assessed with at least a test, accounting for 50% of the total grade, which might contain both theoretical and practical questions. Specific software might be suitable and required to solve some of these questions. &nbsp;</p><p>As for the continuous assessment, the students will need to elaborate a portfolio, consisting of several assignments (to be done individually and /or in groups) which will be proposed along the term. This part will account for 50% of the total grade.&nbsp;</p><p>The grade of the second call will be the grade obtained in a theoretical-practical test. &nbsp;</p><p>The use of any electronic device (cell phones, tablets, etc) allowing the student to have communication with other people will be forbidden while doing the tests, as well as any material not explicitly allowed by the professor.&nbsp;</p><p>&nbsp;If a student breaks this rule, he will fail the exam and the Academic Authority of the Center will be informed so that they can follow the procedure approved by the&nbsp;Governing Council of the University on January 29th, 2015.</p> |
Sources of information |
Access to Recommended Bibliography in the Catalog ULE |
Basic |
Menezes, A., van Oorschot, P., Vanstone, S. , Handbook of Applied Cryptograpy , CRC Press , Katz,J, Lindell, Y. , Introduction to modern cryptography , , Smart, N. , Cryptography: An Introduction , , www.cs.umd.edu/~waa/414-F11/IntroToCrypto.pdf González Vasco, M.I., Steinwandt, R. , Group Theoretic Cryptography , Chapman & Hall/ CRC, Paar, C. , Pelzl, J. , Understanding Cryptography, Springer, |
Complementary |
Niels Ferguson, Bruce Schneier, Tadayoshi Kahna, Cryptography Engineering: Design Principles and Practical Applications, Wiley, |
Recommendations |
Other comments | |
It is recommended to have attended a course on Discrete Mathematics. |