Checking date: 21/02/2025


Course: 2024/2025

Cryptography and computer security
(15973)
Bachelor in Computer Science and Engineering (Plan: 489 - Estudio: 218)


Coordinating teacher: GONZALEZ-TABLAS FERRERES, ANA ISABEL

Department assigned to the subject: Computer Science and Engineering Department

Type: Compulsory
ECTS Credits: 6.0 ECTS

Course:
Semester:




Requirements (Subjects that are assumed to be known)
Programming (Course 1 / Semester 1) Discrete Mathematics (Course 1 / Semester 2) Statistics (Course 2 / Semester 1) Software development (Course 2 / Semester 2)
Objectives
The objectives of this course are for the student to recognize the current importance of cryptography and its related technologies, their weaknesses and threats. Likewise, the student must know the principles, methods and means of information security systems.
Learning Outcomes
RA1.1: Knowledge and understanding of the mathematics and other basic sciences underlying their engineering specialisation, at a level necessary to achieve the other programme outcomes. RA2.2: Ability to identify, formulate and solve engineering problems in their field of study; to select and apply relevant methods from established analytical, computational and experimental methods; to recognise the importance of non-technical societal, health and safety, environmental, economic and industrial constraints. RA3.1: Ability to develop and design complex products (devices, artefacts, etc.), processes and systems in their field of study to meet established requirements, that can include an awareness of non-technical ¿ societal, health and safety, environmental, economic and industrial ¿ considerations; to select and apply relevant design methodologies. CB1: Students have demonstrated possession and understanding of knowledge in an area of study that builds on the foundation of general secondary education, and is usually at a level that, while relying on advanced textbooks, also includes some aspects that involve knowledge from the cutting edge of their field of study. CGO3: Ability to design, develop, evaluate and ensure the accessibility, ergonomics, usability and security of computer systems, services and applications, as well as the information they manage. CECRI1: Ability to design, develop, select and evaluate computer applications and systems, ensuring their reliability, security and quality, in accordance with ethical principles and current legislation and regulations.
Description of contents: programme
1. Fundamentals of computer security 2. Mathematical foundations of cryptography 3. Cryptographic mechanisms and protocols 4. Authentication and Public Key Infrastructures 5. Legal aspects
Learning activities and methodology
THEORETICAL-PRACTICAL CLASSES. 1.75 ECTS with 100% attendance. Knowledge that students must acquire. They will receive class notes in electronic form and will have basic reference texts to facilitate the follow-up of the classes and the development of the subsequent work. Exercises, practical problems will be solved by the student and workshops and evaluation tests will be carried out to acquire the necessary skills. TUTORING. 0.25 ECTS with 100% attendance. Individualized assistance (individual tutorials) or in groups (collective tutorials) to students given by the teacher. STUDENT INDIVIDUAL OR GROUP WORK. 3.75 ECTS with 0% face-to-face. WORKSHOPS AND LABORATORIES. 0.25 ECTS with 100% attendance. Methodology: MASTER CLASS. Lectures in the teacher's class with the support of computer and audiovisual media, in which the main concepts of the subject are developed and materials and bibliography are provided to complement the students' learning. PRACTICES. Resolution of practical cases, problems, etc. raised by the teacher individually or in a group. TUTORING. Individualized assistance (individual tutorials) or in groups (collective tutorials) to students by the teacher. For subjects of 6 credits, 4 hours will be dedicated with 100% attendance. LABORATORY PRACTICES. Applied / experimental teaching to workshops and laboratories under the supervision of a tutor.
Assessment System
  • % end-of-term-examination 40
  • % of continuous assessment (assigments, laboratory, practicals...) 60

Calendar of Continuous assessment


Extraordinary call: regulations
Basic Bibliography
  • A.I. González-Tablas Ferreres y P. Martín González. Problem Book 2010-2015. Final Exam problem collection. Cryptography and Computer Security.. CopyRed. 2016
  • C. Paar. Understanding Cryptography: A Textbook for Students and Practitioners. Springer-Verlag. 2014
  • J. PASTOR; M.A. SARASA; J.L. SALAZAR. CRIPTOGRAFÍA DIGITAL. FUNDAMENTOS Y APLICACIONES. (2ª EDICIÓN). PRENSAS UNIVERSITARIAS DE ZARAGOZA.
  • Jean-Philippe Aumasson . Serious Cryptography: A Practical Introduction to Modern Encryption . Random House LCC US .
  • W. STALLINGS. CRYPTOGRAPHY AND NETWORK SECURITY. (5ª EDICIÓN). PRENTICE HALL.

The course syllabus may change due academic events or other reasons.