Checking date: 19/05/2023


Course: 2023/2024

Cryptography and computer security
(15973)
Bachelor in Computer Science and Engineering (2011 Study Plan) (Plan: 256 - Estudio: 218)


Coordinating teacher: GONZALEZ-TABLAS FERRERES, ANA ISABEL

Department assigned to the subject: Computer Science and Engineering Department

Type: Compulsory
ECTS Credits: 6.0 ECTS

Course:
Semester:




Requirements (Subjects that are assumed to be known)
Programming (Course 1 / Semester 1) Discrete Mathematics (Course 1 / Semester 2) Statistics (Course 2 / Semester 1) Software development (Course 2 / Semester 2)
Objectives
The objectives of this course are for the student to recognize the current importance of cryptography and its related technologies, their weaknesses and threats. Likewise, the student must know the principles, methods and means of information security systems.
Skills and learning outcomes
Link to document

Description of contents: programme
1. Fundamentals of computer security 2. Mathematical foundations of cryptography 3. Cryptographic mechanisms and protocols 4. Authentication and Public Key Infrastructures 5. Legal aspects
Learning activities and methodology
THEORETICAL-PRACTICAL CLASSES. 1.75 ECTS with 100% attendance. Knowledge that students must acquire. They will receive class notes in electronic form and will have basic reference texts to facilitate the follow-up of the classes and the development of the subsequent work. Exercises, practical problems will be solved by the student and workshops and evaluation tests will be carried out to acquire the necessary skills. TUTORING. 0.25 ECTS with 100% attendance. Individualized assistance (individual tutorials) or in groups (collective tutorials) to students given by the teacher. STUDENT INDIVIDUAL OR GROUP WORK. 3.75 ECTS with 0% face-to-face. WORKSHOPS AND LABORATORIES. 0.25 ECTS with 100% attendance. Methodology: MASTER CLASS. Lectures in the teacher's class with the support of computer and audiovisual media, in which the main concepts of the subject are developed and materials and bibliography are provided to complement the students' learning. PRACTICES. Resolution of practical cases, problems, etc. raised by the teacher individually or in a group. TUTORING. Individualized assistance (individual tutorials) or in groups (collective tutorials) to students by the teacher. For subjects of 6 credits, 4 hours will be dedicated with 100% attendance. LABORATORY PRACTICES. Applied / experimental teaching to workshops and laboratories under the supervision of a tutor.
Assessment System
  • % end-of-term-examination 30
  • % of continuous assessment (assigments, laboratory, practicals...) 70
Calendar of Continuous assessment
Basic Bibliography
  • A.I. González-Tablas Ferreres y P. Martín González. Problem Book 2010-2015. Final Exam problem collection. Cryptography and Computer Security.. CopyRed. 2016
  • C. Paar. Understanding Cryptography: A Textbook for Students and Practitioners. Springer-Verlag. 2014
  • J. PASTOR; M.A. SARASA; J.L. SALAZAR. CRIPTOGRAFÍA DIGITAL. FUNDAMENTOS Y APLICACIONES. (2ª EDICIÓN). PRENSAS UNIVERSITARIAS DE ZARAGOZA.
  • Jean-Philippe Aumasson . Serious Cryptography: A Practical Introduction to Modern Encryption . Random House LCC US .
  • W. STALLINGS. CRYPTOGRAPHY AND NETWORK SECURITY. (5ª EDICIÓN). PRENTICE HALL.

The course syllabus may change due academic events or other reasons.