Checking date: 20/05/2022


Course: 2022/2023

Cryptography and computer security
(15973)
Study: Dual Bachelor in Computer Science and Engineering, and Business Administration (233)


Coordinating teacher: FUENTES GARCIA-ROMERO DE TEJADA, JOSE MARIA DE

Department assigned to the subject: Department of Computer Science and Engineering

Type: Compulsory
ECTS Credits: 6.0 ECTS

Course:
Semester:




Requirements (Subjects that are assumed to be known)
Programming (Course 1 / Semester 1) Discrete Mathematics (Course 1 / Semester 2) Statistics II (Course 2 / Semester 1) Software development (Course 3 / Semester 2)
Objectives
The objectives of this course are for the student to recognize the current importance of cryptography and its related technologies, their weaknesses and threats. Likewise, the student must know the principles, methods and means of information security systems.
Skills and learning outcomes
Description of contents: programme
1. Fundamentals of computer security 2. Mathematical foundations of cryptography 3. Cryptographic mechanisms and protocols 4. Authentication and Public Key Infrastructures 5. Legal aspects
Learning activities and methodology
¿ THEORETICAL-PRACTICAL CLASSES. 1.75 ECTS with 100% attendance. Knowledge that students must acquire. They will receive class notes in electronic form and will have basic reference texts to facilitate the follow-up of the classes and the development of the subsequent work. Exercises, practical problems will be solved by the student and workshops and evaluation tests will be carried out to acquire the necessary skills. ¿ TUTORING. 0.25 ECTS with 100% attendance. Individualized assistance (individual tutorials) or in groups (collective tutorials) to students given by the teacher. ¿ STUDENT INDIVIDUAL OR GROUP WORK. 3.75 ECTS with 0% face-to-face. ¿ WORKSHOPS AND LABORATORIES. 0.25 ECTS with 100% attendance. Methodology: ¿ MASTER CLASS. Lectures in the teacher's class with the support of computer and audiovisual media, in which the main concepts of the subject are developed and materials and bibliography are provided to complement the students' learning. ¿ PRACTICES. Resolution of practical cases, problems, etc. raised by the teacher individually or in a group. ¿ TUTORING. Individualized assistance (individual tutorials) or in groups (collective tutorials) to students by the teacher. For subjects of 6 credits, 4 hours will be dedicated with 100% attendance. ¿ LABORATORY PRACTICES. Applied / experimental teaching to workshops and laboratories under the supervision of a tutor.
Assessment System
  • % end-of-term-examination 30
  • % of continuous assessment (assigments, laboratory, practicals...) 70
Calendar of Continuous assessment
Basic Bibliography
  • A.I. González-Tablas Ferreres y P. Martín González. Problem Book 2010-2015. Final Exam problem collection. Cryptography and Computer Security.. CopyRed. 2016
  • C. Paar. Understanding Cryptography: A Textbook for Students and Practitioners. Springer-Verlag. 2014
  • J. PASTOR; M.A. SARASA; J.L. SALAZAR. CRIPTOGRAFÍA DIGITAL. FUNDAMENTOS Y APLICACIONES. (2ª EDICIÓN). PRENSAS UNIVERSITARIAS DE ZARAGOZA.
  • Jean-Philippe Aumasson . Serious Cryptography: A Practical Introduction to Modern Encryption . Random House LCC US .
  • W. STALLINGS. CRYPTOGRAPHY AND NETWORK SECURITY. (5ª EDICIÓN). PRENTICE HALL.

The course syllabus may change due academic events or other reasons.