Moduł oferowany także w ramach programów studiów:
Informacje ogólne:
Nazwa:
Securing Data Transmission: Cryptology, Watermarking and Steganography
Tok studiów:
2019/2020
Kod:
IETP-1-621-s
Wydział:
Informatyki, Elektroniki i Telekomunikacji
Poziom studiów:
Studia I stopnia
Specjalność:
-
Kierunek:
Elektronika i Telekomunikacja
Semestr:
6
Profil:
Ogólnoakademicki (A)
Język wykładowy:
Angielski
Forma studiów:
Stacjonarne
Prowadzący moduł:
dr hab. inż, prof. AGH Chołda Piotr (cholda@agh.edu.pl)
Treści programowe zapewniające uzyskanie efektów uczenia się dla modułu zajęć

Presentation of fundamental concepts of cryptography applied in securing of computer and communication networks.

Opis efektów uczenia się dla modułu zajęć
Kod MEU Student, który zaliczył moduł zajęć zna i rozumie/potrafi/jest gotów do Powiązania z KEU Sposób weryfikacji i oceny efektów uczenia się osiągniętych przez studenta w ramach poszczególnych form zajęć i dla całego modułu zajęć
Wiedza: zna i rozumie
M_W001 The student knows mathematical foundations behind cryptographical, watermarking and steganographical concepts. ETP1A_W01, ETP1A_W10 Zaliczenie laboratorium,
Wykonanie projektu,
Sprawozdanie,
Projekt,
Aktywność na zajęciach,
Wykonanie ćwiczeń laboratoryjnych,
Prezentacja,
Udział w dyskusji
M_W002 The student is aware of basic methods used for securing communications. ETP1A_W10 Zaliczenie laboratorium,
Wykonanie projektu,
Sprawozdanie,
Przygotowanie i przeprowadzenie badań,
Projekt,
Aktywność na zajęciach,
Wykonanie ćwiczeń laboratoryjnych,
Prezentacja,
Udział w dyskusji
Umiejętności: potrafi
M_U001 The student is able to learn on her/his own and use the scientific literature, draw conclusions and creatively solve challenging problems related to secure communications. ETP1A_U03, ETP1A_U04, ETP1A_U05, ETP1A_U02, ETP1A_U06 Zaliczenie laboratorium,
Wykonanie ćwiczeń laboratoryjnych,
Wykonanie projektu,
Sprawozdanie,
Aktywność na zajęciach,
Prezentacja,
Udział w dyskusji,
Projekt
M_U002 The student can convincingly formulate a current engineering or research problem to be solved with use of cryptography. ETP1A_U03, ETP1A_U04, ETP1A_U05, ETP1A_U02, ETP1A_U06 Zaliczenie laboratorium,
Wykonanie ćwiczeń laboratoryjnych,
Wykonanie projektu,
Sprawozdanie,
Aktywność na zajęciach,
Udział w dyskusji,
Projekt
M_U003 Is able to effectively communicate in English in relatation to topics concering security and cryptography. ETP1A_U05 Wykonanie ćwiczeń laboratoryjnych,
Projekt,
Prezentacja
Kompetencje społeczne: jest gotów do
M_K001 The student can critically and creatively approach the posed problem related to application of cryptography in the network environment. She/he is able to formulate a problem and analyse it on her/his own, solve the problem, as well as concisely explain the proposed solution to a broader public. ETP1A_K04, ETP1A_K05, ETP1A_K01, ETP1A_K03 Wykonanie projektu,
Prezentacja,
Projekt
Liczba godzin zajęć w ramach poszczególnych form zajęć:
SUMA (godz.)
Wykład
Ćwicz. aud
Ćwicz. lab
Ćw. proj.
Konw.
Zaj. sem.
Zaj. prakt
Zaj. terenowe
Zaj. warsztatowe
Prace kontr. przejść.
Lektorat
50 16 0 0 24 0 10 0 0 0 0 0
Matryca kierunkowych efektów uczenia się w odniesieniu do form zajęć i sposobu zaliczenia, które pozwalają na ich uzyskanie
Kod MEU Student, który zaliczył moduł zajęć zna i rozumie/potrafi/jest gotów do Forma zajęć dydaktycznych
Wykład
Ćwicz. aud
Ćwicz. lab
Ćw. proj.
Konw.
Zaj. sem.
Zaj. prakt
Zaj. terenowe
Zaj. warsztatowe
Prace kontr. przejść.
Lektorat
Wiedza
M_W001 The student knows mathematical foundations behind cryptographical, watermarking and steganographical concepts. - - - + - + - - - - -
M_W002 The student is aware of basic methods used for securing communications. - - - + - + - - - - -
Umiejętności
M_U001 The student is able to learn on her/his own and use the scientific literature, draw conclusions and creatively solve challenging problems related to secure communications. + - - + - + - - - - -
M_U002 The student can convincingly formulate a current engineering or research problem to be solved with use of cryptography. + - - + - + - - - - -
M_U003 Is able to effectively communicate in English in relatation to topics concering security and cryptography. + - - + - + - - - - -
Kompetencje społeczne
M_K001 The student can critically and creatively approach the posed problem related to application of cryptography in the network environment. She/he is able to formulate a problem and analyse it on her/his own, solve the problem, as well as concisely explain the proposed solution to a broader public. + - - + - + - - - - -
Nakład pracy studenta (bilans punktów ECTS)
Forma aktywności studenta Obciążenie studenta
Sumaryczne obciążenie pracą studenta 90 godz
Punkty ECTS za moduł 3 ECTS
Udział w zajęciach dydaktycznych/praktyka 50 godz
Przygotowanie do zajęć 10 godz
przygotowanie projektu, prezentacji, pracy pisemnej, sprawozdania 15 godz
Samodzielne studiowanie tematyki zajęć 15 godz
Szczegółowe treści kształcenia w ramach poszczególnych form zajęć (szczegółowy program wykładów i pozostałych zajęć)
Wykład (16h):
  1. There are five lectures on fundamental aspects of cryptography.

    The following problems are going to be covered during the lectures:

    • Substitution and transposition ciphers.
    • Affine ciphers.
    • Perfect secrecy.
    • Symmetric cryptography.
    • DES. AES.
    • Public-key encryption.
    • Integer numbers and modular arithmetic (congruences). Factoring. Discrete logarithms.
    • RSA.
    • Cryptographic hash functions.
    • Identification. Digital signatures.
    • Public-key infrastructures.

  2. There are eight lectures on fundamental aspects of cryptography, watermarking and steganography

    The following problems are going to be covered during the lectures:

    • Substitution and transposition ciphers.
    • Affine ciphers.
    • Perfect secrecy.
    • Symmetric cryptography.
    • DES. AES.
    • Public-key encryption.
    • Integer numbers and modular arithmetic (congruences). Factoring. Discrete logarithms.
    • RSA.
    • Cryptographic hash functions.
    • Digital signatures. Public-key infrastructures.
    • Digital watermarking.
    • Steganography and steganalysis.
    • Network steganography.

Ćwiczenia projektowe (24h):
  1. The project is aimed at implementation of selected cryptographic methods

    Implementation of a selected cryptographic method related to a standard proposed or used in contemporary telecommunications. Examples: implementation of IETF RFC 8032. After completing the implementation, it is necessary to prepare a short documentation to present the project to the classmates. The project is performed in small teams.

  2. The project is aimed at implementation of selected cryptographic methods

    Implementation of a selected cryptographic method related to a standard proposed or used in contemporary telecommunications. Examples: implementation of IETF RFC 8032. After finishing the implementation, it is necessary to prepare a short documentation to present the project to the classmates.

Zajęcia seminaryjne (10h):
  1. The seminar is aimed at extending the selected topics

    The participants are obliged to get to know some materials before the seminar meeting, and during the meeting the problems are discussed in open. The discussion is led by a group of the participants with the help of the prepared presentation.

    The subset of the following topics is going to be covered at participants’ discretion: machine learning in network security, biometry, steganography, cryptography based on elliptic curves, generation of prime numbers, secret sharing, quantum cryptography, post-quantum cryptography.

  2. The seminar is aimed at extending the selected topics

    The seminar work is based on one of the b-learning concepts, in this case the so-called mutual teaching. The participants are obliged to get to know some materials before the seminar meeting, and during the meeting the problems are discussed in open. The discussion is led by a group of the participants with the help of the prepared presentation.

    The subset of the following topics is going to be covered at participants’ discretion: machine learning in network security, biometry, watermarking, steganography, cryptography based on elliptic curves, generation of prime numbers, secret sharing, quantum cryptography, post-quantum cryptography.

Pozostałe informacje
Metody i techniki kształcenia:
  • Wykład: The content presented during the lecture is provided in the form of a multimedia presentation in combination with a classical lecture panel.
  • Ćwiczenia projektowe: Students carry out the project on their own without major intervention of a teacher. This is to create a sense of responsibility for group work and responsibility for making decisions.
  • Zajęcia seminaryjne: Seminar classes are based on a multimedia and oral presentation run by students. Another important element of education are the answers to the questions raised, as well as the students' discussion on the presented contents.
Warunki i sposób zaliczenia poszczególnych form zajęć, w tym zasady zaliczeń poprawkowych, a także warunki dopuszczenia do egzaminu:

To obtain a positive final grade it is necessary to achieve the following credits:

  • a positive grade for the seminar,
  • a positive grade for the project.

Seminar
It is necessary to prepare a presentation (presentations) on a selected topic and lead a discussion on it. The number of presentations is related to the fair share of all the participants and the number of meetings. The grade is found as the maximum of m and n, where m is the grade proposed by the teacher and n is the median of the grades proposed by other participants of the course. Additionally:

  • No more than 50% of absences at the seminar meetings are acceptable.
  • The teacher must be provided a presentation on a selected topic at least two weeks prior to the meeting.
  • The presentation should be prepared according to the suggestions of the teacher (e.g., use of LaTeX).
  • If a student fails to conform to these rules, a revision test should be passed to obtain a positive grade.

Project
It is necessary to prepare the software implementing the assumed functionality, a short (up to 5 pages long) report, and present the project to the classmates.

Zasady udziału w zajęciach:
  • Wykład:
    – Obecność obowiązkowa: Nie
    – Zasady udziału w zajęciach: Students participate in the classes learn topics according to the syllabus. Students should ask questions and explain doubts. Audiovisual recording of the lecture requires the teacher's consent.
  • Ćwiczenia projektowe:
    – Obecność obowiązkowa: Tak
    – Zasady udziału w zajęciach: Students carry out practical work aimed at obtaining competences assumed by the syllabus. The project implementation method and the final result are subject to evaluation.
  • Zajęcia seminaryjne:
    – Obecność obowiązkowa: Tak
    – Zasady udziału w zajęciach: Students present on the group forum the topic indicated by the teacher and participate in the discussion on this topic. Both the substantive value of the presentation and the so-called soft skills.
Sposób obliczania oceny końcowej:

The final grade is calculated as a mean of the grades for the seminar and the project. The lecture is treated as completed by all the student attending the course.

If any grade is determined based on achieved scores, the grading scale of §13, pt. 1 of the Study Regulations is applied. If any grade is determined on the basis of the weighted average of other grades, the thresholds defined in §27, pt. 4 of the Study Regulations are applied.

Sposób i tryb wyrównywania zaległości powstałych wskutek nieobecności studenta na zajęciach:

If not present at seminar meetings, the student should work on her/his own to deal with the unattended topics.

Wymagania wstępne i dodatkowe, z uwzględnieniem sekwencyjności modułów :

None.

Zalecana literatura i pomoce naukowe:
  1. Johannes A. Buchmann, Introduction to Cryptography, Springer, 2004. The book can be downloaded by any AGH student from SpringerLink.
Publikacje naukowe osób prowadzących zajęcia związane z tematyką modułu:

None.

Informacje dodatkowe:

Classes are conducted using innovative teaching methods developed during 2017-2019 in the POWR.03.04.00-00-D002/16 project, carried out by the Faculty of Computer Science, Electronics and Telecommunications under the Smart Growth Operational Programme 2014-2020.

The staff has improved communications skills, which have been developed during English language trainings in the POWR.03.04.00-00-D002/16 project, carried out by the Faculty of Computer Science, Electronics and Telecommunications under the Smart Growth Operational Programme 2014-2020.