Module also offered within study programmes:
General information:
Name:
Securing Data Transmission: Cryptology, Watermarking and Steganography
Course of study:
2017/2018
Code:
IES-1-603-s
Faculty of:
Computer Science, Electronics and Telecommunications
Study level:
First-cycle studies
Specialty:
-
Field of study:
Electronics and Telecommunications
Semester:
6
Profile of education:
Academic (A)
Lecture language:
Polish
Form and type of study:
Full-time studies
Responsible teacher:
dr hab. inż, prof. AGH Chołda Piotr (cholda@agh.edu.pl)
Academic teachers:
dr hab. inż, prof. AGH Chołda Piotr (cholda@agh.edu.pl)
Module summary

Presentation of fundamental concepts of cryptography, digital watermarking and steganography applied in securing of computer and communication networks.

Description of learning outcomes for module
MLO code Student after module completion has the knowledge/ knows how to/is able to Connections with FLO Method of learning outcomes verification (form of completion)
Social competence
M_K001 Student can critically and creatively approach a posed problem related to application of cryptography in the network environment, define it in a clear way, and analyze it on her/his own while discussing the topic in a group. Project,
Execution of a project,
Activity during classes
Skills
M_U001 While working in a group, student is able to prepare a detailed documentation on the results of a project based on assumed properties concerning use of cryptographic methods. While working in a group, student can deliver a report summarizing the results in the form of a concise (up to 5 pages long) paper presenting dense, yet informative text. Project,
Activity during classes,
Report,
Execution of a project
M_U002 Student is able to learn on her/his own and use the scientific literature, as well as retrieve information from databases on cryptography (e.g., books and scientific papers). Student is prepared to draw critical conclusions on the issues concerning system and network planning on this basis. Project,
Activity during classes,
Report,
Execution of a project
M_U003 Student is able to effectively communicate in English in relatation to topics concering networking, applied mathematics, cryptography and security. Project,
Presentation,
Activity during classes,
Participation in a discussion,
Execution of a project,
Scientific paper
Knowledge
M_W001 The student knows mathematical foundations behind cryptographical concepts. Participation in a discussion,
Presentation,
Activity during classes,
Execution of a project,
Scientific paper
M_W002 The student is aware of basic methods used for securing communications. Participation in a discussion,
Presentation,
Activity during classes,
Scientific paper,
Execution of a project
FLO matrix in relation to forms of classes
MLO code Student after module completion has the knowledge/ knows how to/is able to Form of classes
Lecture
Audit. classes
Lab. classes
Project classes
Conv. seminar
Seminar classes
Pract. classes
Zaj. terenowe
Zaj. warsztatowe
Others
E-learning
Social competence
M_K001 Student can critically and creatively approach a posed problem related to application of cryptography in the network environment, define it in a clear way, and analyze it on her/his own while discussing the topic in a group. - - - + - - - - - - -
Skills
M_U001 While working in a group, student is able to prepare a detailed documentation on the results of a project based on assumed properties concerning use of cryptographic methods. While working in a group, student can deliver a report summarizing the results in the form of a concise (up to 5 pages long) paper presenting dense, yet informative text. - - - + - - - - - - -
M_U002 Student is able to learn on her/his own and use the scientific literature, as well as retrieve information from databases on cryptography (e.g., books and scientific papers). Student is prepared to draw critical conclusions on the issues concerning system and network planning on this basis. - - - + - - - - - - -
M_U003 Student is able to effectively communicate in English in relatation to topics concering networking, applied mathematics, cryptography and security. - - - + - + - - - - -
Knowledge
M_W001 The student knows mathematical foundations behind cryptographical concepts. + - - + - + - - - - -
M_W002 The student is aware of basic methods used for securing communications. + - - + - + - - - - -
Module content
Lectures:
There are five lectures on fundamental aspects of cryptography.

The following problems are going to be covered during the lectures:

  • Substitution and transposition ciphers.
  • Affine ciphers.
  • Perfect secrecy.
  • Symmetric cryptography.
  • DES. AES.
  • Public-key encryption.
  • Integer numbers and modular arithmetic (congruences). Factoring. Discrete logarithms.
  • RSA.
  • Cryptographic hash functions.
  • Identification. Digital signatures.
  • Public-key infrastructures.
  • Digital watermarking.
  • Steganography.
  • Steganalysis.

Project classes:
The project is aimed at implementation of selected cryptographic methods

Implementation of a selected cryptographic method related to a standard proposed or used in contemporary telecommunications. Examples: implementation of IETF RFC 8032. After completing the implementation, it is necessary to prepare a short documentation to present the project to the classmates. The project is performed in small teams.

Seminar classes:
The seminar is aimed at extending the selected topics

The participants are obliged to get to know some materials before the seminar meeting, and during the meeting the problems are discussed in open. The discussion is led by a group of the participants with the help of the prepared presentation.

The subset of the following topics is going to be covered at participants’ discretion: machine learning in network security, biometry, cryptography based on elliptic curves, generation of prime numbers, secret sharing, quantum cryptography, post-quantum cryptography.

Student workload (ECTS credits balance)
Student activity form Student workload
Summary student workload 80 h
Module ECTS credits 3 ECTS
Participation in lectures 16 h
Participation in seminar classes 10 h
Participation in project classes 24 h
Preparation for classes 10 h
Completion of a project 20 h
Additional information
Method of calculating the final grade:

Seminar
It is necessary to prepare a presentation (presentations) on a selected topic and lead a discussion on it. The number of presentations is related to the fair share of all the participants and the number of meetings. The grade is found as the maximum of m and n, where m is the grade proposed by the teacher and n is the median of the grades proposed by other participants of the course. Additionally:

  • No more than 30% of absences at the seminar meetings are acceptable.
  • The teacher must be provided a presentation on a selected topic at least two weeks prior to the meeting.
  • The presentation should be prepared according to the suggestions of the teacher (e.g., use of LaTeX).

If a student fails to conform to these rules, a revision test should be passed to obtain a positive grade.

Project
It is necessary to prepare the software implementing the assumed functionality, a short (up to 5 pages long) report, and present the project to the classmates.

Final grade
The both aspects should be graded positively, and then the final grade is calculated as the mean of the credit for the seminar and for the project. The lecture is treated as completed by all the student attending the course.

If any grade is determined based on achieved scores, the grading scale of §13, pt. 1 of the Study Regulations is applied. If any grade is determined on the basis of the weighted average of other grades, the thresholds defined in §27, pt. 4 of the Study Regulations are applied.

Prerequisites and additional requirements:

None.

Recommended literature and teaching resources:
  1. J. Buchmann, Introduction to Cryptography, Springer, 2004. The book can be downloaded by any AGH student via SpringerLink.
  2. F. Shih, Digital Watermarking and Steganography. Fundamentals and Techniques, CRC Press, Boca Raton FL, 2017.
Scientific publications of module course instructors related to the topic of the module:

None.

Additional information:

Classes are conducted using innovative teaching methods developed during 2017-2019 in the POWR.03.04.00-00-D002/16 project, carried out by the Faculty of Computer Science, Electronics and Telecommunications under the Smart Growth Operational Programme 2014-2020.

The staff has improved communications skills, which have been developed during English language trainings in the POWR.03.04.00-00-D002/16 project, carried out by the Faculty of Computer Science, Electronics and Telecommunications under the Smart Growth Operational Programme 2014-2020.