Module Handbook

 

Module Name:

Cryptography

Module Level:

Bachelor

Abbreviation, if applicable:

MAL305

Sub-heading, if applicable:

-

Courses included in the

module, if applicable:

-

Semester/term:

6th/ ThirdYear

Module coordinator(s):

Siti Zahidah, M. Si.

Lecturer(s):

Siti Zahidah, M. Si., Edi Winarko, M.Cs.,

Language:

BahasaIndonesia

Classification within the

curriculum

Compulsory Course/ Elective Studies

Teaching format / class

hours per week during semester:

2 hours lectures (50 min / hour)

Workload:

2 hours lectures, 2hour structural activities, 2hours individual study,

13 week per semester, and total 78 hours per semester 2.6 ECTS

Credit Points:

2

Requirements:

Mathematical Discrete

Learning goals/competencies:

General Competence (Knowledge)

Capableofsolvingproblems related to cryptography.

 

Specific Competence:

1. Knowing the definition, terminology, and history of cryptography.

2. Distinguish type of attacks on cryptography.

3. Comparing private key (asymmetry key) cryptography and public key (symmetry key) cryptography.

4. Encription and decryption use classical cryptosystems

5. Encription and decryption use advanced cryptosystems

 

Content:

Introduction to cryptography, attacks on cryptography, classical cryptosystems, advanced cryptosystems, private key cryptography, public key cyrptography, cryptography in the daily life.

Soft skill Attribute

Activity, disciplinary andhonesty

Study/exam achievements:

Students are considered to be competent and pass if at least get 40of maximum mark of the exams (UTS dan UAS), structured activity (group discussion).

Final score (NA) is calculated as follow: 10% softskill + 20% assignment + 20% quiz + 25% UTS + 25% UAS

 

Final index is defined as follow:

A : 75 - 100

 

AB : 70 - 74.99

B : 65 - 69.99

BC : 60 - 64.99

C : 55 - 59.99

D : 40 - 54.99

E : 0 - 39.99

Forms of Media:

Slides and LCD projectors, whiteboards

Learning Methods

Lecture, assessments and group discussion

Literature:

[1] Trappe, Wade, 2002, Introduction to cryptography with coding theory , Prentice Hall.

[2] Munir, Rinaldi, 2006, Kriptografi, Informatika.

[3] Stamp, Mark and Low, R,M, 2007, Applied cryptanalysis : Breaking Cipher in the Real World, John Wiley & Sons.

 

Notes: