Module Handbook


Module Name:


Module Level:


Abbreviation, if applicable:


Sub-heading, if applicable:


Courses included in the

module, if applicable:



6th/ ThirdYear

Module coordinator(s):

Siti Zahidah, M. Si.


Siti Zahidah, M. Si., Edi Winarko, M.Cs.,



Classification within the


Compulsory Course/ Elective Studies

Teaching format / class

hours per week during semester:

2 hours lectures (50 min / hour)


2 hours lectures, 2hour structural activities, 2hours individual study,

13 week per semester, and total 78 hours per semester 2.6 ECTS

Credit Points:



Mathematical Discrete

Learning goals/competencies:

General Competence (Knowledge)

Capableofsolvingproblems related to cryptography.


Specific Competence:

1. Knowing the definition, terminology, and history of cryptography.

2. Distinguish type of attacks on cryptography.

3. Comparing private key (asymmetry key) cryptography and public key (symmetry key) cryptography.

4. Encription and decryption use classical cryptosystems

5. Encription and decryption use advanced cryptosystems



Introduction to cryptography, attacks on cryptography, classical cryptosystems, advanced cryptosystems, private key cryptography, public key cyrptography, cryptography in the daily life.

Soft skill Attribute

Activity, disciplinary andhonesty

Study/exam achievements:

Students are considered to be competent and pass if at least get 40of maximum mark of the exams (UTS dan UAS), structured activity (group discussion).

Final score (NA) is calculated as follow: 10% softskill + 20% assignment + 20% quiz + 25% UTS + 25% UAS


Final index is defined as follow:

A : 75 - 100


AB : 70 - 74.99

B : 65 - 69.99

BC : 60 - 64.99

C : 55 - 59.99

D : 40 - 54.99

E : 0 - 39.99

Forms of Media:

Slides and LCD projectors, whiteboards

Learning Methods

Lecture, assessments and group discussion


[1] Trappe, Wade, 2002, Introduction to cryptography with coding theory , Prentice Hall.

[2] Munir, Rinaldi, 2006, Kriptografi, Informatika.

[3] Stamp, Mark and Low, R,M, 2007, Applied cryptanalysis : Breaking Cipher in the Real World, John Wiley & Sons.