| 
    
      
       Links 
                   Ministery of Higher Education 
                            Ministery of Higher Education in 
                              Erbil   
                              Salahaddin University
                             
                          University of Sulaimani    
                              Koya University    
                              University 
                              of Kurdistan   
  | 
    
    
      Data Security    
Aim of this Subject:
  study the basic principle and algorithms of Security
  
Course 1:   
Total hours: Theory 30 + Practical 30
  Subjects Names: 
Introduction to Security: 
 Security Goals, Security Methods, Security Layers & Threats.
 Encryption & Decryption: Cryptography, One-Way Functions, Early Biblical Cipher, Requirement from Cipher Algorithm, Caesar Cipher, Cryptanalysis of the Caesar Cipher, Advantage & Disadvantage of Caesar Cipher.
 Transposition Methods:  Early Spartan Cipher her ,Rail-Fence Cipher, Row-Column Cipher, Zigzag, Repeated  Row-Column Cipher, Mono-Alphabetic Cipher, Diagonal routs, Rotation Cipher, Reverse cipher, Geometric Figure, Nihilist ciphers. 
 Substitution Methods:  Vigenère Cipher , Beau ford Cipher,  Kasiski Method, Poly alphabetic Ciphers, Product ciphers, Rote variation, Diagraph substation
  
****************************************************** 
 Course 2:   
Total hours:  Theory 30 + Practical 30
  Subjects Names: 
Data Encoding: on return to zero, non return to zero interval, Bipolar-Ami
Pseudo ternary, Manchester, Differential Manchester, Manchester
Differential Manchester.
Morse code cipher, Additive cipher method, Multiplicative cipher, Affine cipher, One-way function.
 Arithmetic Background:  Greater common Deviser: Binary GCD algorithm, Euclidean GCD algorithm, Extended GCD algorithm, Chinese remainder theorem, Minimized GCD algorithm. Lease Common Multiple: Multiplicative least common deviser, LCM  using Factorized number, LCM by Null reminder 
  Exponentiation: Fast exponentiation algorithms, Binary exponentiation, To Fast exponentiation algorithms, The Mist exponentiation algorithms, Repeated Square and multiply algorithm. Prime number: Cormen algorithm for prime test, Probability primarily test, True primarily test, Prime number generation, Fermat's primarily test, Solovay strenssen test, Miller Rabin test, Wilson test, Liner sive test
Lahmer test, Gordon  method  prime generation, 
Theta ,Inverse, Modular, Square Root, Key phrase cipher, Quadratic residues
 Public-key cryptography RSA algorithm, Attacked RSA, AlGamal algorithm. 
Attacked AlGamal algorithm.
  
****************************************************** 
References: 
Mihir Bellare, Anand Desai, David Pointcheval, and Phillip Rogaway. Relations among notions of security for public-key encryption schemes. 
 February 1999. An extended abstract appears in H. Krawczyk, ed., Advances in Cryptology 
  
 
     |