,
Course Summary Course Objectives Learning Outcomes Course Materials Teaching Methods Weekly Topics Course Schedule Office Hours Assestment ECTS Calculation Course Policies Learning Tips Print Syllabi Download as PNG

CS416 Cryptography

Syllabus   |  International University of Sarajevo  -  Last Update on Mar 03, 2026

Referencing Curricula

Syllabus Quick Jump

Search and navigate to any syllabus instantly

HOSTED BY

Computer Sciences and Engineering

Spring 2018 - 2019 | 6 ECTS Credits | International University of Sarajevo

Academic Year
2018 - 2019
Semester
Spring
Course Code
CS416
Weekly Hours
3 Teaching + 2 Practice
ECTS
6
Prerequisites
MATH204 CS302
Teaching Mode Delivery
Prerequisite For
-
Teaching Mode Delivery Notes
-
Cycle
I Cycle
Prof. Jane Doe

TBA

Course Lecturer

Position
-
Email
-
Phone
033 957
Assistant(s)
Armin Basic
Assistant E-mail
basic.armin1@gmail.com

Course Objectives

This course introduces basic concepts in cryptography and discusses both theoretical foundations and practical applications. The course will cover fundamentals of cryptography, stream ciphers: OTP, LFSR, Trivium; block ciphers: DES, 3DES, AES, block cipher modes; public-key cryptosystems: RSA, Diffie–Hellman key exchange, Elgamal public-key cryptosystems; elliptic curve cryptosystems; digital signatures; hash functions; message authentication codes.

Learning Outcomes

After successful completion of the course, the student will be able to:

1
Understand the fundamental concepts, encryption and decryption methods and algorithms of cryptographic systems.
2
Understand how cryptographic techniques are used to establish security in information and communication systems.
3
Analyze cryptographic methods used in the security protocols and certificates in hardware and software sustems.
4
Apply cryptographic methods and techniques in designing secure hardware, software and communication systems.
5
Know how to develop new cryptographic systems based on different mathematical and computational concepts.

Course Materials

Required Textbook

Christof Paar, Jan Pelzl (2010) Understanding Cryptography - A Texbook for Students and Practitioners, Springer-Verlag, Berlin Heidelberg, ISBN 978-3-642-04100-6

Additional Literature

Teaching Methods

Class lecturing and discussions with examples
Active laboratory and tutorial sessions for engaged learning and continuous feedback on progress
Group projects on the applications of learned concepts and methods

Weekly Topics

This weekly planning is subject to change with advance notice.
Week Topic Readings / References
1 Introduction to Cryptography: Overview; Modular Arithmetic; Historical Cryptosystems Chapter 1
2 Stream Ciphers: Random Numbers; Unbreakable Stream Cipher; OTP Chapter 2
3 Stream Ciphers: Sift Register Based Stream Ciphers; LFSR; Trivium Chapter 2
4 The Data Encryption Standard (DES): Structure of DES; Security of DES; DES Alternatives Chapter 3
5 Galois Fields: Prime Fields; Extension Fields; Operations in Extension Fields Chapter 4
6 The Advanced Encryption Standard (AES): Galois Fields, Structure of AES; Decryption Chapter 4
7 Block Cipher Modes: ECB; CBC; OFB; CFB; CTR; GCM; Increasing the Security of Block Ciphers Chapter 5
8 Midterm Examination: Revision; Preparation and Examination
9 Public-Key Cryptography: Practical Aspects of Public-Key Cryptography; Number Theory Chapter 6
10 The RSA Cryptosystem: Encryption and Decsryption; Key Generation; Primality Tests Chapter 7
11 Diffie-Hellman Key Exchange: The Discrete Logarithm Problem; Elgamal Encyption Scheme Chapter 8
12 Elliptic Curve Cryptosystem: Elliptic Curves; Diffie-Hellman Key Exchange with Elliptic Curves Chapter 9
13 Digital Signatures: RSA Digital Signature; Elgamal Digital Signature; Digital Signature Algorithm Chapter 10
14 Hash Functions: Security Requirements; Hash Algorithms; SHA-1/2 Chapter 11
15 Message Authentication Codes (MAC): HMAC; CBC-MAC; GMAC Chapter 12

Course Schedule (All Sections)

Course Schedules with all sections will be available here soon.

Office Hours & Room

Course Office hours will be available here soon.

Assessment Methods and Criteria

Assessment Components

35%x1
Final Exam
AI: Not Allowed

Alignment with Learning Outcomes :  1  4

20%x4
Home Assignments
AI: Not Allowed

Alignment with Learning Outcomes :  2  3

25%x1
In-term Examination
AI: Not Allowed

Alignment with Learning Outcomes :  1  3

10%x2
Quizzes
AI: Not Allowed

Alignment with Learning Outcomes :  1  2

10%x1
Group Projects
AI: Not Allowed

Alignment with Learning Outcomes :  4  5

IUS Grading System

Grading Scale IUS Grading System IUS Coeff. Letter (B&H) Numerical (B&H)
0 - 44 F 0 F 5
45 - 54 E 1
55 - 64 C 2 E 6
65 - 69 C+ 2.3 D 7
70 -74 B- 2.7
75 - 79 B 3 C 8
80 - 84 B+ 3.3
85 - 94 A- 3.7 B 9
95 - 100 A 4 A 10

IUS Grading System

Letter marks that do not affect student's CGPA:
  • "IP" – In progress is assigned for recording unfulfilled student obligations related to graduation project/thesis/dissertation and internship.
  • "S" – Satisfactory is assigned to a student who passed the examinations that are not numerically graded or whose written assignment has been accepted.
  • "U" – Unsatisfactory is assigned to a student who failed to pass the examinations that are not numerically graded.
  • "W" – Withdrawal signifies that student has withdrawn from the relevant course.
Additional letter mark that affects student's CGPA:

"N/A" – Not attending, and it is assigned to a student who is suspended from the course or who does not meet the minimal requirement for attendance on lectures or tutorials. The course lecturer must follow the attendance policy and assign "N/A" in each case of a student failing attendance.

Late Work Policy

Information about late submission policies will be shared during class and posted in this section. Please check back for official guidelines.

ECTS Credit Calculation

📚 Student Workload

This 6 ECTS credit course corresponds to 150 hours of total student workload, distributed as follows:

Lecture Hours

45 hours ⏳ (15 week × 3 h)

Active Tutorials

30 hours ⏳ (15 week × 2 h)

Home Study

30 hours ⏳ (15 week × 2 h)

In-term Exam study

10 hours ⏳ (1 week × 10 h)

Final Exam Study

15 hours ⏳ (1 week × 15 h)

Home Assignment Study

20 hours ⏳ (10 week × 2 h)

150 Total Workload Hours

6 ECTS Credits


Course Policies

Academic Integrity

All work submitted must be your own. Plagiarism, cheating, or any form of academic dishonesty will result in disciplinary action according to university policies. When in doubt about citation practices, consult the instructor.

Attendance Policy

Students are expected to adhere to the attendance requirements as outlined in the International University of Sarajevo Study Rules and Regulations. Excessive absences, whether excused or unexcused, may impact academic performance and eligibility for assessment. Mandatory sessions (e.g., labs, workshops) require attendance unless formally exempted. For detailed policies on absences, documentation, and penalties, please refer to the official university regulations.

Technology & AI Policy

Laptops/tablets may be used for note-taking only during lectures. Phones should be silenced and put away during all class sessions. Audio/video recording requires prior permission from the instructor.

Artificial Intelligence (AI) Usage: The use of AI tools (e.g., ChatGPT, Copilot, Gemini) varies by assessment component. Please refer to the AI usage indicator next to each assessment item in the Assessment Methods and Criteria section above. Submitting AI-generated content as your own work, where AI is not explicitly allowed, constitutes an academic integrity violation.

Communication Policy

All course-related communication should occur through official university channels (institutional email or SIS). Emails should include [CS416] in the subject line.

Academic Quality Assurance Policy

Course Academic Quality Assurance is achieved through Semester Student Survey. At the end of each academic year, the institution of higher education is obliged to evaluate work of the academic staff, or the success of realization of the curricula.

More info

Article 112: Evaluation of Work of the Academic Staff

  1. At the end of each academic year, the institution of higher education is obliged to evaluate work of the academic staff, or the success of realization of the curricula.
  2. Evaluation of work of each academic staff member is to be carried out in accordance with the Statute of the institution of higher education by the institution as well as by students.
  3. The institutions of higher education are obliged to carry out a students’ evaluation survey on the academic staff performance after the end of each semester, or after the completed teaching cycle for the subject taught.
  4. Evaluation must evaluate: lecture quality, student-academic staff interaction, correctness of communication, teacher’s attitudes towards students attending the teaching activities and at assessments, availability of suggested reading material, attendance and punctuality of the teacher, along with other criteria which are defined in the Statute.
  5. The institution of higher education by a specific act determines the procedure for evaluation of the academic staff performance, the content of survey forms, the manner of conducting the evaluation, grading criteria for the evaluation, as well as adequate measures for the academic staff who received negative evaluation for two consecutive years.
  6. The evaluation of the academic staff performance is an integral process of establishment the quality assurance system, or self-control and internal quality assurance.
  7. Results of the evaluation of the academic staff performance are to be adequately analyzed by the institution of higher education, and the decision of the head of the organizational unit about the employee’s work performance is an integral part of the personal file of each member of academic staff.

Learning Tips

Engage Actively

Be prepared to contribute thoughtfully during class discussions, labs, or collaborative work. Active participation deepens understanding and encourages critical thinking.

Read and Review Purposefully

Complete assigned readings or prep materials before class. Take notes, highlight key ideas, and jot down questions. Aim to grasp core concepts and their applications—not just facts.

Think Critically in Assignments

Use course frameworks or methodologies to analyze problems, case studies, or projects. Begin early to allow time for reflection and refinement. Seek feedback to improve your work.

Ask Questions Early

Don’t hesitate to reach out when something is unclear. Use office hours, discussion boards, or peer networks to clarify concepts and stay on track.

Course Academic Quality Assurance: Semester Student Survey

Syllabus Last Updated on Mar 03, 2026 | International University of Sarajevo

Print Syllabus  

 

 

Referencing Curricula Print this page

Course Code Course Title Weekly Hours* ECTS Weekly Class Schedule
T P
CS416 Cryptography 3 2 6 Tue: 16:00 - 16.50 Thu: 15:00 - 16:50
Prerequisite MATH204, CS302 It is a prerequisite to -
Lecturer Office Hours / Room / Phone

Currently not available

E-mail
Assistant Armin Basic Assistant E-mail basic.armin1@gmail.com
Course Objectives This course introduces basic concepts in cryptography and discusses both theoretical foundations and practical applications. The course will cover fundamentals of cryptography, stream ciphers: OTP, LFSR, Trivium; block ciphers: DES, 3DES, AES, block cipher modes; public-key cryptosystems: RSA, Diffie–Hellman key exchange, Elgamal public-key cryptosystems; elliptic curve cryptosystems; digital signatures; hash functions; message authentication codes.
Textbook Christof Paar, Jan Pelzl (2010) Understanding Cryptography - A Texbook for Students and Practitioners, Springer-Verlag, Berlin Heidelberg, ISBN 978-3-642-04100-6
Additional Literature
Learning Outcomes After successful  completion of the course, the student will be able to:
  1. Understand the fundamental concepts, encryption and decryption methods and algorithms of cryptographic systems.
  2. Understand how cryptographic techniques are used to establish security in information and communication systems.
  3. Analyze cryptographic methods used in the security protocols and certificates in hardware and software sustems.
  4. Apply cryptographic methods and techniques in designing secure hardware, software and communication systems.
  5. Know how to develop new cryptographic systems based on different mathematical and computational concepts.
Teaching Methods Class lecturing and discussions with examples. Active laboratory and tutorial sessions for engaged learning and continuous feedback on progress. Group projects on the applications of learned concepts and methods.
Teaching Method Delivery Teaching Method Delivery Notes
WEEK TOPIC REFERENCE
Week 1 Introduction to Cryptography: Overview; Modular Arithmetic; Historical Cryptosystems Chapter 1
Week 2 Stream Ciphers: Random Numbers; Unbreakable Stream Cipher; OTP Chapter 2
Week 3 Stream Ciphers: Sift Register Based Stream Ciphers; LFSR; Trivium Chapter 2
Week 4 The Data Encryption Standard (DES): Structure of DES; Security of DES; DES Alternatives Chapter 3
Week 5 Galois Fields: Prime Fields; Extension Fields; Operations in Extension Fields Chapter 4
Week 6 The Advanced Encryption Standard (AES): Galois Fields, Structure of AES; Decryption Chapter 4
Week 7 Block Cipher Modes: ECB; CBC; OFB; CFB; CTR; GCM; Increasing the Security of Block Ciphers Chapter 5
Week 8 Midterm Examination: Revision; Preparation and Examination
Week 9 Public-Key Cryptography: Practical Aspects of Public-Key Cryptography; Number Theory Chapter 6
Week 10 The RSA Cryptosystem: Encryption and Decsryption; Key Generation; Primality Tests Chapter 7
Week 11 Diffie-Hellman Key Exchange: The Discrete Logarithm Problem; Elgamal Encyption Scheme Chapter 8
Week 12 Elliptic Curve Cryptosystem: Elliptic Curves; Diffie-Hellman Key Exchange with Elliptic Curves Chapter 9
Week 13 Digital Signatures: RSA Digital Signature; Elgamal Digital Signature; Digital Signature Algorithm Chapter 10
Week 14 Hash Functions: Security Requirements; Hash Algorithms; SHA-1/2 Chapter 11
Week 15 Message Authentication Codes (MAC): HMAC; CBC-MAC; GMAC Chapter 12
Assessment Methods and Criteria Evaluation Tool Quantity Weight Alignment with LOs AI Usage
Final Exam 1 35 1,4 Not Allowed
Semester Evaluation Components
Home Assignments 4 20 2,3 Not Allowed
In-term Examination 1 25 1,3 Not Allowed
Quizzes 2 10 1,2 Not Allowed
Group Projects 1 10 4,5 Not Allowed
***     ECTS Credit Calculation     ***
 Activity Hours Weeks Student Workload Hours Activity Hours Weeks Student Workload Hours
Lecture Hours 3 15 45 Active Tutorials 2 15 30
Home Study 2 15 30 In-term Exam study 10 1 10
Final Exam Study 15 1 15 Home Assignment Study 2 10 20
        Total Workload Hours = 150
*T= Teaching, P= Practice ECTS Credit = 6
Course Academic Quality Assurance: Semester Student Survey Last Update Date: 27/03/2026

Print this page