Syllabus | International University of Sarajevo - Last Update on Mar 03, 2026
Course Lecturer
This course introduces basic concepts in cryptography and discusses both theoretical foundations and practical applications. The course will cover fundamentals of cryptography, stream ciphers: OTP, LFSR, Trivium; block ciphers: DES, 3DES, AES, block cipher modes; public-key cryptosystems: RSA, Diffie–Hellman key exchange, Elgamal public-key cryptosystems; elliptic curve cryptosystems; digital signatures; hash functions; message authentication codes.
After successful completion of the course, the student will be able to:
Christof Paar, Jan Pelzl (2010) Understanding Cryptography - A Texbook for Students and Practitioners, Springer-Verlag, Berlin Heidelberg, ISBN 978-3-642-04100-6
| Week | Topic | Readings / References |
|---|---|---|
| 1 | Introduction to Cryptography: Overview; Modular Arithmetic; Historical Cryptosystems | Chapter 1 |
| 2 | Stream Ciphers: Random Numbers; Unbreakable Stream Cipher; OTP | Chapter 2 |
| 3 | Stream Ciphers: Sift Register Based Stream Ciphers; LFSR; Trivium | Chapter 2 |
| 4 | The Data Encryption Standard (DES): Structure of DES; Security of DES; DES Alternatives | Chapter 3 |
| 5 | Galois Fields: Prime Fields; Extension Fields; Operations in Extension Fields | Chapter 4 |
| 6 | The Advanced Encryption Standard (AES): Galois Fields, Structure of AES; Decryption | Chapter 4 |
| 7 | Block Cipher Modes: ECB; CBC; OFB; CFB; CTR; GCM; Increasing the Security of Block Ciphers | Chapter 5 |
| 8 | Midterm Examination: Revision; Preparation and Examination | |
| 9 | Public-Key Cryptography: Practical Aspects of Public-Key Cryptography; Number Theory | Chapter 6 |
| 10 | The RSA Cryptosystem: Encryption and Decsryption; Key Generation; Primality Tests | Chapter 7 |
| 11 | Diffie-Hellman Key Exchange: The Discrete Logarithm Problem; Elgamal Encyption Scheme | Chapter 8 |
| 12 | Elliptic Curve Cryptosystem: Elliptic Curves; Diffie-Hellman Key Exchange with Elliptic Curves | Chapter 9 |
| 13 | Digital Signatures: RSA Digital Signature; Elgamal Digital Signature; Digital Signature Algorithm | Chapter 10 |
| 14 | Hash Functions: Security Requirements; Hash Algorithms; SHA-1/2 | Chapter 11 |
| 15 | Message Authentication Codes (MAC): HMAC; CBC-MAC; GMAC | Chapter 12 |
Alignment with Learning Outcomes : 1 4
Alignment with Learning Outcomes : 2 3
Alignment with Learning Outcomes : 1 3
Alignment with Learning Outcomes : 1 2
Alignment with Learning Outcomes : 4 5
| Grading Scale | IUS Grading System | IUS Coeff. | Letter (B&H) | Numerical (B&H) |
|---|---|---|---|---|
| 0 - 44 | F | 0 | F | 5 |
| 45 - 54 | E | 1 | ||
| 55 - 64 | C | 2 | E | 6 |
| 65 - 69 | C+ | 2.3 | D | 7 |
| 70 -74 | B- | 2.7 | ||
| 75 - 79 | B | 3 | C | 8 |
| 80 - 84 | B+ | 3.3 | ||
| 85 - 94 | A- | 3.7 | B | 9 |
| 95 - 100 | A | 4 | A | 10 |
Information about late submission policies will be shared during class and posted in this section. Please check back for official guidelines.
This 6 ECTS credit course corresponds to 150 hours of total student workload, distributed as follows:
45 hours ⏳ (15 week × 3 h)
30 hours ⏳ (15 week × 2 h)
30 hours ⏳ (15 week × 2 h)
10 hours ⏳ (1 week × 10 h)
15 hours ⏳ (1 week × 15 h)
20 hours ⏳ (10 week × 2 h)
150 Total Workload Hours
6 ECTS Credits
All work submitted must be your own. Plagiarism, cheating, or any form of academic dishonesty will result in disciplinary action according to university policies. When in doubt about citation practices, consult the instructor.
Students are expected to adhere to the attendance requirements as outlined in the International University of Sarajevo Study Rules and Regulations. Excessive absences, whether excused or unexcused, may impact academic performance and eligibility for assessment. Mandatory sessions (e.g., labs, workshops) require attendance unless formally exempted. For detailed policies on absences, documentation, and penalties, please refer to the official university regulations.
Laptops/tablets may be used for note-taking only during lectures. Phones should be silenced and put away during all class sessions. Audio/video recording requires prior permission from the instructor.
Artificial Intelligence (AI) Usage: The use of AI tools (e.g., ChatGPT, Copilot, Gemini) varies by assessment component. Please refer to the AI usage indicator next to each assessment item in the Assessment Methods and Criteria section above. Submitting AI-generated content as your own work, where AI is not explicitly allowed, constitutes an academic integrity violation.
All course-related communication should occur through official university channels (institutional email or SIS). Emails should include [CS416] in the subject line.
Course Academic Quality Assurance is achieved through Semester Student Survey. At the end of each academic year, the institution of higher education is obliged to evaluate work of the academic staff, or the success of realization of the curricula.
Be prepared to contribute thoughtfully during class discussions, labs, or collaborative work. Active participation deepens understanding and encourages critical thinking.
Complete assigned readings or prep materials before class. Take notes, highlight key ideas, and jot down questions. Aim to grasp core concepts and their applications—not just facts.
Use course frameworks or methodologies to analyze problems, case studies, or projects. Begin early to allow time for reflection and refinement. Seek feedback to improve your work.
Don’t hesitate to reach out when something is unclear. Use office hours, discussion boards, or peer networks to clarify concepts and stay on track.
Syllabus Last Updated on Mar 03, 2026 | International University of Sarajevo
Print Syllabus
Referencing Curricula Print this page
| Course Code | Course Title | Weekly Hours* | ECTS | Weekly Class Schedule | ||||||
| T | P | |||||||||
| CS416 | Cryptography | 3 | 2 | 6 | Tue: 16:00 - 16.50 Thu: 15:00 - 16:50 | |||||
| Prerequisite | MATH204, CS302 | It is a prerequisite to | - | |||||||
| Lecturer | Office Hours / Room / Phone | Currently not available |
||||||||
| Assistant | Armin Basic | Assistant E-mail | basic.armin1@gmail.com | |||||||
| Course Objectives | This course introduces basic concepts in cryptography and discusses both theoretical foundations and practical applications. The course will cover fundamentals of cryptography, stream ciphers: OTP, LFSR, Trivium; block ciphers: DES, 3DES, AES, block cipher modes; public-key cryptosystems: RSA, Diffie–Hellman key exchange, Elgamal public-key cryptosystems; elliptic curve cryptosystems; digital signatures; hash functions; message authentication codes. | |||||||||
| Textbook | Christof Paar, Jan Pelzl (2010) Understanding Cryptography - A Texbook for Students and Practitioners, Springer-Verlag, Berlin Heidelberg, ISBN 978-3-642-04100-6 | |||||||||
| Additional Literature | ||||||||||
| Learning Outcomes | After successful completion of the course, the student will be able to: | |||||||||
|
||||||||||
| Teaching Methods | Class lecturing and discussions with examples. Active laboratory and tutorial sessions for engaged learning and continuous feedback on progress. Group projects on the applications of learned concepts and methods. | |||||||||
| Teaching Method Delivery | Teaching Method Delivery Notes | |||||||||
| WEEK | TOPIC | REFERENCE | ||||||||
| Week 1 | Introduction to Cryptography: Overview; Modular Arithmetic; Historical Cryptosystems | Chapter 1 | ||||||||
| Week 2 | Stream Ciphers: Random Numbers; Unbreakable Stream Cipher; OTP | Chapter 2 | ||||||||
| Week 3 | Stream Ciphers: Sift Register Based Stream Ciphers; LFSR; Trivium | Chapter 2 | ||||||||
| Week 4 | The Data Encryption Standard (DES): Structure of DES; Security of DES; DES Alternatives | Chapter 3 | ||||||||
| Week 5 | Galois Fields: Prime Fields; Extension Fields; Operations in Extension Fields | Chapter 4 | ||||||||
| Week 6 | The Advanced Encryption Standard (AES): Galois Fields, Structure of AES; Decryption | Chapter 4 | ||||||||
| Week 7 | Block Cipher Modes: ECB; CBC; OFB; CFB; CTR; GCM; Increasing the Security of Block Ciphers | Chapter 5 | ||||||||
| Week 8 | Midterm Examination: Revision; Preparation and Examination | |||||||||
| Week 9 | Public-Key Cryptography: Practical Aspects of Public-Key Cryptography; Number Theory | Chapter 6 | ||||||||
| Week 10 | The RSA Cryptosystem: Encryption and Decsryption; Key Generation; Primality Tests | Chapter 7 | ||||||||
| Week 11 | Diffie-Hellman Key Exchange: The Discrete Logarithm Problem; Elgamal Encyption Scheme | Chapter 8 | ||||||||
| Week 12 | Elliptic Curve Cryptosystem: Elliptic Curves; Diffie-Hellman Key Exchange with Elliptic Curves | Chapter 9 | ||||||||
| Week 13 | Digital Signatures: RSA Digital Signature; Elgamal Digital Signature; Digital Signature Algorithm | Chapter 10 | ||||||||
| Week 14 | Hash Functions: Security Requirements; Hash Algorithms; SHA-1/2 | Chapter 11 | ||||||||
| Week 15 | Message Authentication Codes (MAC): HMAC; CBC-MAC; GMAC | Chapter 12 | ||||||||
| Assessment Methods and Criteria | Evaluation Tool | Quantity | Weight | Alignment with LOs | AI Usage |
| Final Exam | 1 | 35 | 1,4 | Not Allowed | |
| Semester Evaluation Components | |||||
| Home Assignments | 4 | 20 | 2,3 | Not Allowed | |
| In-term Examination | 1 | 25 | 1,3 | Not Allowed | |
| Quizzes | 2 | 10 | 1,2 | Not Allowed | |
| Group Projects | 1 | 10 | 4,5 | Not Allowed | |
| *** ECTS Credit Calculation *** | |||||
| Activity | Hours | Weeks | Student Workload Hours | Activity | Hours | Weeks | Student Workload Hours | |||
| Lecture Hours | 3 | 15 | 45 | Active Tutorials | 2 | 15 | 30 | |||
| Home Study | 2 | 15 | 30 | In-term Exam study | 10 | 1 | 10 | |||
| Final Exam Study | 15 | 1 | 15 | Home Assignment Study | 2 | 10 | 20 | |||
| Total Workload Hours = | 150 | |||||||||
| *T= Teaching, P= Practice | ECTS Credit = | 6 | ||||||||
| Course Academic Quality Assurance: Semester Student Survey | Last Update Date: 27/03/2026 | |||||||||