Cryptography: optional subject in the degree in computer engineering in information technologies

G. Rodríguez Sánchez 1 * , A. Hernández Encinas 1, L. Hernández Encinas 2, A. Martín del Rey 1, A. Queiruga Dios 1
More Detail
1 Department of Applied Mathematics, University of Salamanca, Salamanca, Spain
2 Istitute of Physical and Information Technologies (ITEFI), Spanish National Research Council (CSIC), Madrid, Spain
* Corresponding Author
EUROPEAN J SCI MATH ED, Volume 2, Issue 2A, pp. 54-57.
OPEN ACCESS   468 Views   361 Downloads
Download Full Text (PDF)


Cryptography subject is part of the curriculum of the Bachelor’s Degree in Computer Engineering in Information Systems, at the University of Salamanca. This subject becomes easy to understand if the history of Cryptography is used. The basic mathematics includes the following main topics: Modular arithmetic, algebraic curves, finite fields and number theory. Cryptography is a means of protecting personal information to avoid an eavesdropper can access it. From the first century AD with the Julius Caesar cipher to the present day with RSA, ElGamal, knapsack or elliptic curve cryptosystems, the Cryptography has evolved. In this paper we will show the syllabus of Cryptography subject and how the history knowledge supposes an important part of it, and helps students to acquire the skills and competences included in the subject curriculum.


Sánchez, G. R., Encinas, A. H., Encinas, L. H., del Rey, A. M., & Dios, A. Q. (2014). Cryptography: optional subject in the degree in computer engineering in information technologies. European Journal of Science and Mathematics Education, 2(2A), 54-57.


  • Al-Hamdani, W.A., and Griskell, I. J. (2005). A proposed curriculum of cryptography courses. Proceedings of the 2nd annual conference on Information security curriculum development. ACM.
  • Bringslid, O., Hernández-Encinas, A., Martín del Rey, A., Martín-Vaquero, J., Queiruga-Dios, A. (2011). Case Study: Coding Theory Subject Design for Engineering Students at the University of Salamanca. Transactions on Advanced Research, 7(2).
  • Duffy, P. and Bruns, A. (2006). The use of blogs, wikis and RSS in education: A conversation of possibilities. Proceedings of the Online Learning and Teaching Conference 2006.
  • ElGamal, T. (1985). A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory, 31(4), 469-472.
  • García, A., García, F., Del Rey, . M., Rodríguez, G., and De La Villa, A. (2014). Changing assessment methods: New rules, new roles. Journal of Symbolic Computation, 61, 70-84.
  • Gayoso Martínez, V., Hernández Encinas, A., Hernández Encinas, L., Queiruga Dios, A., and Visus Ruíz, I. (2010). Development of Capstone Projects on Secure Communications for Engineering Students. Proceedings of the 2010 World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP'10), The 2010 International Conference on Security and Management (SAM 2010).
  • Menezes, A., van Oorschot, P., Vanstone, S. (1997). Handbook of applied cryptography. CRC Press, Boca Raton, FL.
  • Parker, K. & Chao, J. (2007). Wiki as a Teaching Tool. Interdisciplinary Journal of E-Learning and Learning Objects, 3(1), 57-72.
  • Queiruga Dios, A., Hernández Encinas, L., and Queiruga, D. (2008). Cryptography adapted to the new European Area of Higher Education, Lect. Notes Comput Sci., 5101, 706-714.
  • Fúster Sabater, A., Hernández Encinas, L., Montoya Vitini, F., Muñoz Masqué, J. Martín Muñoz, A. (2012). Criptografía, protección de datos y aplicaciones, RA-MA, Madrid.
  • Rivest, R.L., Shamir, A., Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, 21, 120-126