Cryptography deals with data security and integrity. Regardless of who is involved, all parties in a transaction must have confidence that certain objectives which are privacy, data integrity, identification, signature, authorization, validation, access control, witnessing, receipt, and confirmation associated with information security have been met. Achieving information security in an electronic society requires a vast array of technical and legal skills. With the information processing and telecommunications revolutions well underway, there is an increasing demand for techniques for keeping information secret, for determining that information has not been tampered with, and for determining the author of the information. There is, however, no guarantee that all of the information security objectives deemed necessary can be adequately met. The technical means is provided through cryptography.

Many new ideas have been invented in the last two decades, which have exciting applications in computer systems, telecommunications systems (Internet security, mobile communications), and payment systems. An important aspect is the efficient implementation in both software and hardware of cryptographic primitives and the security evaluation of components and systems including smart cards. Especially public-key cryptography which has emerged in the last 25 years, is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Public-key algorithms and protocols are based on sophisticated mathematics such as computational and algorithmic algebraic geometry, coding theory, and generic algorithms for finite abelian groups. These cryptographic techniques are now in wide spread use in industry, especially in financial services industry and by individuals for their personal privacy in communication.

The Cryptography Group (CG) of IAM conducts research in areas such as design, evaluation, and implementation of cryptographic algorithms and protocols. CG's theoretical work on cryptographic algorithms and protocols are based on discrete mathematics. The major focus of the research will be in applied and theoretic cryptography. CG's research areas can be broadly categorized as follows: Design and analysis of pseudorandom sequences, Elliptic and Hyperelliptic curve cryptography, Computational number theory, Coding theory, Computational methods in quadratic fields, algorithms for finite abelian groups. In view of the research interest of the cryptography group, the objectives of the Cryptography Graduate Program can be summarized as follows:
  • To conduct a graduate program leading to M.S. and Ph.D. degrees in Cryptography,
  • To provide a mathematical treatment to the practical aspects of conventional and public-key cryptography,
  • To introduce mathematical tools for serious practitioner in need of the latest techniques and algorithms,
  • To evolve into an internationally recognized center for research in cryptography and related areas of information security.
  • MSc with Thesis in Cryptography
  • MSc without Thesis in Cryptography
  • PhD in Cryptography
  • Integrated PhD in Cryptography

See Curricula for Cryptography or see Academic Catalogue at METU

University graduates of any discipline who are willing to acquire expertise in Cryptography are natural candidates for the program Admission procedure will be implemented according to the Rules and Regulations concerning Graduate Studies of Middle East Technical University. The selection will be done by considering the success of the student in the field she/he has graduated, the result of the ALES examination (Graduate Education Examination), English Proficiency and the results of written examination and/or interview to be given by the Institute of Applied Mathematics. A letter explaining the goals of the candidate and at least two recommendation letters are also required for the admission.

See Application and Admission

Embedded Image

Sedat Akleylek (Assoc.Prof.Dr.) view

Affiliation: Ondokuz Mayıs University
Phone: +90 (362) 312-1919 (ext 1099)
E-Mail: sedat.akleylek\( @ \)
Research Interests: Efficient Cryptographic Computations; Post-Quantum Cryptography; Applied Cryptography for Cyber Security

Embedded Image

Ersan Akyıldız (Prof.Dr.) view

Affiliation: Middle East Technical University
Office: S229
Phone: +90 (312) 210-5606
E-Mail: ersan\( @ \)

Embedded Image

Mehpare Bilhan (Prof.Dr.) view

Affiliation: Middle East Technical University
E-Mail: mehpare\( @ \)

Embedded Image

Murat Cenk (Assoc.Prof.Dr.) view

Affiliation: Middle East Technical University
Office: S205
Phone: +90 (312) 210-5689
E-Mail: mcenk\( @ \)
Research Interests: Cryptographic Computation; Homomorphic Encryption; Post quantum Cryptography; Privacy Preserving Data Analysis

Embedded Image

Ali Doğanaksoy (Assoc.Prof.Dr.) view

Affiliation: Middle East Technical University
Phone: +90 (312) 210-5354
E-Mail: aldoks\( @ \)

Embedded Image

İ. Yurdahan Güler (Prof.Dr.) view

Affiliation: Middle East Technical University
Office: S225
Phone: +90 (312) 210-5615
E-Mail: yguler\( @ \)

Embedded Image

Ferruh Özbudak (Prof.Dr.) view

Affiliation: Middle East Technical University
Office: S230
Phone: +90 (312) 210-2991
E-Mail: ozbudak\( @ \)

Embedded Image

Zülfikar Saygı (Assoc.Prof.Dr.) view

Affiliation: TOBB ETU
Phone: +90 (312) 292-4340
E-Mail: zsaygi\( @ \)

Embedded Image

Muhiddin Uğuz (Dr.) view

Affiliation: Middle East Technical University
Phone: +90 (312) 210-5364
E-Mail: muhid\( @ \)

No Photo Available

Tolga Yalçın view

Affiliation: University of Information Science and Technology Partizanska

Embedded Image

Oğuz Yayla view

Affiliation: Hacettepe University
E-Mail: oguz.yayla\( @ \)

Embedded Image

Abdurrahim Yılmaz (Prof.Dr.) view

Affiliation: Middle East Technical University
E-Mail: abyilmaz\( @ \)

Embedded Image

Melek Yücel (Prof.Dr.) view

Affiliation: Middle East Technical University
Phone: +90 (312) 210-2347
E-Mail: melekdy\( @ \)

Download the flyers, summarizing the Cryptography Program at IAM, in English or Turkish.