Introduction (Cryptography)

Cryptography deals with data security and integrity. Regardless of who is involved, all parties in a transaction must have confidence that certain objectives which are privacy, data integrity, identification, signature, authorization, validation, access control, witnessing, receipt, and confirmation associated with information security have been met. Achieving information security in an electronic society requires a vast array of technical and legal skills. With the information processing and telecommunications revolutions well underway, there is an increasing demand for techniques for keeping information secret, for determining that information has not been tampered with, and for determining the author of the information. There is, however, no guarantee that all of the information security objectives deemed necessary can be adequately met. The technical means is provided through cryptography.

Many new ideas have been invented in the last two decades, which have exciting applications in computer systems, telecommunications systems (Internet security, mobile communications), and payment systems. An important aspect is the efficient implementation in both software and hardware of cryptographic primitives and the security evaluation of components and systems including smart cards. Especially public-key cryptography which has emerged in the last 25 years, is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Public-key algorithms and protocols are based on sophisticated mathematics such as computational and algorithmic algebraic geometry, coding theory, and generic algorithms for finite abelian groups. These cryptographic techniques are now in widespread use in industry, especially in financial services industry and by individuals for their personal privacy in communication.


The Cryptography Group (CG) of IAM conducts research in areas such as design, evaluation, and implementation of cryptographic algorithms and protocols. CG's theoretical work on cryptographic algorithms and protocols are based on discrete mathematics. The major focus of the research will be in applied and theoretic cryptography. CG's research areas can be broadly categorized as follows: Design and analysis of pseudorandom sequences, Elliptic and Hyperelliptic curve cryptography, Computational number theory, Coding theory, Computational methods in quadratic fields, algorithms for finite abelian groups. In view of the research interest of the cryptography group, the objectives of the Cryptography Graduate Program can be summarized as follows:

  • To conduct a graduate program leading to M.S. and Ph.D. degrees in Cryptography;
  • To provide a mathematical treatment to the practical aspects of conventional and public-key cryptography;
  • To introduce mathematical tools for serious practitioner in need of the latest techniques and algorithms;
  • To evolve into an internationally recognized center for research in cryptography and related areas of information security.

Degrees Offered

  • MSc with Thesis in Cryptography
  • MSc without Thesis in Cryptography
  • PhD in Cryptography
  • Integrated PhD in Cryptography

See Curricula for Cryptography or see Academic Catalogue at METU.


University graduates of any discipline who are willing to acquire expertise in Cryptography are natural candidates for the program Admission procedure will be implemented according to the Rules and Regulations concerning Graduate Studies of Middle East Technical University. The selection will be done by considering the success of the student in the field she/he has graduated, the result of the ALES examination (Graduate Education Examination), English Proficiency and the results of written examination and/or interview to be given by the Institute of Applied Mathematics. A letter explaining the goals of the candidate and at least two recommendation letters are also required for the admission.

See Application and Admission.


Please, contact with Oğuz Yayla (Head of Cryptography) at oguz[at] for any questions!

Download the flyers, summarizing the Cryptography Program at IAM, in English