Programme And Module Handbook
 
Course Details in


If you find any data displayed on this website that should be amended, please contact the Curriculum Management Team.

Module Title Cryptography
SchoolComputer Science
Department Computer Science
Module Code 06 20008
Module Lead Dr V Sorge
Level Masters Level
Credits 10
Semester Semester 1
Pre-requisites
Co-requisites
Restrictions None
Contact Hours Lecture-23 hours
Practical Classes and workshops-11 hours
Total: 34 hours
Exclusions
Description The module will present the fundamentals of cryptography, as well as its applications and issues of how cryptography is used in practice.
The aims of this module are to:
  • Introduce the basic terminology, concepts, and standards of cryptography.
  • Familiarise students with the main approaches, algorithms, and protocols in modern cryptography.
  • Explain the principles and underlying mathematical theory of today's cryptographic algorithms.
  • Provide an understanding of potential weaknesses and problems with ciphers and cryptographic protocols.
  • Raise awareness of some of the legal and socio-ethical issues surrounding cryptography.
Learning Outcomes By the end of the module the student should be able to:
  • Explain the fundamentals of cryptography, such as encryption, digital signatures and secure hashes
  • Select appropriate techniques and apply them to solve a given problem
  • Design and evaluate security protocols appropriate for a given situation
  • Demonstrate an understanding of the mathematical underpinning of cryptography
Assessment 20008-01 : Examination : Exam (Centrally Timetabled) - Written Unseen (80%)
20008-02 : Continuous Assessment : Coursework (20%)
Assessment Methods & Exceptions 1.5 hour examination 80%, continuous assessment 20%. Supplementary: by exam only.
Other None
Reading List B Schneier, 1996. Applied Cryptography (John Wiley & Sons);
D Hook, 2005. Beginning Cryptography with Java (John Wiley & Sons);
D Catalano, R Cramer, I Damgard, G Di Crescenzo, D Pointcheval & T Takagi, 2005. Contemporary Cryptology (Springer Verlag);
N Smart, 2003. Cryptography (McGraw Hill);
N Fergueson & B Schneier, 2003. Practical Cryptography (John Wiley & Sons);
A J Menezes, P C van Oorschot & S A Vanstone, 1996. Handbook of Applied Cryptography (CRC Press);