Programme/Approved Electives for 2024/25
None
Available as a Free Standing Elective
No
The module will cover the types of cryptography, the fundamental security goals achieved through the different cryptographic algorithms and protocols, major cryptographic analysis techniques and possible countermeasures for each technique. Significant emphasis is placed on how algorithms are attacked and the characteristics of such attacks that make them effective. Finally, the properties that an algorithm must have to resist attacks are covered.
Aims
The module will provide a broad overview of types of cryptography, the fundamental security goals achieved through cryptographic algorithms and protocols, major cryptanalysis techniques and possible countermeasures. Significant attention will be placed on how algorithms are attacked and to the characterisation of the properties that allow such attacks to be effective. The module will also introduce the identifying properties that an algorithm must have to resist attacks.
Intended Learning Outcomes
differentiate between the different types of cryptography and cryptographic algorithms, their uses and limitations: 1,2assess the main techniques used in cryptographic algorithm and protocol design and their security requirements: 1,2apply fundamental and widely researched cryptanalysis techniques to specific cipher types: 1,2assess whether cryptographic components and algorithms meet identified security criteria that must be satisfied for effective resilience to attacks: 1,2
Lectures: 22 hoursPracticals: 12 hoursPreparation for assessment: 50 hoursDirected and private study: 66 hours
CSC-40044 System Design and Programming
Description of Module Assessment
1: Group Project weighted 90%Design a security solution
2: Individual Report weighted 10%Individual Work Reflective Writing