CSC-40120 - Cryptography
Coordinator: Aisha Junejo Room: CR122
Lecture Time: See Timetable...
Level: Level 7
Credits: 15
Study Hours: 150
School Office: 01782 733075

Programme/Approved Electives for 2024/25

None

Available as a Free Standing Elective

No

Co-requisites

None

Prerequisites

None

Barred Combinations

None

Description for 2024/25

The module will cover the types of cryptography, the fundamental security goals achieved through the different cryptographic algorithms and protocols, major cryptographic analysis techniques and possible countermeasures for each technique. Significant emphasis is placed on how algorithms are attacked and the characteristics of such attacks that make them effective. Finally, the properties that an algorithm must have to resist attacks are covered.

Aims
The module will provide a broad overview of types of cryptography, the fundamental security goals achieved through cryptographic algorithms and protocols, major cryptanalysis techniques and possible countermeasures. Significant attention will be placed on how algorithms are attacked and to the characterisation of the properties that allow such attacks to be effective. The module will also introduce the identifying properties that an algorithm must have to resist attacks.

Intended Learning Outcomes

differentiate between the different types of cryptography and cryptographic algorithms, their uses and limitations: 1,2
assess the main techniques used in cryptographic algorithm and protocol design and their security requirements: 1,2
apply fundamental and widely researched cryptanalysis techniques to specific cipher types: 1,2
assess whether cryptographic components and algorithms meet identified security criteria that must be satisfied for effective resilience to attacks: 1,2

Study hours

Lectures: 22 hours
Practicals: 12 hours
Preparation for assessment: 50 hours
Directed and private study: 66 hours

School Rules

CSC-40044 System Design and Programming

Description of Module Assessment

1: Group Project weighted 90%
Design a security solution


2: Individual Report weighted 10%
Individual Work Reflective Writing