Module Title:   Foundations of Cryptography

Module Credit:   20

Module Code:   CM-0348D

Academic Year:   2015/6

Teaching Period:   Semester 2

Module Occurrence:   A

Module Level:   FHEQ Level 6

Module Type:   Standard module

Provider:   Computer Science

Related Department/Subject Area:   SCIM (Dept of Computer Science)

Principal Co-ordinator:   Dr D R W Holton

Additional Tutor(s):   Dr Pauline Chan

Prerequisite(s):   None

Corequisite(s):   None

Aims:
To gain an understanding of the mathematical principles underlying cryptography and to be able to apply cryptographic techniques to securing network applications

Learning Teaching & Assessment Strategy:
Concepts, principles and theories are outlined in formal lectures and seminars. These are supported by demonstrations and by practical exercises undertaken during tutorials and as directed study. Oral feedback is given during tutorials and seminars. The formal examination will assess the learning outcomes.

Lectures:   24.00          Directed Study:   162.00           
Seminars/Tutorials:   11.00          Other:   0.00           
Laboratory/Practical:   0.00          Formal Exams:   3.00          Total:   200.00

On successful completion of this module you will be able to...

Demonstrate an understanding of the use of appropriate cryptographic primitives and protocols for securing network applications.

On successful completion of this module you will be able to...

Analyse, and select from, a range of cryptographic primitives and protocols with a view to recommending appropriate cryptographic systems for securing network applications.

On successful completion of this module you will be able to...

Display the ability to transfer theoretical concepts to practical applications

  Coursework   20%
 
  Ten short answer questions testing the ability to manipulate the formalisms introduced in the lecture
  Examination - closed book 3.00 80%
 
  Examination - closed book
  Examination - closed book 3.00 100%
 
  Supplementary assessment: closed book examination

Outline Syllabus:
Stream and block ciphers. Public key encryption. Hash functions and data integrity. Identification and entry authentication. Digital signatures. Key establishment protocols. Key management techniques. Design and analysis of cryptographic protocols.

Reading List:

Handbook of Applied Cryptography, A.J. Menezes, P. Van Oorschot, S. A. Vanston, CRC Press.

Version No:  1