Module Title:   Foundations of Cryptography (PG)

Module Credit:   20

Module Code:   CM-1076D

Academic Year:   2015/6

Teaching Period:   Semester 1

Module Occurrence:   A

Module Level:   FHEQ Level 7

Module Type:   Standard module

Provider:   Computer Science

Related Department/Subject Area:   SCIM (Dept of Computer Science)

Principal Co-ordinator:   Dr D. R. W. Holton

Additional Tutor(s):   Dr M. Kiran

Prerequisite(s):   None

Corequisite(s):   None

Aims:
An advanced understanding of the mathematical principles underlying cryptography and to be able to apply cryptographic techniques to securing network applications.

Learning Teaching & Assessment Strategy:
Concepts, principles and theories are outlined in formal lectures and seminars. These are supported by demonstrations and by practical exercises undertaken during tutorials and as directed study. Oral feedback is given during tutorials and seminars. The formal examination and coursework will assess the learning outcomes (LO1, LO2, LO3). The coursework is equivalent to 1000 words in total.

Lectures:   24.00          Directed Study:   163.00           
Seminars/Tutorials:   11.00          Other:   0.00           
Laboratory/Practical:   0.00          Formal Exams:   2.00          Total:   200.00

On successful completion of this module you will be able to...

Demonstrate an advanced understanding of the use of appropriate cryptographic primitives and protocols for securing network applications.

On successful completion of this module you will be able to...

Analyse, and select from, a range of cryptographic primitives and protocols with a view to recommending appropriate cryptographic systems for securing network applications.

On successful completion of this module you will be able to...

Display the ability to transfer theoretical concepts to practical applications.

  Coursework   20%
 
  Two questions testing the ability to apply a cryptographic primitive and analyse a cryptographic protocol.
  Examination - closed book 2.00 80%
 
  Examination - closed book 2 hours

Supplementary Assessment:
As Original

Outline Syllabus:
Stream and block ciphers. Public key encryption. Hash functions and data integrity. Identification and entity authentication. Digital signatures. Key establishment protocols. Key management techniques. Design and analysis of cryptographic protocols.
Reading List:
Handbook of Applied Cryptography, A.J. Menezes, P. Van Oorschot, S. A. Vanston, CRC Press.

Version No:  1