Module Title:   Cryptography and Network Security

Module Credit:   20

Module Code:   ENG4119D

Academic Year:   2015/6

Teaching Period:   Semester 1

Module Occurrence:   A

Module Level:   FHEQ Level 7

Module Type:   Standard module

Provider:   Engineering

Related Department/Subject Area:   PI - Engineering: Telecomms, Electromagnetics etc (MDIS) (not in use)

Principal Co-ordinator:   Prof YF Hu

Additional Tutor(s):   Dr P Pillai

Prerequisite(s):   None

Corequisite(s):   None

Aims:
To provide mastery knowledge and skills to raise critical awareness and to apply techniques for increasing the confidentiality, integrity and authenticity of data exchange and key management techniques in communication networks and associated applications; To understand IP address assignments essential for the development of network security such as firewall; to acquire comprehensive knowledge on the Authentication, Authorisation and Accounting framework with related protocols.

Learning Teaching & Assessment Strategy:
This module will be delivered through a combination of lectures and in-class practical exercises. Concepts, principles & theories are explored in formal lectures and reinforced through hands-on demonstrations and lab exercises. Examinations structured to reflect a Master Degree standard will be used for final evaluation.

Lectures:   36.00          Directed Study:   150.00           
Seminars/Tutorials:   0.00          Other:   0.00           
Laboratory/Practical:   12.00          Formal Exams:   2.00          Total:   200.00

On successful completion of this module you will be able to...

Demonstrate sound understanding in

1. security attacks, cryptanalsys & number theories essential for cryptography
2. symmetric (private) key & public key ciphers,related cryptography algorithms & relevant number theory for use in ensuring data confidentiality, integrity & authenticity
3. key management
4. the relationship between cryptography & coding
5. applying symmetric & public key ciphers in secure email & internet commerce
6. AAA (Authentication, Authorisation and Accounting)
7. virtual private networks
8. the filtering rules when creating firewalls

On successful completion of this module you will be able to...

to critically evaluate and to apply current encryption/decryption techniques to ensure confidentiality, authenticity and integrity; to be able to detect errors in /modifications to information using coding techniques; to critically select key exchange mechanisms; to critically apply current encryption/decryption techniques to ensure confidentiality, authenticity and integrity for secure email, internet commerce and VPN; to implement firewall rules.

On successful completion of this module you will be able to...

demonstrate analytical and problem solving skills.

  Laboratory Report   30%
 
  Lab Report
  Examination - closed book 2.00 70%
 
  Exam Closed Book

Outline Syllabus:
Cryptography: Principles of Cryptography, Symmetric Key and Private Key Encryption, Integrity, Key management protocols; Channel Coding and cryptography; Secure email (PGP); Internet Commerce: SSL, Secure Electronics Transactions (SET); AAA (Authentication, Authorisation and Accounting), Threat Analysis on Network Security, Virtual Private networks (PPTP,L2TP and IPSec), Firewall.

Version No:  3