Module 20008 (2005)

Syllabus page 2005/2006

06-20008
Cryptography

Level 4/M

Unassigned
10 credits in Semester 1

Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus


The Module Description is a strict subset of this Syllabus Page. (The University module description has not yet been checked against the School's.)

Changes and updates

New module for 2006/07.


Relevant Links


Outline

The module will present the fundamentals of cryptography, as well as its applications and issues of how cryptography is used in practice.


Aims

The aims of this module are to:

  • to-be-completed
  • to-be-completed
  • to-be-completed
  • to-be-completed
  • to-be-completed

Learning Outcomes

On successful completion of this module, the student should be able to: Assessed by:
1explain the fundamentals of cryptography, such as encryption, digital signatures and secure hashesExamination
2select appropriate techniques and apply them to solve a given problemExamination
3design and evaluate security protocols appropriate for a given situationExamination
4demonstrate an understanding of the mathematical underpinning of cryptographyExamination

Restrictions, Prerequisites and Corequisites

Restrictions:

None

Prerequisites:

None

Co-requisites:

06-17417 (Computer Security)


Teaching

Teaching Methods:

Lectures

Contact Hours:

15-20


Assessment

  • Supplementary (where allowed): As the sessional assessment
  • 1.5 hr examination (100%)

Recommended Books

TitleAuthor(s)Publisher, Date
CryptographyN SmartMcGraw Hill, 2003
Handbook of Applied CryptographyA J Menezes, P C van Oorschot & S A VanstoneCRC Press, 1996

Detailed Syllabus

  1. Fundamentals of cryptography
    • Symmetric-key encryption
    • Public-key encryption
    • Digital signatures
    • Secure hash functions
  2. Cryptography in practice
    • Problems of key management
    • Key certificates
  3. Security protocols
    • Attestation
    • Zero knowledge proofs
    • Applications, e.g. voting, fair exchange
  4. Quantum cryptography

Last updated: 12 Nov 2005

Source file: /internal/modules/COMSCI/2005/xml/20008.xml

Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus