Module 20008 (2006)

Syllabus page 2006/2007

06-20008
Cryptography

Level 4/M

Volker Sorge
10 credits in Semester 1

Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus


The Module Description is a strict subset of this Syllabus Page. (The University module description has not yet been checked against the School's.)

Changes and updates

Module web page updated.


Relevant Links

For more information and the lecture notes see the Cryptography Homepage.


Outline

The module will present the fundamentals of cryptography, as well as its applications and issues of how cryptography is used in practice.


Aims

The aims of this module are to:

  • Introduce the basic terminology, concepts, and standards of cryptography.
  • Familiarise with the main approaches, algorithms, and protocols in modern cryptography.
  • Explain the principles and underlying mathematical theory of todays cryptographic algorithms.
  • Provide an understanding of potential weaknesses and problems with ciphers and cryptographic protocols.

Learning Outcomes

On successful completion of this module, the student should be able to: Assessed by:
1explain the fundamentals of cryptography, such as encryption, digital signatures and secure hashesExamination
2select appropriate techniques and apply them to solve a given problemExamination
3design and evaluate security protocols appropriate for a given situationExamination
4demonstrate an understanding of the mathematical underpinning of cryptographyExamination

Restrictions, Prerequisites and Corequisites

Restrictions:

None

Prerequisites:

None

Co-requisites:

06-17417 (Computer Security)


Teaching

Teaching Methods:

2 hours/week lectures

Contact Hours:

24


Assessment

  • Sessional: 1.5 hr examination (100%)
  • Supplementary (where allowed): As the sessional assessment

Recommended Books

TitleAuthor(s)Publisher, Date
Practical CryptographyN Fergueson & B SchneierJohn Wiley & Sons, 2003
Applied CryptographyB SchneierJohn Wiley & Sons, 1996
Handbook of Applied CryptographyA J Menezes, P C van Oorschot & S A VanstoneCRC Press, 1996
CryptographyN SmartMcGraw Hill, 2003
Beginning Cryptography with JavaD HookJohn Wiley & Sons, 2005
Contemporary CryptologyD Catalano, R Cramer, I Damgard, G Di Crescenzo, D Pointcheval & T TakagiSpringer Verlag, 2005

Detailed Syllabus

  1. Overview on Historical Ciphers
  2. Symmetric Ciphers
    • Block Ciphers
    • Stream Ciphers
    • Key Management
  3. Asymmetric Ciphers
    • Diffie-Hellman
    • Public Key Cryptography
    • RSA
    • Cramer Shoup
  4. Signatures, Certificates, Data Integrity
  5. Quantum cryptography

Last updated: 27 Sep 2006

Source file: /internal/modules/COMSCI/2006/xml/20008.xml

Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus