Confidentiality, authenticity and integrity are the cornerstones of secure systems. Cryptography is
indispensable to protecting information in computer systems. Students will learn inner workings of
cryptographic systems and how to correctly use them in real-world applications. Further, the course
will describe, critically analyze and discuss the security challenges faced by the society and the
computing industry.
The aims of this module are to:
· Introduce the students to the cryptography and security principles
· Give the students a thorough understanding of the network and application security issues
· Provide them with sound knowledge of cryptography, security protocols, security audit and
compliance
· Provide them with an in-depth practical application of cryptography and systems security
Introduction to system security and cryptography.
Classical Techniques, Modern Techniques, Algorithms, Confidentiality Using Conventional Encryption.
Message Authentication and Hash Functions, Hash and MAC Algorithms, Integrity and Authenticity.
Public-Key Cryptography, Digital Signatures and Authentication Protocols
This module can be delivered either through standard delivery or blended delivery.
In standard delivery this module is delivered through a series of lectures with associated practical assignments.
In blended delivery this module is delivered through a series of live and recorded lectures with associated laboratory work and practical assignments.
Both blended and standard delivery have the same overall number of teaching and self-directed learning hours.
| Module Content & Assessment | |
|---|---|
| Assessment Breakdown | % |
| Formal Examination | 50 |
| Other Assessment(s) | 50 |