CSC-40120 - Cryptography
Coordinator: Aisha Junejo Room: CR122
Lecture Time: See Timetable...
Level: Level 7
Credits: 15
Study Hours: 150
School Office: 01782 733075

Programme/Approved Electives for 2023/24

None

Available as a Free Standing Elective

No

Co-requisites

None

Prerequisites

None

Barred Combinations

None

Description for 2023/24

The module will cover the types of cryptography, the fundamental security goals achieved through the different cryptographic algorithms and protocols, major cryptographic analysis techniques and possible countermeasures for each technique. Significant emphasis is placed on how algorithms are attacked and the characteristics of such attacks that make them effective. Finally, the properties that an algorithm must have to resist attacks are covered.

Aims
The module will provide a broad overview of types of cryptography, the fundamental security goals achieved through cryptographic algorithms and protocols, major cryptanalysis techniques and possible countermeasures. Significant attention will be placed on how algorithms are attacked and to the characterisation of the properties that allow such attacks to be effective. The module will also introduce the identifying properties that an algorithm must have to resist attacks.

Intended Learning Outcomes

differentiate between the different types of cryptography and cryptographic algorithms, their uses and limitations: 1,2
assess the main techniques used in cryptographic algorithm and protocol design and their security requirements: 1,2
apply fundamental and widely researched cryptanalysis techniques to specific cipher types: 1,2
assess whether cryptographic components and algorithms meet identified security criteria that must be satisfied for effective resilience to attacks: 1,2

Study hours

Lectures: 22 hours
Practicals: 12 hours
Preparation for assessment: 50 hours
Directed and private study: 66 hours

School Rules

CSC-40044 System Design and Programming

Description of Module Assessment

1: Group Project weighted 90%
Design a security solution
Students will design a security solution for an organizational use case using encryption algorithms and protocols based on the requirements. They will also design a fun activity to teach an encryption algorithm to non-technical people. The security solution and the fun activity will then be presented to the cohort in a 30-minute presentation followed by a 30 minutes of Q/A session. Students will produce a report (2,000-word equiv.) that outlines the solution providing rationale for the choice of cryptographic algorithms and security parameters. They will also discuss the design of fun activity.

2: Individual Report weighted 10%
Individual Work Reflective Writing
Students will write a summary report and reflection on their role in the group project, their individual contribution, and how they go about making the contribution to the group work. They will produce a report (1000-word equiv.)