COMP41280 Introduction to Information Security

Academic Year 2022/2023

This course provides an introduction to the field of information security. The focus of the course is on cryptographic primitives --- an important set of tools on which information security usually relies.

Show/hide contentOpenClose All

Curricular information is subject to change

Learning Outcomes:

- Fundamentals of cryptography. Shannon's model. Perfect secrecy. Communication channels and cryptography.

- Classic ciphers. Block ciphers. Modes of operation. Data Encryption Standard (DES). Advanced Encryption Standard (AES).

- Public key cryptography. Diffie-Hellman scheme. RSA cryptography.

- Digital signatures. Hash functions. SHA family. Message authentication codes. The public key infrastructure.

Indicative Module Content:

(see above)

Student Effort Hours: 
Student Effort Type Hours
Lectures

22

Autonomous Student Learning

88

Total

110

Approaches to Teaching and Learning:
lectures; reflective learning; problem-based learning; 
Requirements, Exclusions and Recommendations
Learning Recommendations:

Basic knowledge of probability theory is recommended, although the course is self-contained in this respect.


Module Requisites and Incompatibles
Not applicable to this module.
 
Assessment Strategy  
Description Timing Open Book Exam Component Scale Must Pass Component % of Final Grade
Continuous Assessment: Practical and Theoretical Assignments/Tests Varies over the Trimester n/a Alternative linear conversion grade scale 40% No

100


Carry forward of passed components
Yes
 
Resit In Terminal Exam
Summer No
Please see Student Jargon Buster for more information about remediation types and timing. 
Feedback Strategy/Strategies

• Feedback individually to students, post-assessment

How will my Feedback be Delivered?

Not yet recorded.