Show/hide contentOpenClose All
Curricular information is subject to change
On completion of this module, the student should have acquired an understanding of the mathematical underpinnings of relevant information security algorithms and techniques.
Indicative Module Content:- Fundamentals of cryptography. Shannon's model. Perfect secrecy.
- Symmetric-key cryptography. Stream and block ciphers. Modes of operation. Advanced Encryption Standard (AES).
- Public key cryptography. Diffie-Hellman scheme. RSA cryptography. Elliptic-curve cryptography.
- Digital signatures. Hash functions and message authentication codes. SHA family.
- Digital data hiding.
- Digital forensics.
Student Effort Type | Hours |
---|---|
Lectures | 20 |
Autonomous Student Learning | 80 |
Total | 100 |
The student must be familiar with the fundamentals of probability theory.
Learning Recommendations:It is recommended, but not mandatory, that the student has taken COMP30960 (Information Theory).
Resit In | Terminal Exam |
---|---|
Autumn | No |
• Feedback individually to students, post-assessment
Feedback provided through the VLE.
Lecture | Offering 1 | Week(s) - 20, 21, 23, 24, 25, 26, 29, 31, 32, 33 | Mon 15:00 - 16:50 |
Lecture | Offering 1 | Week(s) - 22 | Wed 10:00 - 11:50 |
External & School Exams | Offering 1 | Week(s) - 34 | Wed 10:00 - 11:50 |