Accessibility statement

Introduction to Cryptography - COM00176M

« Back to module search

  • Department: Computer Science
  • Module co-ordinator: Dr. Pooya Farshim
  • Credit value: 10 credits
  • Credit level: M
  • Academic year of delivery: 2021-22
    • See module specification for other years: 2022-23

Module summary

Introduce foundational concepts and results in modern cryptography.

Module will run

Occurrence Teaching period
A Autumn Term 2021-22

Module aims

Introduce foundational concepts and results in modern cryptography and develop a firm understanding of fundamental symmetric and asymmetric cryptographic mechanisms, including various security models, and how to prove security.

Module learning outcomes

  • Be able to explain what cryptography is, what it is used for, and what are the fundamental types of cryptographic algorithms.

  • Detail the modern approach to defining security goals in cryptography.

  • Detail the main techniques and recent developments in cryptographic algorithm and protocol design.

  • Be able to assess whether cryptographic components and algorithms meet identified security criteria that must be satisfied for effective resilience to attacks.

Assessment

Task Length % of module mark
Essay/coursework
Essay : Introduction to Cryptography
N/A 100

Special assessment rules

None

Reassessment

Task Length % of module mark
Essay/coursework
Essay : Introduction to Cryptography
N/A 100

Module feedback

Feedback is provided through work in practical sessions, and after the final assessment as per normal University guidelines.

Indicative reading

[1] J. Katz, Introduction to modern cryptography, Third edition :: Chapman & Hall/CRC, 2020
[2] J.-P. Aumasson, Serious cryptography : a practical introduction to modern encryption :: No Starch Press, 2018
[3] C. Paar, Understanding cryptography : a textbook for students and practitioners :: Springer, 2009
[4] A. McAndrew, Introduction to cryptography with open-source software :: CRC Press, 2011
[5] W. Stallings, Cryptography and network security : principles and practice, Seventh edition :: Pearson, 2017
[6] A. J. Menezes, Handbook of applied cryptography :: CRC Press, 1997



The information on this page is indicative of the module that is currently on offer. The University is constantly exploring ways to enhance and improve its degree programmes and therefore reserves the right to make variations to the content and method of delivery of modules, and to discontinue modules, if such action is reasonably considered to be necessary by the University. Where appropriate, the University will notify and consult with affected students in advance about any changes that are required in line with the University's policy on the Approval of Modifications to Existing Taught Programmes of Study.