Module Details

Module Code: COAP
Module Title: Cryptography
Title: Cryptography
Module Level:: 7
Credits:: 10
Module Coordinator: Nigel Whyte
Module Author:: Martin Harrigan
Domains:  
Module Description: The module provides a broad understanding of the various forms of cryptography, the fundamental security goals achieved through cryptographic primitives, algorithms and protocols, and their possible weaknesses. The module puts particular emphasis on practical skills and cryptographic implementations in real-life applications.
 
Learning Outcomes
On successful completion of this module the learner will be able to:
# Learning Outcome Description
LO1 Understand and describe the most prevalent cryptographic primitives, algorithms and protocols.
LO2 Select the appropriate cryptographic tools for various real-world scenarios.
LO3 Apply modern cryptographic techniques to enhance the overall security of a system.
LO4 Analyse and critically appraise the security of a cryptographic system.
Dependencies
Module Recommendations

This is prior learning (or a practical skill) that is recommended before enrolment in this module.

No recommendations listed
Co-requisite Modules
No Co-requisite modules listed
Additional Requisite Information
No Co Requisites listed
 
Indicative Content
Hash Functions and Applications
Integrity verification, password verification, salting, keyed hashing, MACs, PRFs, Merkle trees, authenticated encryption
Symmetric Cryptography
Classical ciphers, substitution ciphers, transposition ciphers, block ciphers, the Feistel scheme, SPN networks, AES, modes of operation, stream ciphers, RC4, ChaCha
Asymmetric Cryptography
Public-key encryption, RSA, elliptic-curve cryptography, cryptographic hardness assumptions, digital signatures, blind signatures
Key Exchange Protocols
Diffie-Hellman, public-key infrastructure, web of trust
Applications and Real-World Deployments
SSL and TLS, trusted computing, digital rights management, blockchains and cryptocurrencies
Module Content & Assessment
Assessment Breakdown%
Continuous Assessment20.00%
Project30.00%
End of Module Formal Examination50.00%

Assessments

Full Time

Continuous Assessment
Assessment Type Short Answer Questions % of Total Mark 20
Timing Week 7 Learning Outcomes 1,2
Non-marked No
Assessment Description
The students will answer a series of short questions that test their knowledge of cryptographic primitives, algorithms, protocols and real-world use cases.
Project
Assessment Type Project % of Total Mark 30
Timing Week 11 Learning Outcomes 2,3
Non-marked No
Assessment Description
The students will complete an individual project that is shared across modules. The project will have a cryptographic component. For example, users will need to be authenticated and data will need to be stored securely.
No Practical
End of Module Formal Examination
Assessment Type Formal Exam % of Total Mark 50
Timing End-of-Semester Learning Outcomes 1,2,3,4
Non-marked No
Assessment Description
n/a
Reassessment Requirement
Repeat examination
Reassessment of this module will consist of a repeat examination. It is possible that there will also be a requirement to be reassessed in a coursework element.
Reassessment Description
The student can repeat the final examination. They can also re-submit their project.

SETU Carlow Campus reserves the right to alter the nature and timings of assessment

 

Module Workload

Workload: Full Time
Workload Type Workload Category Contact Type Workload Description Frequency Average Weekly Learner Workload Hours
Lecture Contact In-class lectures, discussion 12 Weeks per Stage 3.00 36
Laboratory Contact Laboratory exercises, instruction, feedback 12 Weeks per Stage 3.00 36
Independent Learning Non Contact Study, practical application of material, project work 15 Weeks per Stage 11.87 178
Total Weekly Contact Hours 6.00
 
Module Resources
Recommended Book Resources
  • Jean-Philippe Aumasson. (2017), Serious Cryptography: A Practical Introduction to Modern Encryption, 1st. No Starch.
Supplementary Book Resources
  • William Stallings. (2017), Cryptography and Network Security: Principles and Practice, 7th. Pearson.
  • Jonathan Katz and Yehuda Lindell. (2014), Introduction to Modern Cryptography, 2nd. CRC Press.
This module does not have any article/paper resources
This module does not have any other resources
Discussion Note: