Module Details
Module Code: |
COAP |
Module Title:
|
Cryptography
|
Title:
|
Cryptography
|
Module Level:: |
7 |
Module Coordinator: |
Nigel Whyte
|
Module Author:: |
Martin Harrigan
|
Module Description: |
The module provides a broad understanding of the various forms of cryptography, the fundamental security goals achieved through cryptographic primitives, algorithms and protocols, and their possible weaknesses. The module puts particular emphasis on practical skills and cryptographic implementations in real-life applications.
|
Learning Outcomes |
On successful completion of this module the learner will be able to: |
# |
Learning Outcome Description |
LO1 |
Understand and describe the most prevalent cryptographic primitives, algorithms and protocols. |
LO2 |
Select the appropriate cryptographic tools for various real-world scenarios. |
LO3 |
Apply modern cryptographic techniques to enhance the overall security of a system. |
LO4 |
Analyse and critically appraise the security of a cryptographic system. |
Dependencies |
Module Recommendations
This is prior learning (or a practical skill) that is recommended before enrolment in this module.
|
No recommendations listed |
Co-requisite Modules
|
No Co-requisite modules listed |
Additional Requisite Information
|
No Co Requisites listed
|
Indicative Content |
Hash Functions and Applications
Integrity verification, password verification, salting, keyed hashing, MACs, PRFs, Merkle trees, authenticated encryption
|
Symmetric Cryptography
Classical ciphers, substitution ciphers, transposition ciphers, block ciphers, the Feistel scheme, SPN networks, AES, modes of operation, stream ciphers, RC4, ChaCha
|
Asymmetric Cryptography
Public-key encryption, RSA, elliptic-curve cryptography, cryptographic hardness assumptions, digital signatures, blind signatures
|
Key Exchange Protocols
Diffie-Hellman, public-key infrastructure, web of trust
|
Applications and Real-World Deployments
SSL and TLS, trusted computing, digital rights management, blockchains and cryptocurrencies
|
Module Content & Assessment
|
Assessment Breakdown | % |
Continuous Assessment | 20.00% |
Project | 30.00% |
End of Module Formal Examination | 50.00% |
AssessmentsFull Time
End of Module Formal Examination |
|
Reassessment Requirement |
Repeat examination
Reassessment of this module will consist of a repeat examination. It is possible that there will also be a requirement to be reassessed in a coursework element.
|
Reassessment Description The student can repeat the final examination. They can also re-submit their project.
|
SETU Carlow Campus reserves the right to alter the nature and timings of assessment
Module Workload
Workload: Full Time |
Workload Type |
Workload Category |
Contact Type |
Workload Description |
Frequency |
Average Weekly Learner Workload |
Hours |
Lecture |
|
Contact |
In-class lectures, discussion |
12 Weeks per Stage |
3.00 |
36 |
Laboratory |
|
Contact |
Laboratory exercises, instruction, feedback |
12 Weeks per Stage |
3.00 |
36 |
Independent Learning |
|
Non Contact |
Study, practical application of material, project work |
15 Weeks per Stage |
11.87 |
178 |
Total Weekly Contact Hours |
6.00 |
Module Resources
|
Recommended Book Resources |
---|
-
Jean-Philippe Aumasson. (2017), Serious Cryptography: A Practical Introduction to Modern Encryption, 1st. No Starch.
| Supplementary Book Resources |
---|
-
William Stallings. (2017), Cryptography and Network Security: Principles and Practice, 7th. Pearson.
-
Jonathan Katz and Yehuda Lindell. (2014), Introduction to Modern Cryptography, 2nd. CRC Press.
| This module does not have any article/paper resources |
---|
This module does not have any other resources |
---|
|