Module Details

The information contained in this module specification was correct at the time of publication but may be subject to change, either during the session because of unforeseen circumstances, or following review of the module at the end of the session. Queries about the module should be directed to the member of staff with responsibility for the module.
Title APPLIED CRYPTOGRAPHY
Code CKIT529
Coordinator Mr K Dures
Computer Science
K.Dures@liverpool.ac.uk
Year CATS Level Semester CATS Value
Session 2021-22 Level 7 FHEQ Whole Session 15

Aims

To provide students with an in-depth understanding of symmetric key encryption algorithms, hash function algorithms, public key cryptography algorithms and key agreement protocols. To equip students with a comprehensive understanding of attacks and vulnerabilities with respect to current industrial standards for cryptography. To provide a wide-ranging understanding of quantum computing techniques and their impact with respect to the security of current cryptographic techniques. To provide students with the ability to apply cryptographic algorithms and protocols to solve security problems (such as confidentiality, integrity and authenticity problems) in the work place. To develop the ability of students to use open source cryptographic techniques to design and implement secure software products, for commercial and non-commercial usage.


Learning Outcomes

(LO1) An in depth and critical understanding of cryptographic algorithms for symmetric encryption schemes, secure hash functions, public encryption schemes and digital signature schemes.

(LO2) A systematic understanding of the limitations of current cryptographic schemes in the quantum computing era, and a substantial understanding of post-quantum cryptographic techniques.

(LO3) A wide-ranging capability to use cryptoanalytical software/hardware applications, and to carry out ethical hacking on cryptographic protocols within deployed Internet applications.

(LO4) A comprehensive ability to develop secure software products using open source tools.

(LO5) A substantial capability to apply cryptographic algorithms, and authentication, identification and zero knowledge protocols, so as to be able to design secure commercial applications  (such as secure Internet of Things  applications).

(S1) Organisational skills

(S2) Communication skills

(S3) IT skills

(S4) Communication and collaboration online participating in digital networks for learning and research

(S5) Learning skills online studying and learning effectively in technology-rich environments, formal and informal


Syllabus

 

Week 1 Introduction to classical cryptography.   Week 2 Block ciphers, symmetric key encryption and secure hash functions.   Week 3 Public key cryptographic encryption and signature schemes.   Week 4 PKCS: Public Key Cryptography Standards.   Week 5 Elliptic Curve cryptography.   Week 6 Quantum computing and quantum cryptography.   Week 7 Key agreement, identification and zero-knowledge.   Week 8 Password authentication, identity based cryptography and other advanced topics.


Teaching and Learning Strategies

Teaching Method 1 - Online Learning
Description: Weekly seminar supported by asynchronous discussion in a virtual classroom environment facilitated by an online instructor.
Attendance Recorded: Yes
Notes: Number of hours per week that students are expected to attend the virtual classroom so as to participate in discussion, dedicated to group work and individual assessment is 7.5.


Teaching Schedule

  Lectures Seminars Tutorials Lab Practicals Fieldwork Placement Other TOTAL
Study Hours           60

60
Timetable (if known)              
Private Study 90
TOTAL HOURS 150

Assessment

EXAM Duration Timing
(Semester)
% of
final
mark
Resit/resubmission
opportunity
Penalty for late
submission
Notes
             
CONTINUOUS Duration Timing
(Semester)
% of
final
mark
Resit/resubmission
opportunity
Penalty for late
submission
Notes
Project - Cryptotool assignment Standard UoL penalty applies for late submission. This is not an anonymous assessment. Assessment Schedule (When) :Week 2  One week/600-800 wor    10       
Project on Encryption Standard UoL penalty applies for late submission. This is not an anonymous assessment. Assessment Schedule (When) :Weeks 3&4  two weeks/800 word r    12       
Project on OpenSSL and Apache web-sever Standard UoL penalty applies for late submission. This is not an anonymous assessment. Assessment Schedule (When) :Weeks 5&6  two weeks / 800 word    12       
Project on Strongswan VPN Standard UoL penalty applies for late submission. This is not an anonymous assessment. Assessment Schedule (When) :Weeks 7&8  Two weeks / 1000 wor    18       
Twelve discussion questions Standard UoL penalty applies for late submission. This is not an anonymous assessment. Assessment Schedule (When) :whole session  Weekly Discussion Qu    48       

Recommended Texts

Reading lists are managed at readinglists.liverpool.ac.uk. Click here to access the reading lists for this module.