Module Details

The information contained in this module specification was correct at the time of publication but may be subject to change, either during the session because of unforeseen circumstances, or following review of the module at the end of the session. Queries about the module should be directed to the member of staff with responsibility for the module.
Title APPLIED CRYPTOGRAPHY
Code CKIT529
Coordinator Mr K Dures
Computer Science
K.Dures@liverpool.ac.uk
Year CATS Level Semester CATS Value
Session 2018-19 Level 7 FHEQ Whole Session 15

Aims

  • To provide students with an in-depth understanding of symmetric key encryption algorithms, hash function algorithms, public key cryptography algorithms and key agreement protocols.
  • To equip students with a comprehensive understanding of attacks and vulnerabilities with respect to current industrial standards for cryptography.
  • To provide a wide-ranging understanding of quantum computing techniques and their impact with respect to the security of current cryptographic techniques.
  • To provide students with the ability to apply cryptographic algorithms and protocols to solve security problems (such as confidentiality, integrity and authenticity problems) in the work place.
  • To develop the ability of students to use open source cryptographic techniques to design and implement secure software products, for commercial and non-commercial usage.

Learning Outcomes

An in depth and critical understanding of cryptographic algorithms for symmetric encryption schemes, secure hash functions, public encryption schemes and digital signature schemes.

A systematic understanding of the limitations of current cryptographic schemes in the quantum computing era, and a substantial understanding of post-quantum cryptographic techniques.

A wide-ranging capability to use cryptoanalytical software/hardware applications, and to carry out ethical hacking on cryptographic protocols within deployed Internet applications.

A comprehensive ability to develop secure software products using open source tools.

A substantial capability to apply cryptographic algorithms, and authentication, identification and zero knowledge protocols, so as to be able to design secure commercial applications  (such as secure Internet of Things  applications).


Syllabus

Week 1
Introduction to classical cryptography.
 
Week 2
Block ciphers, symmetric key encryption and secure hash functions.
 
Week 3
Public key cryptographic encryption and signature schemes.
< /span> 
Week 4
PKCS: Public Key Cryptography Standards.
 
Week 5
Elliptic Curve cryptography.
 
Week 6
Quantum computing and quantum cryptography.
 
Week 7
Key agreement, identification and zero-knowledge.
 
Week 8
Password authentication, identity based cryptography and other advanced topics.
 

Teaching and Learning Strategies

Online Learning - Weekly seminar supported by asynchronous discussion in a virtual classroom environment facilitated by an online instructor.

Number of hours per week that students are expected to attend the virtual classroom so as to participate in discussion, dedicated to group work and individual assessment is 7.5.


Teaching Schedule

  Lectures Seminars Tutorials Lab Practicals Fieldwork Placement Other TOTAL
Study Hours           60
Weekly seminar supported by asynchronous discussion in a virtual classroom environment facilitated by an online instructor.
60
Timetable (if known)           Number of hours per week that students are expected to attend the virtual classroom so as to participate in discussion, dedicated to group work and individual assessment is 7.5.
 
 
Private Study 90
TOTAL HOURS 150

Assessment

EXAM Duration Timing
(Semester)
% of
final
mark
Resit/resubmission
opportunity
Penalty for late
submission
Notes
             
CONTINUOUS Duration Timing
(Semester)
% of
final
mark
Resit/resubmission
opportunity
Penalty for late
submission
Notes
Coursework  Weekly Discussion Qu  whole session  48  No reassessment opportunity  Standard UoL penalty applies  Twelve discussion questions There is no reassessment opportunity, The nature of the adopted online learning paradigm is such that no reassessment opportunity is available; instead students failing the module will be offered the opportunity to retake the entire module. 
Coursework  One week/600-800 wor  Week 2  10  No reassessment opportunity  Standard UoL penalty applies  Project - Cryptotool assignment There is no reassessment opportunity, The nature of the adopted online learning paradigm is such that no reassessment opportunity is available; instead students failing the module will be offered the opportunity to retake the entire module. 
Coursework  two weeks/800 word r  Weeks 3&4  12  No reassessment opportunity  Standard UoL penalty applies  Project on Encryption There is no reassessment opportunity, The nature of the adopted online learning paradigm is such that no reassessment opportunity is available; instead students failing the module will be offered the opportunity to retake the entire module. 
Coursework  two weeks / 800 word  Weeks 5&6  12  No reassessment opportunity  Standard UoL penalty applies  Project on OpenSSL and Apache web-sever There is no reassessment opportunity, The nature of the adopted online learning paradigm is such that no reassessment opportunity is available; instead students failing the module will be offered the opportunity to retake the entire module. 
Coursework  Two weeks / 1000 wor  Weeks 7&8  18  No reassessment opportunity  Standard UoL penalty applies  Project on Strongswan VPN There is no reassessment opportunity, The nature of the adopted online learning paradigm is such that no reassessment opportunity is available; instead students failing the module will be offered the opportunity to retake the entire module. Notes (applying to all assessments) (1) Due to nature of the on­line mode of instruction work is not marked anonymously. (2) Students who fail the module have the opportunity to repeat the entire module. (3) The "Standard UoL Penalty" for late submission that applies is the "Standard UoL Penalty" agreed with respect to online programmes offered in collaboration with Laureate Online Education. (4) For group work assessments groups typically comprise 3 to 4 students. Both group and individual contributions are assessed and integrated to produce a final mark for each student. 

Recommended Texts

Reading lists are managed at readinglists.liverpool.ac.uk. Click here to access the reading lists for this module.
Explanation of Reading List:

The online programmes offered by the department of Computer Science, in Collaboration with Laureate Online Education, use online materials wherever possible; including the online resources available within the University of Liverpool’s libraries. This module does not require a specific text book.