Module ICL-3402:
Mathematics for Cryptography
Mathematics for Cryptography 2024-25
ICL-3402
2024-25
School of Computer Science & Engineering
Module - Semester 1
10 credits
Module Organiser:
Iestyn Pierce
Overview
Indicative content includes:
- Fundamental mathematics of math-based security systems; e.g. logarithms, combinatorics, probability, entropy.
- The components of the cryptographic ecosystem; e.g. ciphers, Public Key Infrastructure, Shared Key Encryption
- Applications of cryptography; e.g. its uses in real-world systems, differentiation of provided features and concerns.
- Cryptanalysis and the discovery/handling of flaws with ciphers, implementations, and systems.
Assessment Strategy
-threshold -Equivalent to 40%.Uses key areas of theory or knowledge to meet the Learning Outcomes of the module. Is able to formulate an appropriate solution to accurately solve tasks and questions. Can identify individual aspects, but lacks an awareness of links between them and the wider contexts. Outputs can be understood, but lack structure and/or coherence. -good -Equivalent to the range 60%-69%.Is able to analyse a task or problem to decide which aspects of theory and knowledge to apply. Solutions are of a workable quality, demonstrating understanding of underlying principles. Major themes can be linked appropriately but may not be able to extend this to individual aspects. Outputs are readily understood, with an appropriate structure but may lack sophistication. -excellent -Equivalent to the range 70%+.Assemble critically evaluated, relevant areas of knowledge and theory to constuct professional-level solutions to tasks and questions presented. Is able to cross-link themes and aspects to draw considered conclusions. Presents outputs in a cohesive, accurate, and efficient manner.
Learning Outcomes
- Apply mathematical techniques to implement simple cryptography using various ciphers.
- Contrast shared key and public/private key encryption including both practical and theoretical aspects.
- Determine the most appropriate cryptography techniques to apply to a given situation.
- Explain methods used to defeat or subvert cryptographic efforts.
Assessment method
Coursework
Assessment type
Summative
Description
PKI Implementation
Weighting
20%
Due date
14/11/2024
Assessment method
Coursework
Assessment type
Summative
Description
Crypto assignment
Weighting
20%
Due date
12/12/2024
Assessment method
Exam (Centrally Scheduled)
Assessment type
Summative
Description
Unseen Examination
Weighting
60%