This module will cover modern cryptographic algorithms and mechanisms for cyber security with emphasis on the applications and engineering implementations. The first part covers some theoretical foundations of cryptography, cryptographic building blocks as well as the basic, intermediate and advanced protocols.
The second part is about cryptographic techniques including key and its management, algorithm types and modes.
The third part covers cryptographic algorithms which are widely used in the network and security industry, including various ciphers such as block ciphers (DES, AES, RC2, Blowfish, etc.) and stream ciphers (A5, RC4, SEAL, and cascading multiple stream ciphers), one-way hash functions, (MD2, MD5, SHA), public-key algorithms (RSA, ElGamal, Elliptic Curve), digital signature and key exchange algorithms.
The fourth part covers the applications and implementations of selected algorithms and protocols to address security issues in data and security service industry in the real world.
Intended Learning Outcomes
On completion of this module students should be able to:
a) Develop a critical understanding of different cryptographic protocols, techniques, algorithms and implementations that are widely used in protection of confidentiality, integrity, authentication and nonrepudiation, and be able to use their knowledge to address real-world security issues.
b) Understand the fundamentals of security including privacy, integrity, authentication and non-repudiation in internetconnected world
c) Understand the concepts, protocols and algorithms of modern cryptographic mechanisms
d) Understand the implementations and applications of cryptography in cyber security
e) Be able to apply gained knowledge in cryptography in protection of data and user security for real world scenarios
f) Critically analyse detailed cryptographic mechanisms for weakness and potential threats pertaining to big data systems
g) Be able to analyse the cryptographic requirements for real security issues in data systems
h) Apply gained knowledge in cryptographic protocols, algorithms and mechanisms in addressing the security concerns of data systems
i) Demonstrate gained knowledge in cryptography in security applications & APIs
j) Apply their critical analysis and problem solving skills in the industry for tackling problems and providing solutions for both cyber security and big data services
k) Evaluate data security protections with sufficient detail with critical thinking
l) Apply gained knowledge in research, development, implementation and maintenance of advanced cyber security systems
Teaching and Learning
Guided independent study (120 hours)
Lectures (26 hours)
Tutorials (4 hours)
Final coursework report (30%)
Project presentation (10%)
In-class test (60%)