Module description
Aims and Learning Outcomes
To introduce both theoretical and practical aspects of cryptography, authentication and information security.
On successful completion of this module, students will be able to:
- Understand the relevant mathematical techniques associated with cryptography
- Understand the principles of cryptographic techniques and perform implementations of selected algorithms in this area
- Systematically apply security techniques in solving real-life security problems in practical systems
Syllabus
An indication of the types of topics
1. Basic terminology and concepts:
- Goals of cryptography, terminology and notation, players; Basic cryptographic functions
2. Number theory preliminaries:
- Congruent modulo n, equivalent class modulo n; Integer modulo n (Zn)
- Multiplicative inverse
- Relatively prime
- Euler’s theorem
- Fermat’s little theorem
- EEA (Extended Euclidean Algorithm)
- CRT (Chinese Remainder Theorem)
4. Ciphers:
- Block ciphers (substitution, transposition, product)
- Stream ciphers
- Modes of operation (ECB, CBC, CFB, OFB)
5. Cryptosystems:
- Block cipher: DES (Data Encryption Standard), AES (Advanced Encryption Standard)
- Public-key: RSA (Rivest-Shamir-Adelman), El gamal
- One-way hash function: SHA and MD5 (Message Digest 5)
6. Key-establishment protocols:
- Symmetric and asymmetric techniques (Diffie-Hellman, Needham-Schroeder, Otway-Rees)
- Public-key encryption, basic and advanced Kerberos protocols
7. Authentication and identification:
- Concepts
- Fiat-Shamir and Feige-Fiat-Shamir protocols
- Zero-knowledge identification protocol
- Multi-factor Authentication, biometrics
- Password systems: number of acceptable passwords for a given password policy, exhaustive search, password ageing.
8. Digital signatures:
- Classification
- Digital signature schemes: RSA; El-Gamal; DSA (Digital Signature Algorithm) and DSS (Digital Signature Standard)
Assessment details
Please note: The below assessment details for the 2025/26 academic year may be updated. The confirmed details will be available on the Student Handbook and on the module KEATS page at the beginning of the semester.