Module Details
Module Code: |
COMP C9024 |
Full Title:
|
Secure Architecture
|
Valid From:: |
Semester 1 - 2019/20 ( June 2019 ) |
Language of Instruction: | English |
Module Owner:: |
Caroline Sheedy
|
Module Description: |
The aims of this module are to enable learners to investigate, critically analyse and assess secure architecture. Cryptography is a foundation of any such architecture. Learners will critically evaluate the security of cryptographic constructions and understand how they are applied using Distributed Ledger Technology as the exemplar. The module identifies and analyses appropriate uses of cryptography. An overview of core mathematical concepts is provided so that learners may effectively engage with the content and associated research publications. It presents core concepts such as public-key encryption techniques, digital signatures, hashing, etc.
|
Module Learning Outcome |
On successful completion of this module the learner will be able to: |
# |
Module Learning Outcome Description |
MLO1 |
Deconstruct the principles of modern cryptography, the historical and ethical background, and critically appraise modern cryptography. |
MLO2 |
Compare, contrast, and evaluate cryptographic primitives, principles and techniques and their use to establish security properties. |
MLO3 |
Analyse Distributed Ledger Technology Architecture, and understand the underpinning cryptographic techniques. |
MLO4 |
Identify and evaluate the limits and applicability of Distributed Ledger Technology. |
Pre-requisite learning |
Module Recommendations
This is prior learning (or a practical skill) that is strongly recommended before enrolment in this module. You may enrol in this module if you have not acquired the recommended learning but you will have considerable difficulty in passing (i.e. achieving the learning outcomes of) the module. While the prior learning is expressed as named DkIT module(s) it also allows for learning (in another module or modules) which is equivalent to the learning specified in the named module(s).
|
No recommendations listed |
Module Indicative Content |
Introduction
Examine some classical encryption schemes and their inadequacies. Introduce modern approaches to cryptography.
|
Modern Cryptography
Analysis of the One-Time Pad, Pseudorandomness and Pseudorandom Generators, Stream Ciphers, Pseudo One-Time Pad
|
Private Key Cryptography
Stronger Security Notions, Block Ciphers, CPA-Secure Encryption from PRFs/Block Ciphers, Modes of Encryption
|
Public Key Cryptography
Diffie-Hellman Key Exchange, Public-Key Encryption, RSA, El-Gamal
|
Hashing and Digital Signatures
MACS, Hash functions, Hashing Algorithms, Digital Signatures.
|
Distributed Ledger Concepts
Decentralisation, immutable ledgers, proof of work, preventing double spending. How these properties are achieved using cryptographic primitives.
|
Module Assessment
|
Assessment Breakdown | % |
Course Work | 50.00% |
Final Examination | 50.00% |
Module Special Regulation |
|
AssessmentsFull Time On Campus
Part Time On Campus
Reassessment Requirement |
A repeat examination
Reassessment of this module will consist of a repeat examination. It is possible that there will also be a requirement to be reassessed in a coursework element.
|
DKIT reserves the right to alter the nature and timings of assessment
Module Workload
Workload: Full Time On Campus |
Workload Type |
Contact Type |
Workload Description |
Frequency |
Average Weekly Learner Workload |
Hours |
Lecture |
Contact |
No Description |
Every Week |
2.00 |
2 |
Practical |
Contact |
No Description |
Every Week |
2.00 |
2 |
Independent Study |
Non Contact |
No Description |
Every Week |
8.00 |
8 |
Total Weekly Learner Workload |
12.00 |
Total Weekly Contact Hours |
4.00 |
Workload: Part Time On Campus |
Workload Type |
Contact Type |
Workload Description |
Frequency |
Average Weekly Learner Workload |
Hours |
Independent Study |
Non Contact |
No Description |
Every Week |
8.00 |
8 |
Lecture |
Contact |
No Description |
Every Week |
2.00 |
2 |
Practical |
Contact |
No Description |
Every Week |
2.00 |
2 |
Total Weekly Learner Workload |
12.00 |
Total Weekly Contact Hours |
4.00 |
Module Resources
|
Recommended Book Resources |
---|
-
Jonathon Le Blanc, Tim Messerschmidt. (2016), Identity and Data Security for Web Development: Best Practices, 1. O'Reilly, [ISBN: 1491937017].
-
LM Batten John Wiley & Sons,. (2013), Public key cryptography: applications and attacks, 1.
-
Katz, J., Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A.. (1996), Handbook of applied cryptography., CRC press..
-
Katz, Jonathan and Lindell, Yehunda. (2014), Introduction to Modern Cryptography,, Taylor & Francis Inc, CRC Press.
-
Narayanan, Arvind; Bonneau, Joseph; Felten, Edward; Miller, Andrew & Goldfeder, Steven. Bitcoin and Cryptocurrency Technologies, Princeton University Press, [ISBN: 9781400884155].
| This module does not have any article/paper resources |
---|
This module does not have any other resources |
---|
|