COMP C9024 - Secure Architecture

Module Details

Module Code: COMP C9024
Full Title: Secure Architecture
Valid From:: Semester 1 - 2019/20 ( June 2019 )
Language of Instruction:English
Duration: 1 Semester
Credits:: 7.5
Module Owner:: Caroline Sheedy
Departments: Unknown
Module Description: The aims of this module are to enable learners to investigate, critically analyse and assess secure architecture. Cryptography is a foundation of any such architecture. Learners will critically evaluate the security of cryptographic constructions and understand how they are applied using Distributed Ledger Technology as the exemplar. The module identifies and analyses appropriate uses of cryptography. An overview of core mathematical concepts is provided so that learners may effectively engage with the content and associated research publications. It presents core concepts such as public-key encryption techniques, digital signatures, hashing, etc.
 
Module Learning Outcome
On successful completion of this module the learner will be able to:
# Module Learning Outcome Description
MLO1 Deconstruct the principles of modern cryptography, the historical and ethical background, and critically appraise modern cryptography.
MLO2 Compare, contrast, and evaluate cryptographic primitives, principles and techniques and their use to establish security properties.
MLO3 Analyse Distributed Ledger Technology Architecture, and understand the underpinning cryptographic techniques.
MLO4 Identify and evaluate the limits and applicability of Distributed Ledger Technology.
Pre-requisite learning
Module Recommendations
This is prior learning (or a practical skill) that is strongly recommended before enrolment in this module. You may enrol in this module if you have not acquired the recommended learning but you will have considerable difficulty in passing (i.e. achieving the learning outcomes of) the module. While the prior learning is expressed as named DkIT module(s) it also allows for learning (in another module or modules) which is equivalent to the learning specified in the named module(s).
No recommendations listed
 
Module Indicative Content
Introduction
Examine some classical encryption schemes and their inadequacies. Introduce modern approaches to cryptography.
Modern Cryptography
Analysis of the One-Time Pad, Pseudorandomness and Pseudorandom Generators, Stream Ciphers, Pseudo One-Time Pad
Private Key Cryptography
Stronger Security Notions, Block Ciphers, CPA-Secure Encryption from PRFs/Block Ciphers, Modes of Encryption
Public Key Cryptography
Diffie-Hellman Key Exchange, Public-Key Encryption, RSA, El-Gamal
Hashing and Digital Signatures
MACS, Hash functions, Hashing Algorithms, Digital Signatures.
Distributed Ledger Concepts
Decentralisation, immutable ledgers, proof of work, preventing double spending. How these properties are achieved using cryptographic primitives.
Module Assessment
Assessment Breakdown%
Course Work50.00%
Final Examination50.00%
Module Special Regulation
 

Assessments

Full Time On Campus

Course Work
Assessment Type Continuous Assessment % of Total Mark 50
Marks Out Of 0 Pass Mark 0
Timing Every Second Week Learning Outcome 1,2,3,4
Duration in minutes 0
Assessment Description
Practical work will be conducted throughout the semester to assess the learner’s evaluation skills in terms of secure design strategies and secure application development
No Project
No Practical
Final Examination
Assessment Type Formal Exam % of Total Mark 50
Marks Out Of 0 Pass Mark 0
Timing End-of-Semester Learning Outcome 1,2,3,4
Duration in minutes 0
Assessment Description
n/a

Part Time On Campus

Course Work
Assessment Type Continuous Assessment % of Total Mark 50
Marks Out Of 0 Pass Mark 0
Timing Every Second Week Learning Outcome 1,2,3,4
Duration in minutes 0
Assessment Description
Practical work will be conducted throughout the semester to assess the learner’s evaluation skills in terms of secure design strategies and secure application development
No Project
No Practical
Final Examination
Assessment Type Formal Exam % of Total Mark 50
Marks Out Of 0 Pass Mark 0
Timing End-of-Semester Learning Outcome 1,2,3,4
Duration in minutes 0
Assessment Description
n/a
Reassessment Requirement
A repeat examination
Reassessment of this module will consist of a repeat examination. It is possible that there will also be a requirement to be reassessed in a coursework element.

DKIT reserves the right to alter the nature and timings of assessment

 

Module Workload

Workload: Full Time On Campus
Workload Type Contact Type Workload Description Frequency Average Weekly Learner Workload Hours
Lecture Contact No Description Every Week 2.00 2
Practical Contact No Description Every Week 2.00 2
Independent Study Non Contact No Description Every Week 8.00 8
Total Weekly Learner Workload 12.00
Total Weekly Contact Hours 4.00
Workload: Part Time On Campus
Workload Type Contact Type Workload Description Frequency Average Weekly Learner Workload Hours
Independent Study Non Contact No Description Every Week 8.00 8
Lecture Contact No Description Every Week 2.00 2
Practical Contact No Description Every Week 2.00 2
Total Weekly Learner Workload 12.00
Total Weekly Contact Hours 4.00
 
Module Resources
Recommended Book Resources
  • Jonathon Le Blanc, Tim Messerschmidt. (2016), Identity and Data Security for Web Development: Best Practices, 1. O'Reilly, [ISBN: 1491937017].
  • LM Batten John Wiley & Sons,. (2013), Public key cryptography: applications and attacks, 1.
  • Katz, J., Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A.. (1996), Handbook of applied cryptography., CRC press..
  • Katz, Jonathan and Lindell, Yehunda. (2014), Introduction to Modern Cryptography,, Taylor & Francis Inc, CRC Press.
  • Narayanan, Arvind; Bonneau, Joseph; Felten, Edward; Miller, Andrew & Goldfeder, Steven. Bitcoin and Cryptocurrency Technologies, Princeton University Press, [ISBN: 9781400884155].
This module does not have any article/paper resources
This module does not have any other resources