Skip to main content

Unit information: Applied Cryptography in 2019/20

Please note: Due to alternative arrangements for teaching and assessment in place from 18 March 2020 to mitigate against the restrictions in place due to COVID-19, information shown for 2019/20 may not always be accurate.

Please note: you are viewing unit and programme information for a past academic year. Please see the current academic year for up to date information.

Unit name Applied Cryptography
Unit code COMS30010
Credit points 10
Level of study H/6
Teaching block(s) Teaching Block 2 (weeks 13 - 24)
Unit director Dr. Page
Open unit status Not open
Pre-requisites

COMS30002

Co-requisites

None

School/department Department of Computer Science
Faculty Faculty of Engineering

Description including Unit Aims

This unit delivers an introduction to two sub-fields of cryptography, namely applied cryptography and cryptographic engineering. As such, the unit content can be summarised as spanning three core topics:

  1. efficient implementation techniques for standard symmetric and asymmetric cryptographic primitives,
  2. implementation (specifically side-channel and fault injection) attack and mitigation techniques, and
  3. system-level applications of cryptography, e.g., deployment in standard protocols such as TLS.

The aim is to equip students with understanding and skills that enable use (i.e., design, implementation, deployment, and analysis) of cryptographic technologies, when addressing real-world (e.g., industrially relevant) problems. By offering an applied, practical perspective on the field of cryptography, it complements, and therefore represents an ideal companion for, other units offering a more theoretical perspective.

Intended Learning Outcomes

Within the context of cryptography, successful completion of this unit will enable students to

  1. understand and use a range of state-of-the-art implementation techniques,
  2. understand and use a range of state-of-the-art implementation attack and countermeasure techniques,
  3. reason about the security of a system in an "end to end" manner, i.e., from the theoretical underpinnings to the concrete implementation, and
  4. use case-study and practical experience to avoid pitfalls in deployment and configuration of existing systems.

Teaching Information

2 two-hour lab. sessions per week.

Assessment Information

This unit is assessed 100% by individual coursework.

Reading and References

  1. Jean-Philippe Aumasson. Serious Cryptography. No Starch Press, 2017.
  2. Niels Ferguson, Bruce Schneier, and Tadayoshi Kohno. Cryptography Engineering: Design Principles and Practical Applications. John Wiley & Sons, 2010.
  3. Ross Anderson. Security Engineering. John Wiley & Sons, 2010.

Feedback