module specification

MA7011 - Applications in Cryptography and Cryptanalysis (2023/24)

Module specification Module approved to run in 2023/24
Module title Applications in Cryptography and Cryptanalysis
Module level Masters (07)
Credit rating for module 20
School School of Computing and Digital Media
Total study hours 200
 
52 hours Assessment Preparation / Delivery
100 hours Guided independent study
48 hours Scheduled learning & teaching activities
Assessment components
Type Weighting Qualifying mark Description
Coursework 50%   A 2000 word report exploring a topic in modern cryptography
In-Course Test 50%   A 1.5 hour test consisting of questions covering major algorithms encountered in the module
Running in 2023/24

(Please note that module timeslots are subject to change)
Period Campus Day Time Module Leader
Spring semester North Friday Morning

Module summary

Aims of the module: what key skills and knowledge will it enable students to develop?

This module aims to introduce students to applications of cryptography in the 21st century connected, digital world. Its content and delivery is closely connected to CS7064 Information Security that students will also be studying at the same time. This companion module, taken by students on other pathways, contains a section of c4 weeks that describes key aspects of modern cryptography (focussed on asymmetric/public key algorithms). In these weeks the students taking MA7011 will encounter key concepts and definitions and the broad structure of algorithms in CS7064 but will study them in more depth and with a stronger mathematical underpinning in the corresponding sessions that form part of this module. This approach has the advantage of allowing consolidation of knowledge across two sessions in a single week for key topics of the syllabus allowing sufficient time for students to explore techniques in a lab session using MAPLE and other software.

Beyond these 4 weeks there are two other principal themes for this module:

• To give students a historical perspective on the development of cryptography and the way the subject has evolved;
• To appreciate the changing landscape that cryptography inhabits and how nascent technologies may influence its future development.

Additionally, the module aims to provide students with the background and familiarity with key concepts to enable them to make an informed selection of a topic for their major project/dissertation.

Prior learning requirements

Programme entry requirements; CS7064 is a co-requisite module studied simultaneously

Syllabus

History of cryptography and key concepts: block and stream ciphers, symmetric versus asymmetric cryptography. Analysis of classical ciphers and their strengths and weaknesses. Use of mathematical software (e.g. MAPLE) to study algorithms used in cryptography via basic programming structures (e.g. FOR, WHILE, IF conditions within small procedures).

Modern applications of symmetric and asymmetric cryptography: public key algorithms studied and analysed will include RSA, Diffie Hellman key exchange protocols, El Gamel algorithm based on discrete logarithms, elliptic curve cryptography. Symmetric systems will include the Advanced Encryption Standard.

Current developments and issues in cryptography. Topics will be considered from both a technical and a legal/ethical perspective and the list will be informed by future advances but is likely to include some or all of the following:
• blockchain methods for information security;
• the implications of quantum computing on cryptography, cryptographic security based on lattices;
• homomorphic cryptography.

Balance of independent study and scheduled teaching activity

The module has 200 learning hours. 4 hours per week contact is divided approximately equally between lectures covering background, theory and examples and workshops in PC Labs which involve discussion of the ideas and an opportunity for students to practice the mathematical techniques and to develop proficiency in programming in Maple and investigating realistic data sets. The remaining hours of private study will allow students to complete background reading, work on exercises and prepare for assessment.

Learning outcomes

This module aims to enable students to:
LO1:   To appreciate the historical development of cryptography and the way in which algorithms have developed in parallel with technological advances.
LO2:   To demonstrate a thorough understanding of algorithms used currently in commercial applications for symmetric and asymmetric cryptography and the ability to work flexibly selecting solutions and applying knowledge in unfamiliar contexts as appropriate. 
LO3:   To understand the specialised and complex modern context of cryptography and potential developments that may affect its future direction.
LO4:   To demonstrate a thorough appreciation of the legal, social and ethical frameworks within which cryptography sits in the modern world.

Assessment strategy

The algorithms and methods introduced in the first half of the module will be assessed by a time constrained test; ethical and professional issues will be explored in a written assignment

Bibliography

https://rl.talis.com/3/londonmet/lists/B9310F63-E79B-C4F3-320A-328DD2BAD070.html?lang=en-US&login=1

Core Texts:  
Aumasson, Jean Phillipe. Serious Cryptography. No Starch Press 1st Edition Nov 2017. ISBN 1593278268

Katz, J and Lindell, Y Introduction to Modern Cryptography CRC Press 2014

Other Texts:
Stallings, William. Network Security Essentials. Pearson 6th Edition (2016) ISBN 0133370437

Werbach, Kevin. The Blockchain and the New Architecture of Trust. 1st Edition Dec 2018.  ISBN 0262038935