module specification

MA7011 - Applications in Cryptography and Cryptanalysis (2025/26)

Module specification Module approved to run in 2025/26
Module title Applications in Cryptography and Cryptanalysis
Module level Masters (07)
Credit rating for module 20
School School of Computing and Digital Media
Total study hours 200
 
52 hours Assessment Preparation / Delivery
100 hours Guided independent study
48 hours Scheduled learning & teaching activities
Assessment components
Type Weighting Qualifying mark Description
Coursework 50%   1500-2000 word report exploring a topic in modern cryptography allowing students to explore legal, social, ethical issue
In-Course Test 50%   In Class Test consisting of questions covering major algorithms encountered in the module
Running in 2025/26

(Please note that module timeslots are subject to change)
Period Campus Day Time Module Leader
Spring semester North Thursday Afternoon

Module summary

This module aims to introduce you to applications of cryptography in the 21st century connected, digital world. Its content and delivery are linked to CS7064 Information Security you will be studying at the same time or will have previously studied. This companion module, taken by students on other pathways, contains a section of c4 weeks that describes key aspects of modern cryptography (focussed on asymmetric/public key algorithms). In these weeks you will encounter key concepts and definitions and the broad structure of algorithms in CS7064 but will study them in more depth and with a stronger mathematical underpinning in the corresponding sessions that form part of this module. This approach will allow you to consolidate your knowledge across two sessions in a single week for key topics of the syllabus allowing sufficient time for you to explore techniques in a lab session using MAPLE software.

Beyond these 4 weeks there are three other principal themes for this module:

· To see how cryptanalysis works in historic and modern ciphers; this is illustrated by seeing ways that historic ciphers were broken and a detailed analysis of attacks on RSA that need to resisted in a successful implementation

· To give you a historical perspective on the development of cryptography and the way the subject has evolved; this theme will be developed by visits including to the Museum of Cryptography at Bletchley Park.

· To enable you to appreciate the changing landscape that cryptography inhabits and how developing technologies such as quantum computing will influence its future development. The module concludes with a survey of newly established standards for quantum resistant algorithms based around lattices and error correcting codes.

Additionally, the module aims to provide you with the background and familiarity with key concepts to enable you to make an informed selection of a topic for your major project/dissertation. This will necessarily include the identification of key ethical and social implications in the landscape that cryptography inhabits.

Syllabus

History of cryptography and key concepts: block and stream ciphers, symmetric versus asymmetric cryptography. Analysis and cryptanalysis of classical ciphers used in military and other situations and their strengths and weaknesses. Use of mathematical software (e.g. MAPLE) to study algorithms used in cryptography via basic programming structures (e.g. FOR, WHILE, IF conditions within small procedures). LO1

Modern applications of symmetric and asymmetric cryptography: public key algorithms studied and analysed will include RSA, Diffie Hellman key exchange protocols, El Gamal algorithm based on discrete logarithms, elliptic curve cryptography. Symmetric systems will include the Advanced Encryption Standard. As well as studying the algorithms the module will also cover the social context of their development and the ways in which known weaknesses have been addressed. The debate (both historic and ongoing) about the limits of personal privacy in the context of securing the safety of society will be explored using current events and historical case studies (e.g. the Edward Snowdon revelations). LO2, LO3, LO4

Current developments and issues in cryptography. Topics will be considered from both a technical and a legal/ethical perspective and the list will be informed by future advances but is likely to include some or all of the following:

· blockchain methods for information security and governance/trust applications;

· the implications of quantum computing on cryptography, new cryptographic security protocols based on lattices and error correcting codes will be introduced. An introduction to quantum logic gates and the implications of the Grover and Shor Algorithms. Simulation software that models quantum logic gates will be used in the relevant workshops.

Applications of AI to cryptography; these could include possible speed up of cryptanalysis and in analysing algorithms to identify weaknesses e.g. to side channel attacks. LO3, LO4

Balance of independent study and scheduled teaching activity

The module has 200 learning hours. 4 hours per week contact is divided approximately equally between lectures covering background, theory and examples and workshops in PC Labs which involve discussion of the ideas and an opportunity for students to practice the mathematical techniques and to develop proficiency in programming in Maple and investigating realistic data sets. The remaining hours of private study will allow students to complete background reading, work on exercises and prepare for assessment.

Learning outcomes

This module aims to enable students to:

LO1: To demonstrate an appreciation of the historical development of cryptography and the way in which algorithms have developed in parallel with technological advances.

LO2: To demonstrate a thorough understanding of algorithms used currently in commercial applications for symmetric and asymmetric cryptography.

LO3: To understand the modern context of cryptography and potential developments that may affect its future direction.

LO4: To appreciate the legal, social and ethical frameworks within which cryptography sits in the modern world.

Bibliography