Teaching Responsibility

LJMU Schools involved in Delivery:

LJMU Partner Taught

Learning Methods

Lecture

Module Offerings

5552NCCG-JAN-PAR

5552NCCG-SEP-PAR

5552NCCG-SEP_NS-PAR

Aims

This module introduces students to the theoretical principles of cryptography and its practical applications. It looks at the interaction between cryptography and security, and introduces the process of forensic investigation.

Learning Outcomes

1.
Examine and assess symmetric encryption algorithms, ciphers, public key encryption protocols and signatures, and their uses.
2.
Analyse the security issues related to encryption methods
3.
Carry out and evaluate a digital Forensic Investigation on devices or networks or cyberattacks using recognised methods and within legal and professional guidelines

Module Content

Outline Syllabus:Modular arithmetic, groups, finite fields and probability; random number generation. Symmetric encryption and ciphers. Historical and modern ciphers Public key encryption algorithms. Primality testing and factoring and discrete logarithms. Key exchange and signature schemes. Analysis of implementation issues. Public key confidentiality and integrity. Common attacks on public key encryption schemes Security of encryption. Provable security. Random oracles. Provable security without random oracles. Hybrid encryption. Key Encapsulation Mechanisms (KEMs) Access structures for secret sharing schemes. Applying shared RSA signature generation. Zero-Knowledge proofs. Secure multi-party computation. Evaluating different applications of cryptography; quantum cryptography. Network Security protocols. Network Security cryptographic types. Processes and procedures for digital Forensic Investigation. Tools required to conduct digital Forensic Investigation Carry out a forensic investigation

Assessments

Report

Report