Teaching Responsibility
LJMU Schools involved in Delivery:
LJMU Partner Taught
Learning Methods
Lecture
Module Offerings
5552NCCG-JAN-PAR
5552NCCG-SEP-PAR
5552NCCG-SEP_NS-PAR
Aims
This module introduces students to the theoretical principles of cryptography and its practical applications. It looks at the interaction between cryptography and security, and introduces the process of forensic investigation.
Learning Outcomes
1.
Examine and assess symmetric encryption algorithms, ciphers, public key encryption protocols and signatures, and their uses.
2.
Analyse the security issues related to encryption methods
3.
Carry out and evaluate a digital Forensic Investigation on devices or networks or cyberattacks using recognised methods and within legal and professional guidelines
Module Content
Outline Syllabus:Modular arithmetic, groups, finite fields and probability; random number generation. Symmetric encryption and ciphers. Historical and modern ciphers
Public key encryption algorithms. Primality testing and factoring and discrete logarithms. Key exchange and signature schemes. Analysis of implementation issues. Public key confidentiality and integrity. Common attacks on public key encryption schemes
Security of encryption. Provable security. Random oracles. Provable security without random oracles. Hybrid encryption. Key Encapsulation Mechanisms (KEMs)
Access structures for secret sharing schemes. Applying shared RSA signature generation. Zero-Knowledge proofs. Secure multi-party computation. Evaluating different applications of cryptography; quantum cryptography.
Network Security protocols. Network Security cryptographic types.
Processes and procedures for digital Forensic Investigation. Tools required to conduct digital Forensic Investigation
Carry out a forensic investigation