0% found this document useful (0 votes)
127 views5 pages

Cryptography Handbook1

This document summarizes a cryptography and cryptanalysis unit, including: - The unit team of 3 professors and their contact information - An overview of the weekly lectures on topics like public/private key cryptography, cryptanalysis techniques, and a revision week - Details on the unit assessments: - Assessment 1 is an individual report on a case study due in week 10 - Assessment 2 is a 3-hour exam covering all unit material - Learning outcomes which students will be able to critically evaluate cryptographic algorithms, modern ciphers/authentication, and cryptanalysis techniques.

Uploaded by

Prathima Madasu
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
127 views5 pages

Cryptography Handbook1

This document summarizes a cryptography and cryptanalysis unit, including: - The unit team of 3 professors and their contact information - An overview of the weekly lectures on topics like public/private key cryptography, cryptanalysis techniques, and a revision week - Details on the unit assessments: - Assessment 1 is an individual report on a case study due in week 10 - Assessment 2 is a 3-hour exam covering all unit material - Learning outcomes which students will be able to critically evaluate cryptographic algorithms, modern ciphers/authentication, and cryptanalysis techniques.

Uploaded by

Prathima Madasu
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

CIS014-6 Unit Handbook

Cryptography and Cryptanalysis 2011-2012

Unit Team
Dr. Gregory Epiphaniou Prof. Song Yan Dr Hui Cheng [email protected] [email protected] [email protected] C114 D105 C105 3934 9307 3933

GE 2011/12

CIS014-6 Cryptography and Cryptanalysis


Unit Leader: Dr Gregory Epiphaniou
Week Begin Wk 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Lecture Introduction to the Unit (GE) Practical Assessment

No practical(s) the first week Public Key Cryptography RSA (SY) Public-Key System: DHM/ElGamal (SY) Public-Key Cryptography: Elliptic Curve Cryptography ECC (SY) Public-Key Cryptography: Digital Signatures, Hashing Functions and Certificates (SY) Key Concepts and the History of Cryptography (HC) Private-Key Cryptography:Monographic and Polygraphic Ciphers (HC) Private-Key Cryptography: DES/AES (HC) Private-Key Cryptography: RC4, RC5,RC6 Private-Key Cryptography: Stream Ciphers and One-Time Pads (HC) Introduction to modern Cryptanalysis (GE) Breaking Symmetric Algorithms(GE) Breaking Hash Functions (GE) REVISION (GE, SY, HC) EXAMS

Issued: Assessment 1 (RE) (wk 1)

Submission: Assessment 1 (RE) Submission (wk 10)

Please be aware that the order of the lectures might change without notice
Referral Work If you fail to meet the Learning Outcomes for the above assessments and are referred, there will be an opportunity to repeat any of the assessment points at a time to be indicated on BREO (http://breo.beds.ac.uk). It is your responsibility to find out about referral dates for any of the assignment points posted in this handbook.

GE 2011/12

CIS014-6 Cryptography and Cryptanalysis ACCESS TO UNIT HANDOUTS AND OTHER RELEVANT INFORMATION Description and Rationale The purpose of this unit is to provide an in-depth and specialized knowledge around the cryptography concepts and methods. This unit provides students with fundamental and advanced topics related to cryptographic algorithms operations including recent developments in the field. All the methods and mechanisms for cryptanalysis are also delivered in the core of this unit. The theoretical material including those aspects is also articulated in the curriculum. More precisely, Cryptography development from Caesar cipher, Vigenres encryption scheme to Hash family, Steganography and Quantum cryptography are core elements taught in this unit.

Aim: Provide a strong understanding in the theoretical aspects of modern cryptography Critically evaluate current techniques and reflect upon strengths and weaknesses of current cryptographic methods/techniques Enhance and demonstrate an in-depth knowledge of modern cryptanalysis Critically evaluate existing mechanisms for confidentiality and authentication Demonstrate an outstanding use of the cryptographic algorithms for a given scenario and the ability to optimally select a method from a pool of alternatives Critically evaluate security principles and methods in terms of their benefits and inherent limitations

Learning Outcomes On successful completion of the unit, students will be able: Specify and critically evaluate current cryptographic algorithms and tools employing such mechanisms

Assessment Criteria To achieve the learning outcome you must demonstrate the ability to: Critically review and use the majority of the tools that employ ciphers and study their core operations in terms of the mathematical operations during the encryption/decryption process Fully justify the different types of cryptography and the structure of each type underpinning the frameworks governing their operation Extensively practice the tools and methods provided for practical cryptography. The assessment strategy for this unit will ensure that the material has been articulated appropriately Critically review one or more emergent paradigms that underpin modern security flaws on existing implementations and discuss how future trends can address those issues. Fully justify selections in relation to a given case study as part of the in course assessment. Use referenced sources for attacking cryptosystems and be familiarised with processes and strategies Combine the characteristics of the mechanisms/algorithms examined in order to stress out the areas of improvement and selection of the optimal solutions

Investigate in-depth the core structure and operation(s) of modern ciphers and authentication primitives Demonstrate a strong technical proficiency on applying current cryptographic methods to specific scenarios and critically reflect upon the best alternatives for a given case Evaluate strengths and weaknesses for each cryptographic algorithm on the basis of performance and applicability Critically evaluate all the modern cryptanalysis techniques, methods and tools to attack a crypto-system Critically evaluate and select areas of practical implementation and reflect upon security mechanisms currently using cryptographic concepts

GE 2011/12

Learning Strategies Delivery will be achieved by a combination of lectures, practical sessions and independent study. In addition, the Blackboard Virtual Learning Environment will be used in the delivery of the unit content. (http://www.breo.beds.ac.uk) It is expected that a student will do at least 150 hours of study for this unit breakdown as shown into various categories of study. Lectures Practical Activities Directed Learning Independent Study 26 hours 13 hours 36 hours 75 hours

Students should note that this unit booklet plus additional materials will be published weekly on the CIS014-6 BREO site: Weekly Lecture Handout Weekly Practical exercises Assessment details

Attendance and Behaviour


Attendance at all sessions will be recorded, for all sessions please try to arrive on time. If you do arrive after the start please enter quietly and do not disturb the session. Students attending this unit are asked to attend on time; entrance to the session later than 10 minutes after the start of the session may be refused as it is disturbing to the class, if you leave during a session you may be refused entry back to the session to reduce disturbance to the class Please turn off your mobile phone during all sessions as the ringing and answering of calls is disturbing to the class and you are reminded that food or drink should not be consumed in teaching rooms.

Essential Practical Cryptography, Niels Gerguson and Bruce Scheier Modern Cryptanalysis: Techniques for Advanced Code Breaking, Christopher Swenson nd Stallings W (2003), Network Security Essentials, 2 Ed, Prentice-Hall. Background J. A. Buchmann, Introduction to Cryptography with Coding Theory, Springer-Verlag, 2002. ISBN 0-387-95034-6 O. Goldreich, Foundations of Cryptography, Vol I, Basic Tools, Cambridge University Press, 2001. ISBN 0-521-79172-3 O. Goldreich, Foundations of Cryptography, Vol II, Basic Applications, Cambridge University Press, 2004. 0-521-83084-2 A. J. Menezes, P. C. Ooschot and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997. ISBN 0-8493-8523-7 M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information, Cambridge University Press, 2001. ISBN 0-521-63503-9 N. Smart, An Introduction to Cryptography, McGraw-Hill, 2002. ISBN 0-0770-9987-7 rd D. R. Stinson, Cryptography: Theory and Practice, 3 Edition, CRC Press, 2005. ISBN 158488-508-4 W. Trappe and L. Washington, Introduction to Cryptography with Coding Theory, 2nd Edition, Prentice-Hall, 2005. 0-13-198199-0 S. Yan, Cryptanalytic Attacks on RSA, Springer, 2008. ISBN 0-387-77267-7 S. Yan, Primality Testing and Integer Factorization in Public-Key Cryptography, Springer, 2009 ISBN 0-387-77267-7. Boyd Colin and Manuria, A. (2010): Protocols for Authentication and Key Establishment, Springer Boyd C. et. al. (2007) Information Security, Springer-Verlag New York, LLC Series: Lecture Notes in Computer Science, Series, #2851, ISBN: 3540201769

GE 2011/12

CIS014-6 Cryptography and Cryptanalysis Assignment No. 1 Individual Report (RE)


Assessment 1 will involve an individual report based on a case study taken from a real-life scenario. The examination assesses the students knowledge around the techniques and methods of computer security and contributes 60% of the overall grade for the unit. As part of the assessment process students are required to investigate a case study and deliver their analysis and findings in a form of a report attached. This will give the ability to students to actively reflect upon a given case and critically analyse the techniques used. The following Assessment Criteria will be addressed in this assignment: LO2 - Investigate in-depth the core structure and operation(s) of modern ciphers and authentication primitives LO4 - Select an optimal solution that is tailored around a given technical scenario. An opportunity will be given both in the in course assessment and the exam LO3 - Demonstrate a strong technical proficiency on applying current cryptographic methods to specific scenarios and critically reflect upon the best alternatives for a given case LO5- Critically evaluate all the modern cryptanalysis techniques, methods and tools to attack a crypto-system LO6- Critically evaluate and select areas of practical implementation and reflect upon security mechanisms currently using cryptographic concepts.

CIS014-6 Cryptography and Cryptanalysis Assignment No. 2 Exam (EX)


Assessment 2 will consist of a 3 hrs examination, covering all of the aspects taught in the units curriculum. Students are required to demonstrate knowledge acquired in the material in an assessment weighting 40% of the overall unit grade. The following Assessment Criteria will be addressed in this assignment: LO1 - Specify and critically evaluate current cryptographic algorithms and tools employing such mechanisms. LO4 - Evaluate strengths and weaknesses for each cryptographic algorithm on the basis of performance and applicability.

GE 2011/12

You might also like