CT5046: Cryptography & Security

CT5046: Cryptography & Security

Please note this module descriptor is indicative of the structure of this course and may be subject to change.

Module Title Cryptography & Security
Module Code CT5046
Module Tutor Qublai Khan Ali Mirza
School School of Computing and Engineering
CAT Points 15
Level of Study 5
Brief Description

This module will aim to provide an introduction to the fundamental concepts, theory and application of cryptography. A number of cryptographic techniques and encryption algorithms will be studied and examined. The primary objective for students is to understand and synthesize the practical application of modern cryptography.

Indicative Syllabus

This module will provide the building blocks for understanding the risks to protecting information and the principles underlying their security in relation to the field of cryptography. The indicative topic coverage for the five areas of the module are detailed below:


  • An introduction to cryptography
    • Principles of cryptography;
    • Cryptography terms and meanings;
    • Confidentiality, integrity, non-repudiation, data origin authentication and entity authentication;
    • A history of cryptography;
    • Basic information theory;
    • Essential number theory, algebra and discrete mathematics;
    • Classical, symmetric and asymmetric encryption techniques and algorithms;
    • Steganography;
    • Cryptanalysis;


  • Symmetric Encryption
    • The purpose and operation of symmetric encryption;
    • Block and stream ciphers;
    • Feistel networks;
    • S-Boxes;
    • Substitution and permutation;
    • Data Encryption Standard (DES);
    • Triple DES (3DES);
    • Advanced Encryption Standard (AES);


  • Cryptographic Hashing
    • The purpose and operation of cryptographic hashing;
    • Message Authentication Message (MAC);
    • Hashed MACs (HMACs).


  • Asymmetric Encryption
    • The purpose and operation of asymmetric encryption;
    • Diffie-Hellman key exchange;
    • Elliptic Curve Cryptography (ECC);
    • RSA Public-Key encryption;
    • Key negotiation and distribution;
    • Message exchanges, data origin authentication, entity authentication and the provision for non-repudiation.


  • The application of cryptography
    • An overview of the application of cryptography;
    • Encrypting data at rest;
    • Digital signatures;
    • Digital certificates;
    • Certification authorities;
    • Public-Key Infrastructure (PKI);
    • Securing email and Internet communications (SSL/TLS);
    • Virtual Private Networks (VPNs);
    • The provision for data origin authentication, entity authentication and non-repudiation in network communications;
    • Cryptanalysis and cryptographic backdoors;
    • The future of cryptography.
Learning Outcomes

A student passing this module should be able to:

  1. Understand and synthesize the essential components and principles of cryptography;
  2. Understand the fundamental principles and application of symmetric encryption and cryptographic hashing to provide an improved cyber security posture;
  3. Understand the fundamental principles and application of asymmetric and public-key encryption to provide an improved cyber security posture;
  4. Understand the application of cryptographic techniques and protocols to protect the transmission and storage of information, provide confidentiality, integrity, protected message exchanges, data origin authentication, entity authentication and non-repudiation;
  5. Identify and explain key management, digital signatures, digital certificates and a Public-Key Infrastructure (PKI);
  6. Identify and understand the requirements to implement cryptographic applications. Recognise the importance of cryptanalysis and cryptographic backdoors;
Learning and Teaching Activities Scheduled Contact Hours: 36
Independent Learning Hours: 114
Assessment (For further details see the Module Guide) 001: 100% Assignment: Individual: 2500 words or equivalent
Special Assessment Requirements
Indicative Resources The current reading list can be found in the Module Guide, which your lecturer should make available via Moodle.

What are Course Maps and Module Descriptors?

Course Maps

A course map contains a list of the individual study units, called modules, that you study to complete your course. Some modules are compulsory, but you can sometimes choose modules outside your core area of study which interest you.

Module Descriptors

A module is a self-contained, individual unit of study. The module descriptor provides various details about the module including who the module tutor is, what you will be studying, how you will be assessed and what you will have learned once you have completed the module.

Course Resources Archive

Course maps and module descriptors from previous years can be found in the Course Resources Archive.