2025/6, Trimester 2, Blended,
VIEW FULL DETAILS
| Occurrence: | 001 |
| Primary mode of delivery: | Blended |
| Location of delivery: | MERCHISTON |
| Partner: | |
| Member of staff responsible for delivering module: | Bill Buchanan |
| Module Organiser: | |
| Student Activity (Notional Equivalent Study Hours (NESH)) |
| Mode of activity | Learning & Teaching Activity | NESH (Study Hours) | NESH Description |
| Face To Face | Lecture | 20 | This involves a lecture focusing on applied cryptography. This includes the coverage of symmetric key cryptography, hashing methods, public key cryptography, digital signing, tunnelling, blockchain, future cryptography and key exchange. The usage of Cloud-based security will be highlighted wherever possible, along with the integration of practical implementations. |
| Face To Face | Practical classes and workshops | 20 | These involve practical sessions in the areas of applied cryptography. It will focus on the application of popular cryptographic methods, and integrate the key tools for the analysis, such as with OpenSSL, AWS and coding methods. |
| Online | Guided independent study | 160 | This involves access to a range of sources, including ASecuritySite.com, and which provides both theoretical and practical knowledge that will be useful for assessments. |
| Total Study Hours | 200 | |
| Expected Total Study Hours for Module | 200 | |
| Assessment |
| Type of Assessment | Weighting % | LOs covered | Week due | Length in Hours/Words | Description |
| Class Test | 40 | 1 | Week 9 | HOURS= 1.5 hour test | This involves an open-book test which covers areas of knowledge of applied cryptography. It involves a number of questions which cover the areas of symmetric key cryptography, hashing methods, public key cryptography, digital signing and key exchange. All of the questions will have text-based answers on Moodle. |
| Report | 60 | 1~2 | Exam Period | , WORDS= 8-20 pages | Implement, critically analyse and evaluate the fundamental area of cryptography. It involves the definition of a cryptographic research project, and involves a literature review of the area, a prototype of the target system, and an evaluation of the operation of the prototype. This will highlight how performance varies for certain key conditions. |
| Component 1 subtotal: | 100 | | |
| Component 2 subtotal: | 0 | | | | |
| Module subtotal: | 100 | | | | |