Core Module Information
Module title: Applied Cryptography and Trust

SCQF level: 11:
SCQF credit value: 20.00
ECTS credit value: 10

Module code: CSN11131
Module leader: Bill Buchanan
School School of Computing, Engineering and the Built Environment
Subject area group: Cyber Security and Systems Engineering
Prerequisites

There are no pre-requisites for this module to be added

Description of module content:

The focus of this module is to provide a core understanding of the fundamental areas of cryptography, identity, and trust. A key feature is to cover both the theoretical areas, while often demonstrating practical applications including key protocols. The module key areas are:• Privacy, and Cryptography Fundamentals (Confidentiality, Sec Models, Cipher types) • Asymmetric Key Encryption. Including RSA and Elliptic Curve Cryptography (ECC).• Symmetric Key Encryption. Including AES and associated modes.• Hashing and MAC Methods. Including MD5, SHA-1, SHA-256, SHA-3 and PBKDF2.• Security Protocols: HTTPS, SSL/TLS, DNSSec, IPSec, WPA • Key Exchange. Diffie-Hellman Method, ECDH.• Trust Infrastructures. Digital Certificates, Signatures, Key Distribution Centres (Kerberos), OAuth • Identity and Authentication (Passwords, Authentication tokens, Key pair identity, Multi-factor, Biometric Authentication).• Distributed Systems: Blockchain, Distributed Ledgers and Cryptocurrency. Smart Contracts, Data Tokenization, and Transactions.• Future Cryptography: Zero Knowledge Proof, Homomorphic Encryption, Light-weight cryptography, and Quantum robust methods.• Host and Domains: Trust systems. Authentication with Active Directory Authorisation: Log integration and rights.

Learning Outcomes for module:

Upon completion of this module you will be able to

LO1: Explain and demonstrate a critical understanding of specific cryptographic algorithms and cryptosystems.

LO2: Implement, critically analyse and evaluate fundamental areas related to state-of-the-art cryptography related area, including current literature, practical implementation and evaluation.

Full Details of Teaching and Assessment
2025/6, Trimester 2, Blended,
VIEW FULL DETAILS
Occurrence: 001
Primary mode of delivery: Blended
Location of delivery: MERCHISTON
Partner:
Member of staff responsible for delivering module: Bill Buchanan
Module Organiser:


Student Activity (Notional Equivalent Study Hours (NESH))
Mode of activityLearning & Teaching ActivityNESH (Study Hours)NESH Description
Face To Face Lecture 20 This involves a lecture focusing on applied cryptography. This includes the coverage of symmetric key cryptography, hashing methods, public key cryptography, digital signing, tunnelling, blockchain, future cryptography and key exchange. The usage of Cloud-based security will be highlighted wherever possible, along with the integration of practical implementations.
Face To Face Practical classes and workshops 20 These involve practical sessions in the areas of applied cryptography. It will focus on the application of popular cryptographic methods, and integrate the key tools for the analysis, such as with OpenSSL, AWS and coding methods.
Online Guided independent study 160 This involves access to a range of sources, including ASecuritySite.com, and which provides both theoretical and practical knowledge that will be useful for assessments.
Total Study Hours200
Expected Total Study Hours for Module200


Assessment
Type of Assessment Weighting % LOs covered Week due Length in Hours/Words Description
Class Test 40 1 Week 9 HOURS= 1.5 hour test This involves an open-book test which covers areas of knowledge of applied cryptography. It involves a number of questions which cover the areas of symmetric key cryptography, hashing methods, public key cryptography, digital signing and key exchange. All of the questions will have text-based answers on Moodle.
Report 60 1~2 Exam Period , WORDS= 8-20 pages Implement, critically analyse and evaluate the fundamental area of cryptography. It involves the definition of a cryptographic research project, and involves a literature review of the area, a prototype of the target system, and an evaluation of the operation of the prototype. This will highlight how performance varies for certain key conditions.
Component 1 subtotal: 100
Component 2 subtotal: 0
Module subtotal: 100

Indicative References and Reading List - URL:
CSN11131