KV6009 - Advanced Security

What will I learn on this module?

The aim of this module is to provide applied knowledge and understanding of Cryptography and Authentication.
The module covers a range of topics and starts with building an understanding of the basics of Cryptography by exploring first-generation cryptographic cyphers. The module then discusses the mathematical functions and relevant algorithms used in Cryptography, such as Euclid’s algorithm, prime numbers and primitive roots. These concepts are going to provide the theoretical base which is essential for this module.
In the later weeks, the module is going to discuss a range of cryptosystems and cyphers, such as Vigenère cypher, Vernam cypher and Hill cypher. The module is going to discuss Public Key Cryptography/Infrastructure (PKI), Encryption, Encoding/Decoding, Digital Signatures, Diffie-Hellman key exchange, Rivest Shamir Adleman (RSA), Hellman and ElGamal cryptosystems along with Advanced Encryption Standard (AES) algorithms.
The module discusses the formal application of these topics using scripting languages, such as Python. Various tools, such as Scyther, Tamarin Prover and ProVerif are going to be used to practically implement different cryptographic protocols and implement them in a more applied form. The learned knowledge is going to be applied and implemented using these tools to develop two-factor, three-factor and multi-factor cryptography protocols and authentication methods. These cryptographic methods are going to be validated using logical analysis techniques, such as BAN Logic and SVO Logic.
This module helps you build the applied knowledge of cryptography and authentication which is an essential attribute of modern-day security systems. This knowledge is going to give you an edge when applying for jobs related to ethical hacking or system security analyst. The module emphasizes various graduate attributes while keeping in-mind equality, diversity and inclusivity, such as problem formulation, numerical analysis, numeracy skills, argument presentation and problem-solving skills.

How will I learn on this module?

The module is supported with weekly lectures, practical labs/workshops and independent learning. The lectures are going to equip you with essential theories and concepts with series of examples followed by practical labs/workshops where you will have the opportunity to apply the learned knowledge. The practical and hands-on sessions will take place in Northumbria CIS labs that are equipped with state-of-the-art industrial tools and equipment.

How will I be supported academically on this module?

There is various level of support available in this module. Weekly lectures during the timetabled sessions followed by hands-on workshops/labs where you will be given support and guidance to complete the practical work and feedback on your work. The Northumbria University VLE will be used to provide remote access support to all lectures, supported material and resources to reinforce learning. You will also have excellent electronic support provided by Northumbria library and you can access electronic copies of resources through University’s eLearning access.

What will I be expected to read on this module?

All modules at Northumbria include a range of reading materials that students are expected to engage with. The reading list for this module can be found at: http://readinglists.northumbria.ac.uk
(Reading List service online guide for academic staff this containing contact details for the Reading List team – http://library.northumbria.ac.uk/readinglists)

What will I be expected to achieve?

Knowledge & Understanding:
ML01 - Understand number systems, mathematical functions and basics of cryptography.
ML02 - Design and develop the cryptographic mechanism for public key infrastructure.
ML03 – Practically implement encryption and decryption cryptographic functions, methods and protocols.

Intellectual / Professional skills & abilities:
ML04 - Practically apply and validate various cryptographic methods and perform manual/automated cryptanalysis using logical methods and automated tools.

Personal Values Attributes (Global / Cultural awareness, Ethics, Curiosity) (PVA):
ML05 – Work as team to develop a group project identifying equality, diversity and multi-cultural issues while demonstrating research and enquiry skills.

How will I be assessed?

There will be two set of assessments in this module.

A summative assessment (practical research report) comprises of 100% of the module assessment weight. The report will be an IEEE research report of maximum 3000 words. You will receive constructive comments and feedback from the module team. This assessment addresses all the Module Learning Outcomes (ML01, ML02, ML03, ML04 and ML05).

There will be weekly lab work (formative assessment) required to be completed weekly. This formative assessment addresses Module Learning Outcomes – ML01, ML02 and ML03. It will not be contributed towards the module assessment weight.

Pre-requisite(s)

Introduction to Programming (Python)

Co-requisite(s)

N/A

Module abstract

Do you like cracking cyphers? Do you like to learn the science behind hashes and encryption? Do you like to build your own authentication frameworks that can be used to challenge hackers and attackers? Then this module is for you.

The module covers a range of topics and builds an understanding of the basics of Cryptography by exploring first-generation cryptographic cyphers. The module is going to discuss a range of cryptosystems and cyphers, such as Vigenère and Vernam cypher, and topics like Public Key Infrastructure (PKI), Encryption, Encoding/Decoding and Digital Authentication.
You will develop your own authentication schemes and protocols using various tools, such as Scyther, Tamarin Prover and ProVerif. You will use these tools to practically implement different cryptographic protocols and implement them in a more applied form. This knowledge is going to give you an edge when applying for jobs related to ethical hacking or system security analyst.

Course info

UCAS Code G417

Credits 20

Level of Study Undergraduate

Mode of Study 3 years full-time or 4 years with a placement (sandwich)/study abroad

Department Computer and Information Sciences

Location City Campus, Northumbria University

City Newcastle

Start September 2023 or September 2024

Fee Information

Module Information

All information is accurate at the time of sharing.

Full time Courses starting in 2023 are primarily delivered via on-campus face to face learning but may include elements of online learning. We continue to monitor government and local authority guidance in relation to Covid-19 and we are ready and able to flex accordingly to ensure the health and safety of our students and staff.

Contact time is subject to increase or decrease in line with additional restrictions imposed by the government or the University in the interest of maintaining the health and safety and wellbeing of students, staff, and visitors, potentially to a full online offer, should further restrictions be deemed necessary in future. Our online activity will be delivered through Blackboard Ultra, enabling collaboration, connection and engagement with materials and people.

 

Current, Relevant and Inspiring

We continuously review and improve course content in consultation with our students and employers. To make sure we can inform you of any changes to your course register for updates on the course page.


Your Learning Experience

Find out about our distinctive approach at 
www.northumbria.ac.uk/exp

Admissions Terms and Conditions
northumbria.ac.uk/terms

Fees and Funding
northumbria.ac.uk/fees

Admissions Policy
northumbria.ac.uk/adpolicy

Admissions Complaints Policy
northumbria.ac.uk/complaints