Skip to main content
 

COMP4217: Applied Cryptography

Please ensure you check the module availability box for each module outline, as not all modules will run in each academic year. Each module description relates to the year indicated in the module availability box, and this may change from year to year, due to, for example: changing staff expertise, disciplinary developments, the requirements of external bodies and partners, and student feedback. Current modules are subject to change in light of the ongoing disruption caused by Covid-19.

Type Open
Level 4
Credits 10
Availability Not available in 2023/24
Module Cap None.
Location Durham
Department Computer Science

Prerequisites

  • (COMP3697 Cryptography OR MATH3401 Cryptography and Codes III) AND COMP2211 Networks and Systems

Corequisites

  • None

Excluded Combinations of Modules

  • None

Aims

  • To understand:
  • the design of cryptographic protocols;
  • the security notions for cryptographic protocols.

Content

  • Hash functions: constructions and security
  • Application of hash functions: MACs, key derivation functions, MFA
  • Signature schemes: constructions, security and threshold signatures
  • Applications of signature schemes: SSL, certificates, key agreement
  • Construction of protocols and proving their security

Learning Outcomes

Subject-specific Knowledge:

  • On completion of the module, students will be able to demonstrate:
  • an understanding of the key features of cryptographic hash functions;
  • an understanding of the key features of digital signature schemes;
  • an understanding of the issues faced in designing and assessing the security of cryptographic protocols.

Subject-specific Skills:

  • On completion of the module, students will be able to demonstrate:
  • an ability to evaluate the efficiency and security of protocols based on hash functions;
  • an ability to design various digital signature schemes and to assess their security

Key Skills:

  • On completion of the module, students will be able to demonstrate:
  • an ability to formally prove the security of hash functions and digital signatures;
  • an ability to assess the efficiency and security of protocols.

Modes of Teaching, Learning and Assessment and how these contribute to the learning outcomes of the module

  • Lectures enable the students to learn new material.
  • The examination assesses the knowledge and understanding of the material covered in the lectures.

Teaching Methods and Learning Hours

ActivityNumberFrequencyDurationTotalMonitored
Lectures201 per week1 hour20 
Preparation and reading80 
Total100 

Summative Assessment

Component: ExaminationComponent Weighting: %
ElementLength / DurationElement WeightingResit Opportunity
Examination2 hours100No

Formative Assessment

Example formative exercises are given during the course.

More information

If you have a question about Durham's modular degree programmes, please visit our FAQ webpages, Help page or our glossary of terms. If you have a question about modular programmes that is not covered by the FAQ, or a query about the on-line Undergraduate Module Handbook, please contact us.

Prospective Students: If you have a query about a specific module or degree programme, please Ask Us.

Current Students: Please contact your department.