Module: P-Key Cryptography & Sec Protocols - DCU [PDF]

Jul 25, 2008 - Dublin City University - 22764|Syllabus|Review of symmetric & asymmetric cryptography, hash functions

6 downloads 24 Views 60KB Size

Recommend Stories


DCU 7330
You can never cross the ocean unless you have the courage to lose sight of the shore. Andrè Gide

PDF-Download- Applied Cryptography
Where there is ruin, there is hope for a treasure. Rumi

PDF Applied Cryptography
Don’t grieve. Anything you lose comes round in another form. Rumi

[PDF] Understanding Cryptography
Where there is ruin, there is hope for a treasure. Rumi

Dynamic module replacement in distributed protocols
Sorrow prepares you for joy. It violently sweeps everything out of your house, so that new joy can find

Сушилня Sušilica Dryer DCU 8230 DCU 8230 S
I cannot do all the good that the world needs, but the world needs all the good that I can do. Jana

Grafički standardi SEC ,PDF
No amount of guilt can solve the past, and no amount of anxiety can change the future. Anonymous

Cryptography
The happiest people don't have the best of everything, they just make the best of everything. Anony

White-Box Cryptography Cryptography
I tried to make sense of the Four Books, until love arrived, and it all became a single syllable. Yunus

Privacy Enhanced Protocols using Pairing Based Cryptography Caroline Sheedy
Life is not meant to be easy, my child; but take courage: it can be delightful. George Bernard Shaw

Idea Transcript


Module Specifications... Current Academic Year 2017 - 2018 Please note that this information is subject to change. Module Title

P-Key Cryptography & Sec Protocols

Module Code

CA646

School

School of Computing Online Module Resources Semester 1: David Gray Semester 2: David Gray Autumn: David Gray

Module Co-ordinator Module Teachers

David Gray

NFQ level

9

Credit Rating

Pre-requisite

None

Co-requisite

None

Compatibles

None

Incompatibles

None

7.5

Description This module introduces students to modern public-key cryptography and security protocols. Learning Outcomes 1. Describe the fundamental concepts underpinning public-key cryptography, digital signature schemes and provable security. 2. Explain the mathematical concepts underlying RSA and ElGamal, and perform appropriate calculations and proofs using these concepts. 3. Describe and analyse public-key encryption schemes and digital signature schemes based on RSA and ElGamal. 4. Interpret and synthesize reductionist security arguments for differing security goals. 5. Design & write software to implement public-key encryption schemes and digital signature schemes based on RSA and ElGamal. 6. Describe the fundamental concepts underpinning security protocols, key management and public key infrastructures. 7. Describe and analyse security protocols for applications such as authentication, key-exchange, e-mail,e-cash, zero-knowledge protocols, bit-commitment protocols and fair-exchange protocols 8. Design & write software to implement security protocols.

Workload

Full-time hours per semester

Type

Hours

Description

Lecture Lecture Independent Study Independent Study Assignment Completion Assignment Completion Directed learning Directed learning

36 36

Lectures Lectures

60

Private study/research

60

Private study/research

80

Programming Exercises

80

Programming Exercises

12 12

Class tests Class tests Total Workload: 376

All module information is indicative and subject to change. For further information,students are advised to refer to the University's Marks and Standards and Programme Specific Regulations at: http://www.dcu.ie/registry/examinations/index.shtml Indicative Content and Learning Activities Syllabus Review of symmetric & asymmetric cryptography, hash functions and random number generators; Complexity theory and probability; Public-key schemes and provable security; RSA and the hardness of factoring; ElGamal and the discrete log problem; Efficient implementation of basic algorithms and the RSA & ElGamal public-key schemes; Digital signature schemes based on RSA & ElGamal, and their implementation. Security objectives - confidentiality, integrity, authentication and non-repudiation; Key management and Public key Infrastructures; Authentication & key-exchange protocols; Secure e-mail; Advanced protocols – blind signatures, electronic cash, ZK protocols, identification schemes, bit-commitment protocols, twoparty fair contract signing. Assessment Breakdown Continuous Assessment

25% Examination Weight

Course Work Breakdown Type

Description

% of total Assessment Date

In Class Test Two class tests held during the semester. 30% Reassessment Requirement Resit arrangements are explained by the following categories; 1 = A resit is available for all components of the module 2 = No resit is available for 100% continuous assessment module 3 = No resit is available for the continuous assessment component This module is category 3 Indicative Reading List Wenbo Mao: 2004, Modern Cryptography: Theory & Practice, Prentice Hall, Katz & Lindell: 2008, Introduction to Modern Cryptography, Chapman & Hall, Menezes, van Oorschot & Vanstone: 1997, Handbook of Applied Cryptography, CRC Press, http://www.cacr.math.uwaterloo.ca/hac/, Other Resources None Array Programme or List of Programmes ECSA ECSAO GCSF GDSF GTEC MCM NAVNMU

Study Abroad (Engineering & Computing) Study Abroad (Engineering & Computing) Grad Cert in Security & Forensics Graduate Diploma in Security & Forensics Graduate Training Visitor Program (E&C) M.Sc. in Computing Non Award Visitors- UCD/DCU

Timetable this semester: Timetable for CA646 Date of Last Revision Archives:

Student Email Portal Disclaimer Staff Email Contact Us Moodle Privacy ,

25-JUL-08 See the module specification for CA646 in 2003 - 2004 See the module specification for CA646 in 2004 - 2005 See the module specification for CA646 in 2005 - 2006 See the module specification for CA646 in 2006 - 2007 See the module specification for CA646 in 2007 - 2008 See the module specification for CA646 in 2008 - 2009 See the module specification for CA646 in 2009 - 2010 See the module specification for CA646 in 2010 - 2011 See the module specification for CA646 in 2011 - 2012 See the module specification for CA646 in 2012 - 2013 See the module specification for CA646 in 2013 - 2014 See the module specification for CA646 in 2014 - 2015 See the module specification for CA646 in 2015 - 2016 See the module specification for CA646 in 2016 - 2017 See the module specification for the current year

75%

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.