KV6009 - Advanced Security

What will I learn on this module?

The aim of this module is to provide applied knowledge and understanding of Cryptography and Authentication.
The module covers a range of topics and starts with building an understanding of the basics of Cryptography by exploring first-generation cryptographic cyphers. The module then discusses the mathematical functions and relevant algorithms used in Cryptography, such as Euclid’s algorithm, prime numbers and primitive roots. These concepts are going to provide the theoretical base which is essential for this module.
In the later weeks, the module is going to discuss a range of cryptosystems and cyphers, such as Vigenère cypher, Vernam cypher and Hill cypher. The module is going to discuss Public Key Cryptography/Infrastructure (PKI), Encryption, Encoding/Decoding, Digital Signatures, Diffie-Hellman key exchange, Rivest Shamir Adleman (RSA), Hellman and ElGamal cryptosystems along with Advanced Encryption Standard (AES) algorithms.
The module discusses the formal application of these topics using scripting languages, such as Python. Various tools, such as Scyther, Tamarin Prover and ProVerif are going to be used to practically implement different cryptographic protocols and implement them in a more applied form. The learned knowledge is going to be applied and implemented using these tools to develop two-factor, three-factor and multi-factor cryptography protocols and authentication methods. These cryptographic methods are going to be validated using logical analysis techniques, such as BAN Logic and SVO Logic.
This module helps you build the applied knowledge of cryptography and authentication which is an essential attribute of modern-day security systems. This knowledge is going to give you an edge when applying for jobs related to ethical hacking or system security analyst. The module emphasizes various graduate attributes while keeping in-mind equality, diversity and inclusivity, such as problem formulation, numerical analysis, numeracy skills, argument presentation and problem-solving skills.

How will I learn on this module?

The module is supported with weekly lectures, practical labs/workshops and independent learning. The lectures are going to equip you with essential theories and concepts with series of examples followed by practical labs/workshops where you will have the opportunity to apply the learned knowledge. The practical and hands-on sessions will take place in Northumbria CIS labs that are equipped with state-of-the-art industrial tools and equipment.

How will I be supported academically on this module?

There is various level of support available in this module. Weekly lectures during the timetabled sessions followed by hands-on workshops/labs where you will be given support and guidance to complete the practical work and feedback on your work. The Northumbria University VLE will be used to provide remote access support to all lectures, supported material and resources to reinforce learning. You will also have excellent electronic support provided by Northumbria library and you can access electronic copies of resources through University’s eLearning access.

What will I be expected to read on this module?

All modules at Northumbria include a range of reading materials that students are expected to engage with. The reading list for this module can be found at: http://readinglists.northumbria.ac.uk
(Reading List service online guide for academic staff this containing contact details for the Reading List team – http://library.northumbria.ac.uk/readinglists)

What will I be expected to achieve?

Knowledge & Understanding:
ML01 - Understand number systems, mathematical functions and basics of cryptography.
ML02 - Design and develop the cryptographic mechanism for public key infrastructure.
ML03 – Practically implement encryption and decryption cryptographic functions, methods and protocols.

Intellectual / Professional skills & abilities:
ML04 - Practically apply and validate various cryptographic methods and perform manual/automated cryptanalysis using logical methods and automated tools.

Personal Values Attributes (Global / Cultural awareness, Ethics, Curiosity) (PVA):
ML05 – Work as team to develop a group project identifying equality, diversity and multi-cultural issues while demonstrating research and enquiry skills.

How will I be assessed?

There will be two set of assessments in this module.

A summative assessment (practical research report) comprises of 100% of the module assessment weight. The report will be an IEEE research report of maximum 3000 words. You will receive constructive comments and feedback from the module team. This assessment addresses all the Module Learning Outcomes (ML01, ML02, ML03, ML04 and ML05).

There will be weekly lab work (formative assessment) required to be completed weekly. This formative assessment addresses Module Learning Outcomes – ML01, ML02 and ML03. It will not be contributed towards the module assessment weight.

Pre-requisite(s)

Introduction to Programming (Python)

Co-requisite(s)

N/A

Module abstract

Do you like cracking cyphers? Do you like to learn the science behind hashes and encryption? Do you like to build your own authentication frameworks that can be used to challenge hackers and attackers? Then this module is for you.

The module covers a range of topics and builds an understanding of the basics of Cryptography by exploring first-generation cryptographic cyphers. The module is going to discuss a range of cryptosystems and cyphers, such as Vigenère and Vernam cypher, and topics like Public Key Infrastructure (PKI), Encryption, Encoding/Decoding and Digital Authentication.
You will develop your own authentication schemes and protocols using various tools, such as Scyther, Tamarin Prover and ProVerif. You will use these tools to practically implement different cryptographic protocols and implement them in a more applied form. This knowledge is going to give you an edge when applying for jobs related to ethical hacking or system security analyst.

Course info

UCAS Code G417

Credits 20

Level of Study Undergraduate

Mode of Study 3 years full-time or 4 years with a placement (sandwich)/study abroad

Department Computer and Information Sciences

Location City Campus, Northumbria University

City Newcastle

Start September 2024 or September 2025

Fee Information

Module Information

All information is accurate at the time of sharing. 

Full time Courses are primarily delivered via on-campus face to face learning but could include elements of online learning. Most courses run as planned and as promoted on our website and via our marketing materials, but if there are any substantial changes (as determined by the Competition and Markets Authority) to a course or there is the potential that course may be withdrawn, we will notify all affected applicants as soon as possible with advice and guidance regarding their options. It is also important to be aware that optional modules listed on course pages may be subject to change depending on uptake numbers each year.  

Contact time is subject to increase or decrease in line with possible restrictions imposed by the government or the University in the interest of maintaining the health and safety and wellbeing of students, staff, and visitors if this is deemed necessary in future.

 

Your Learning Experience

Find out about our distinctive approach at 
www.northumbria.ac.uk/exp

Admissions Terms and Conditions
northumbria.ac.uk/terms

Fees and Funding
northumbria.ac.uk/fees

Admissions Policy
northumbria.ac.uk/adpolicy

Admissions Complaints Policy
northumbria.ac.uk/complaints