COMPGA12 - Applied Cryptography

Note: Whilst every effort is made to keep the syllabus and assessment records correct, the precise details must be checked with the lecturer(s).

Code
COMPGA12
Year
MSc
Prerequisites
N/A
Term
2
Taught By
Nicolas Courtois (100%)
Aims
Showing how security is achieved in real-life systems. Understanding how cryptographic algorithm keys and protocols, and an appropriate hardware/software environment, can solve security problems given severe legal, ethical, business and usability constraints. Understanding the benefits and shortcomings of the existing industrial standards. Promotion of ‘best practices’ and some recent promising techniques. Understanding possible attacks and vulnerabilities of a system. Strengthening products against side-channel attacks and designing cost-efficient and secure implementations of cryptographic algorithms.
Learning Outcomes
Learning how security problems are solved in the industry, and understanding why specific choices are made. Understanding security (attacks and defences) in complex real-life systems and the role of keys, cryptographic algorithms and protocols, tamper resistant hardware and other types of countermeasures.

 

Content:

Outline
Key generation and management
Digital and electronic signatures
Industrial standards in public key cryptography
Timestamping
Efficient implementation of cryptographic algorithms
Trusted computing and smart cards
Side-channel attacks and countermeasures
Bank cards and terminals
Electronic passports
RFID systems in public transportation and automobiles
Smart cards and mobile phone security
Payment systems and e-cash
E-auction, e-voting, e-betting and e-gambling

Method of Instruction:

Tutor-led class sessions, problem-solving sessions and private study

Assessment:

The course has the following assessment components:

  • Written Examination (2 hours, 80%)
  • Compulsory Assessed Orals (10 minute presentation, 20%)

To pass this course, students must: Obtain a mark of 50% or more for all components combined

    The examination rubric is: TBC - please check with lecturer

    Resources:

    Lecture notes to be provided in class

    Recommended texts: Anderson, R. 'Security Engineering' Wiley 2006. W. Rankl and W. Effing, 'Smart Card Handbook' Wiley 2003.

    Mayes, K. and Markantonakis K (Editors) 'Smart Cards, Tokens, Security and Applications' Springer 2006.