COMPM064 - Applied Cryptography

Note: Whilst every effort is made to keep the syllabus and assessment records correct, the precise details must be checked with the lecturer(s).

Code
COMPM064 (also taught as: COMPGA12)
Year
4
Prerequisites
N/A
Term
2
Taught By
Nicolas Courtois (100%)
Aims
Showing how security is achieved in real-life systems. Understanding how cryptographic algorithm keys and protocols, and an appropriate hardware/software environment, can solve security problems given severe legal, ethical, business and usability constraints. Understanding the benefits and shortcomings of the existing industrial standards. Promotion of ‘best practices’ and some recent promising techniques. Understanding possible attacks and vulnerabilities of a system. Strengthening products against side-channel attacks and designing cost-efficient and secure implementations of cryptographic algorithms.
Learning Outcomes
Learning how security problems are solved in the industry, and understanding why specific choices are made. Understanding security (attacks and defences) in complex real-life systems and the role of keys, cryptographic algorithms and protocols, tamper resistant hardware and other types of countermeasures.

 

Content

Outline
Key generation and management
Digital and electronic signatures
Industrial standards in public key cryptography
Timestamping
Efficient implementation of cryptographic algorithms
Trusted computing and smart cards
Side-channel attacks and countermeasures
Bank cards and terminals
Electronic passports
RFID systems in public transportation and automobiles
Smart cards and mobile phone security
Payment systems and e-cash
E-auction, e-voting, e-betting and e-gambling

Method of Instruction

Tutor-led class sessions, problem-solving sessions and private study

Assessment

The course has the following assessment components:

  • Unseen 2.5 hour written examination (85%)
  • Coursework (15%)

To pass this course, students must:

  • Obtain a mark of at least 50%

Resources

Lecture notes to be provided in class

Recommended texts: Anderson, R. 'Security Engineering' Wiley 2006. W. Rankl and W. Effing, 'Smart Card Handbook' Wiley 2003.

Mayes, K. and Markantonakis K (Editors) 'Smart Cards, Tokens, Security and Applications' Springer 2006.