Mathematics

Cryptography (L.6)

Module code: G1032
Level 6
15 credits in spring semester
Teaching method: Lecture
Assessment modes: Unseen examination, Coursework

You will be introduced to various algorithms used for data encryption and security, as well as mathematical techniques that make those algorithms possible. In terms of mathematics, the module borrows some concepts from algebra, such as fields and groups, modular operations on polynomials, and logical operations with Boolean variables.

We will discuss algorithms for symmetric-key and public-key encryption, many of which we use daily whenever we go online or use our mobile devices. For each of them, we will also discuss their advantages, as well as their limitations to develop awareness of the most relevant issues in terms of efficiency and data security.

The module also covers more advanced topics, such as (pseudo)random number generation and elliptic curve cryptography, which includes cryptographic techniques at the forefront of current technology.

Module learning outcomes

  • By the end of the module, a successful student should be able to understand the difference between symmetric-key and public-key cryptography.
  • Be familiar with a range of cryptosystems, including AES, RSA and DSA.
  • Have an awareness of some recent developments in cryptography.
  • Know the requirements of various cryptographic standards (FIPS, Common Criteria, etc).