DCU Home | Our Courses | Loop | Registry | Library | Search DCU
<< Back to Module List

Module Specifications.

Current Academic Year 2024 - 2025

All Module information is indicative, and this portal is an interim interface pending the full upgrade of Coursebuilder and subsequent integration to the new DCU Student Information System (DCU Key).

As such, this is a point in time view of data which will be refreshed periodically. Some fields/data may not yet be available pending the completion of the full Coursebuilder upgrade and integration project. We will post status updates as they become available. Thank you for your patience and understanding.

Date posted: September 2024

Module Title P-Key Cryptography & Sec Protocols
Module Code CA646I (ITS) / CSC1161 (Banner)
Faculty Engineering & Computing School Computing
Module Co-ordinatorIrina Tal
Module Teachers-
NFQ level 9 Credit Rating 7.5
Pre-requisite Not Available
Co-requisite Not Available
Compatibles Not Available
Incompatibles Not Available
Repeat examination
Description

This module introduces students to modern public-key cryptography and security protocols.

Learning Outcomes

1. Describe the fundamental concepts underpinning public-key cryptography, digital signature schemes and provable security.
2. Explain the mathematical concepts underlying RSA and ElGamal, and perform appropriate calculations and proofs using these concepts.
3. Describe and analyse public-key encryption schemes and digital signature schemes based on RSA and ElGamal.
4. Interpret and synthesize reductionist security arguments for differing security goals.
5. Design & write software to implement public-key encryption schemes and digital signature schemes based on RSA and ElGamal.
6. Describe the fundamental concepts underpinning security protocols, key management and public key infrastructures.
7. Describe and analyse security protocols for applications such as authentication, key-exchange, e-mail,e-cash, zero-knowledge protocols, bit-commitment protocols and fair-exchange protocols.
8. Design & write software to implement security protocols.



Workload Full-time hours per semester
Type Hours Description
Lecture36Lecture
Independent Study64Private study/research
Assignment Completion80Math/Programming Exercises
Total Workload: 180

All module information is indicative and subject to change. For further information,students are advised to refer to the University's Marks and Standards and Programme Specific Regulations at: http://www.dcu.ie/registry/examinations/index.shtml

Indicative Content and Learning Activities

Assessment Breakdown
Continuous Assessment25% Examination Weight75%
Course Work Breakdown
TypeDescription% of totalAssessment Date
AssignmentA collection of mathematical and coding tasks.30%n/a
Reassessment Requirement Type
Resit arrangements are explained by the following categories:
Resit category 1: A resit is available for both* components of the module.
Resit category 2: No resit is available for a 100% continuous assessment module.
Resit category 3: No resit is available for the continuous assessment component where there is a continuous assessment and examination element.
* ‘Both’ is used in the context of the module having a Continuous Assessment/Examination split; where the module is 100% continuous assessment, there will also be a resit of the assessment
Resit category for this module is temporarily unavailable
Indicative Reading List

  • Wenbo Mao: 2004, Modern Cryptography: Theory & Practice, Prentice Hall,
  • Katz & Lindell: 2008, Introduction to Modern Cryptography, Chapman & Hall,
  • Menezes, van Oorschot & Vanstone: 1997, Handbook of Applied Cryptography, CRC Press, http://www.cacr.math.uwaterloo.ca/hac/,
Other Resources

None

<< Back to Module List