Module Specifications.
Current Academic Year 2024 - 2025
All Module information is indicative, and this portal is an interim interface pending the full upgrade of Coursebuilder and subsequent integration to the new DCU Student Information System (DCU Key).
As such, this is a point in time view of data which will be refreshed periodically. Some fields/data may not yet be available pending the completion of the full Coursebuilder upgrade and integration project. We will post status updates as they become available. Thank you for your patience and understanding.
Date posted: September 2024
| |||||||||||||||||||||||||||||||||||||||||||
Repeat examination Repeat exam in the Autumn |
|||||||||||||||||||||||||||||||||||||||||||
Description This module introduces the student to the areas of cryptography and cryptanalysis. It provides a basic understanding of the algorithms used to protect users online and to understand some of the design choices behind these algorithms. The student will develop a workable knowledge of the mathematics used in cryptology and this will allow them to understand attacks on cryptosystems with the aim of preventing future attacks. This module will also provide a sufficient familiarity with managing multi-user computer systems and an adequate knowledge of how to protect systems from network based attacks in order to guarantee the authenticity and non-disclosure of data. This module is not accessible to off-campus students because the associated labs involve interaction with fellow students and demonstrators. | |||||||||||||||||||||||||||||||||||||||||||
Learning Outcomes 1. describe the fundamental principles and technology which underlie secure data communications over networks and how they apply in particular cases. 2. demonstrate the use of the mathematics behind cryptographic algorithms and be able to describe the hardware architectures required to implement these systems. 3. describe recently developed attacks on cryptographic systems and how these can be thwarted. 4. perform, at an advance level, system administrator duties on a multi-user based computer system, e.g. Linux-type operating system. 5. exploit core self-learning skills to acquire knowledge on system administration and security, thus ensuring secure and reliable systems. 6. demonstrate technical writing skills. | |||||||||||||||||||||||||||||||||||||||||||
All module information is indicative and subject to change. For further information,students are advised to refer to the University's Marks and Standards and Programme Specific Regulations at: http://www.dcu.ie/registry/examinations/index.shtml |
|||||||||||||||||||||||||||||||||||||||||||
Indicative Content and Learning Activities
Overview of security, threats and mechanismsConventional encryption algorithms - DES, AESMathematics used in cryptology - Number Theory, Abstract AlgebraPublic key cryptography, RSA, key management, confidentiality, authentication and digital signaturesSide Channel attacksThe Linux operating system in the context of security and system administrationWireless (802.xx) security threats, hacking mechanisms, and improvementsFirewalls and other network structures to ensure data integrity and network security | |||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||
Indicative Reading List
| |||||||||||||||||||||||||||||||||||||||||||
Other Resources 804, Website, Novell Inc., 0, OpenSUSE Reference, the edition is linked to the release version of Ed., | |||||||||||||||||||||||||||||||||||||||||||