Registry

Module Specifications

Current Academic Year 2012 - 2013
Please note that this information is subject to change.

Module Title
Module Code
School
Online Module Resources

Module Co-ordinatorSemester 1: David Gray
Semester 2: David Gray
Autumn: David Gray
Module TeacherDavid Gray
NFQ level 8 Credit Rating
Pre-requisite None
Co-requisite None
Compatibles None
Incompatibles None
Description
This module introduces students to the theory and practice of security protocols

Learning Outcomes
1. Describe the properties of the principle algorithms (hash functions, symmetric ciphers & asymmetric ciphers) used in cryptography.
2. Describe the functionality and operation of cryptographic APIs.
3. Use cryptographic APIs to write secure software.
4. Describe the fundamental concepts underpinning security protocols, key management and public key infrastructures.
5. Describe and analyse security protocols for applications such as authentication, key-exchange and e-mail.
6. Use real-world protocols such as SSL/TLS, S/MIME, IPSec and Kerberos.
7. Design & write software to implement security protocols.
8. Contribute to class discussions on cryptography and security protocols.



Workload Full-time hours per semester
Type Hours Description
Lecture24Lectures
Independent learning time50Private study/research
Assignment51Programming exercises
Total Workload: 125

All module information is indicative and subject to change. For further information,students are advised to refer to the University's Marks and Standards and Programme Specific Regulations at: http://www.dcu.ie/registry/examinations/index.shtml

Indicative Content and Learning Activities
Cryptography & Cryptographic API.
Cryptographic algorithms (hash functions, symmetric ciphers & asymmetric ciphers) and their properties. The Java Cryptographic APIs..

Security Objectives.
Confidentiality, integrity, authentication and non-repudiation..

Public key Infrastructures.
Key management and PKIs..

Security Protocols.
Authentication, key-exchange and e-mail..

Real-world Security Protocols.
SSL/TLS, S/MIME, IPSec and Kerberos..

Assessment Breakdown
Continuous Assessment% Examination Weight%
Course Work Breakdown
TypeDescription% of totalAssessment Date
ProjectWriting software to implement applications requiring the use of security protocols.20%n/a
Reassessment Requirement
Resit arrangements are explained by the following categories;
1 = A resit is available for all components of the module
2 = No resit is available for 100% continuous assessment module
3 = No resit is available for the continuous assessment component
This module is category
Indicative Reading List
  • Bruce Schneier: 1996, Applied Cryptography, John Wiley & Son,
  • Menezes, van Oorschot & Vanstone: 1997, Handbook of Applied Cryptography, CRC Press, http://www.cacr.math.uwaterloo.ca/hac/,
Other Resources
None
Array
Programme or List of Programmes
Timetable this semester: Timetable for
Archives: