Registry
Module Specifications
Current Academic Year 2012 - 2013
Please note that this information is subject to change.
| |||||||||||||||||||||||||||||||||||||||||
| Description | |||||||||||||||||||||||||||||||||||||||||
|
This module introduces the student to the areas of cryptography and cryptanalysis. It provides a basic understanding of the algorithms used to protect users online and to understand some of the design choices behind these algorithms. The student will develop a workable knowledge of the mathematics used in cryptology and this will allow them to understand attacks on cryptosystems with the aim of preventing future attacks. This modulewill also provide an adequate knowledge of how to protect systems from network based attacks in order toguarantee the authenticity and non-disclosure of data. | |||||||||||||||||||||||||||||||||||||||||
| Learning Outcomes | |||||||||||||||||||||||||||||||||||||||||
|
1. Describe the fundamental principles and technology which underlie secure data communications over networks and how they apply in particular cases. 2. Demonstrate the use of the mathematics behind cryptographic algorithms and be able to describe the hardware architectures required to implement these systems. 3. Describe recently developed attacks on cryptographic systems and how these can be thwarted. 4. Exploit core self-learning skills to acquire knowledge on system administration and security, thus ensuring secure and reliable systems. 5. Demonstrate technical writing skills. | |||||||||||||||||||||||||||||||||||||||||
All module information is indicative and subject to change. For further information,students are advised to refer to the University's Marks and Standards and Programme Specific Regulations at: http://www.dcu.ie/registry/examinations/index.shtml |
|||||||||||||||||||||||||||||||||||||||||
| Indicative Content and Learning Activities | |||||||||||||||||||||||||||||||||||||||||
|
Overview of security, threats and mechanisms. Conventional encryption algorithms - DES, AES. Mathematics used in cryptology - Number Theory, Abstract Algebra. Public key cryptography, RSA, key management, confidentiality, authentication and digital signatures. Side Channel attacks. | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
| Indicative Reading List | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
| Other Resources | |||||||||||||||||||||||||||||||||||||||||
| None | |||||||||||||||||||||||||||||||||||||||||
| This module is only available to students in Wuhan University taking the the WHU-DCU collaborative masters program. | |||||||||||||||||||||||||||||||||||||||||
| Programme or List of Programmes | |||||||||||||||||||||||||||||||||||||||||
| MTC | MEng in Telecommunications Engineering | ||||||||||||||||||||||||||||||||||||||||
| Timetable this semester: Timetable for EE548 | |||||||||||||||||||||||||||||||||||||||||
| Date of Last Revision | 27-AUG-10 | ||||||||||||||||||||||||||||||||||||||||
| Archives: |
| ||||||||||||||||||||||||||||||||||||||||









