Registry
Module Specifications
Current Academic Year 2012 - 2013
Please note that this information is subject to change.
| |||||||||||||||||||||||||||||||||||||||||
| Description | |||||||||||||||||||||||||||||||||||||||||
|
In this module students are introduced to coding and cryptography. This module builds on the students knowledge of linear algebra, rings and fields. The approach taken will encourage students to develop critical thinking and apply logical reasoning to mathemtical problems. Students will participate in the following learning activities: Lectures: Students will attend three one-hour lectures per week. These lectures are designed to introduce learners to the mathematical principles and problem solving techniques that underpin this module. Tutorials: Each student will attend one one-hour tutorial per week. Problem sheets based on lecture content are distributed to the students and they are strongly advised to attempt all tutorial questions in advance of the tutorial.Reading: Students are expected to fully utilise the textbooks recommended. | |||||||||||||||||||||||||||||||||||||||||
| Learning Outcomes | |||||||||||||||||||||||||||||||||||||||||
|
1. Define error-detecting and error-correcting codes, explain their significance and construct simple examples. 2. Construct decoding processes and compute error probabilities. 3. Define and identify the advantages of linear codes. 4. Define, construct and manipulate generator matrices and parity-check matrices. 5. Define basic cryptographic concepts. 6. Compare and contrast some public key cryptosystems, the hard problems onwhich their security relies and certain attacks on them. | |||||||||||||||||||||||||||||||||||||||||
All module information is indicative and subject to change. For further information,students are advised to refer to the University's Marks and Standards and Programme Specific Regulations at: http://www.dcu.ie/registry/examinations/index.shtml |
|||||||||||||||||||||||||||||||||||||||||
| Indicative Content and Learning Activities | |||||||||||||||||||||||||||||||||||||||||
|
Error-correcting codes. Basic concepts: codes, minimum distance, equivalence of codes. Bounds on codes.Noisy channels and nearest-neighbour decoding. Shannon's Noisy Coding Theorem.Linear codes. Generator matrices and parity-check matrices. Syndrome decoding.Cyclic codes. Linear Shift-Register sequences, Reed-Muller, Hamming and Golay codes.. Cryptosystems. History and basic concepts: substitution and other traditional ciphers; plaintext, ciphertext, key; statistical attack on ciphers.. Public-key Cryptography. Trpadoor functions. RSA system. Primality testing. Knapsack based systems. Discrete Logarithms. Diffie-Hellman key exchange. El-Gamal system. McEliece cryptosystem.. | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
| Indicative Reading List | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
| Other Resources | |||||||||||||||||||||||||||||||||||||||||
| None | |||||||||||||||||||||||||||||||||||||||||
| Array | |||||||||||||||||||||||||||||||||||||||||
| Programme or List of Programmes | |||||||||||||||||||||||||||||||||||||||||
| APM | B.Sc. Applicable Mathematics | ||||||||||||||||||||||||||||||||||||||||
| Timetable this semester: Timetable for MS414 | |||||||||||||||||||||||||||||||||||||||||
| Date of Last Revision | 26-JAN-12 | ||||||||||||||||||||||||||||||||||||||||
| Archives: |
| ||||||||||||||||||||||||||||||||||||||||









