Postgraduate taught 

Data Science MSc

Cryptography and Secure Development (M) COMPSCI5079

  • Academic Session: 2019-20
  • School: School of Computing Science
  • Credits: 10
  • Level: Level 5 (SCQF level 11)
  • Typically Offered: Semester 2
  • Available to Visiting Students: No
  • Available to Erasmus Students: No

Short Description

A course on cryptographic algorithms and how to develop code for secure systems.

Timetable

3 hours per week (2 lectures, 1 tutorial)

Requirements of Entry

None

Excluded Courses

None

Co-requisites

Cyber Security Fundamentals (COMPSCI5063)

Assessment

The exam will assess ILOs 1, 2, 4

One piece of assessed coursework will assess ILOs 1, 3, 4

Main Assessment In: April/May

Are reassessment opportunities available for all summative assessments? No

Reassessments are normally available for all courses, except those which contribute to the Honours classification. For non-Honours courses, students are offered reassessment in all or any of the components of assessment if the satisfactory (threshold) grade for the overall course is not achieved at the first attempt. This is normally grade D3 for undergraduate students and grade C3 for postgraduate students. Exceptionally it may not be possible to offer reassessment of some coursework items, in which case the mark achieved at the first attempt will be counted towards the final course grade. Any such exceptions for this course are described below.

 

Reassessment is provided for the exam.

 

The coursework cannot be redone because the nature of the coursework is such that it takes a significant number of days to produce it and this effort is infeasible for supporting the re-doing of such coursework over the summer.

Course Aims

To develop student's knowledge of cryptographic algorithms, how they can be attacked and how to evaluate how secure they are.

To develop student's practical skills in developing secure systems.

Intended Learning Outcomes of Course

By the end of this course students will be able to:

1. Explain basic cryptographic algorithms, how they can be attacked and evaluate how secure they are.

2. Demonstrate an advanced understanding of a range of specialist algorithms, explaining when they are useful.

3. Produce a program that uses a standard cryptographic library to solve a security problem.

4. Critically compare and contrast a number of ways of developing secure systems.

Minimum Requirement for Award of Credits

Students must submit at least 75% by weight of the components (including examinations) of the course's summative assessment.