Important! Please note that this is a BYOD (Bring Your Own Device) unit. You will be expected to bring your own laptop computer (Windows, Mac or Linux) to the workshop, install and configure the required software, and incorporate secure practices into your daily work (and play!) routines.
Each week you should complete any assigned readings and review the lecture slides in order to prepare for the lecture. There are three hours of lectures and a one-hour workshop every week. There uses hands-on exercises to reinforce concepts introduced during the lectures; you should have chosen a practical on enrollment. You will find it helpful to read the workshop instructions before attending - that way, you can get to work quickly!
For details of days, times and rooms consult the timetables webpage.
Note that Workshops commence in week 1.
You should have selected a practical at enrollment.
Please note that you will be required to submit work every week. Failure to do so may result in you failing the unit or being excluded from the exam.
This unit makes use of discussion boards hosted within iLearn . Please post questions there; they are monitored by the staff on the unit.
REQUIRED AND RECOMMENDED TEXTS AND/OR MATERIALS
Required readings for this unit:
- N. Smart, Cryptography Made Simple, Springer. The book is available online at https://www.springer.com/us/book/9783319219356
- Easttom, Chuck. Modern Cryptography: Applied Mathematics for Encryption and Information Security. 1 edition. New York: McGraw-Hill Education, 2015. The book is available in online format through the Library; there will be allocated readings each week.
Recommended readings for this unit:
- R. Anderson, Security Engineering (SE) Wiley Publishing, Inc. 2008. The complete second edition is now available online at http://www.cl.cam.ac.uk/~rja14/book.html
- A. J. Menezes, P. C. van Oorrschot and S. A. Vanstone, Handbook of applied cryptography (HAC), CRC Press, Boca Raton, FL, 1996. All required chapters are available online at http://cacr.uwaterloo.ca/hac/
- NIST SP 800 documents available from http://csrc.nist.gov/publications/PubsSPs.html
- IETF RFC's available from http://www.rfc-editor.org
- Bauer, Craig P., Secret History: The Story of Cryptology, CRC Press (2013)
- Cryptography Engineering: Design Principles and Practical Applications, Ferguson, Neils, Tadayoshi Kohno and Bruce Schneier, 1st ed., Wiley
TECHNOLOGY USED AND REQUIRED
iLearn is a Learning Management System that gives you access to lecture slides, lecture recordings, forums, assessment tasks, instructions for practicals, discussion forums and other resources.
Echo 360 (formerly known as iLecture)
Digital recordings of lectures are available. Read these instructions for details.
Java or C++ programming language and GP/PARI, GnuPG, VeraCrypt, Thunderbird, Gnu Privacy Guard, Enigmail, OpenSSH, PuTTY, Ophcrack.