1.
| [Basic working knowledge]
Understand the basic elementary knowledge of one-way function, such as discrete logarithm and RSA. Learn the elementary tools of pseudorandom number generator.
Be familiar with tools of quantum information theory.
Understand the basics of modern quantum cryptography including quantum key distribution and quantum random number generation.
|
2.
| [Problem modeling]
Model the security requirements of confidentiality, integrity and authentication, such as the Chosen Ciphertext Attack (CCA) model. Model cryptographic tasks in quantum theory.
|
3.
| [Problem solving]
Understand the difference between cryptographic primitives like hash function, symmetric key encryption, public key encryption and digital signatures.
Apply different cryptographic primitives in practical applications.
Establish the security of simple protocols for quantum key distribution and random bit generation. |
4.
| [Self-learning]
Able to self-learn basic topics in cryptography come up with creative solutions to simple problems
|
Mapping from Course Learning Outcomes to Programme Learning Outcomes
| PLO a | PLO b | PLO c | PLO d | PLO e | PLO f | PLO g | PLO h | PLO i | PLO j |
CLO 1 | T | | | | | | | | | |
CLO 2 | T | T | T | | | | | | | T |
CLO 3 | T | T | T | | T | T | | | | |
CLO 4 | | | | | | | | | T | |
T - Teach, P - Practice
For BEng(CompSc) Programme Learning Outcomes, please refer to
here.
|
Syllabus |
Calendar Entry:
This course offers a gentle introduction to the field of cryptography. We will start from the basic principles of confidentiality, integrity and authentication. After that, we will go through some fundamental cryptographic primitives like hash function, symmetric key encryption, public key encryption and digital signatures. Finally, we will introduce the basics of quantum cryptography including quantum key distribution and random number generation.
|
Detailed Description:
Introduction to Modern Cryptography |
Mapped to CLOs
|
Modern Cryptography: A Computational Complexity Based Theory | 1 |
One-way and trapdoor functions | 1 |
Pseudo-random bit generators | 1 |
Fundamental ideas of Quantum Information | 1 |
Basics of Quantum Cryptography | 1 |
Hash Function & Symmetric Cryptography |
Mapped to CLOs
|
Block ciphers | 2, 3 |
Stream ciphers | 2, 3 |
MAC and Hash Functions | 2, 3 |
Public Key Cryptography |
Mapped to CLOs
|
Public-key encryption | 2, 3 |
Digital signatures | 2, 3 |
Protocols: Identification and authenticated key exchange | 2, 3 |
Cryptographic applications in E-commerce | 3, 4 |
Quantum Cryptography |
Mapped to CLOs
|
Quantum key distribution. BB84 and practical quantum cryptography | 2, 3 |
Device-independent random bit generation. | 2, 3 |
|
Assessment:
Continuous Assessment:
50% Written Examination:
50%
|
Teaching Plan |
Please refer to the corresponding Moodle course.
|
Moodle Course(s) |
|