This course introduces students to the applied principles of cryptography and looks at its practical applications and methods, many of which are fundamental to secure data in the cloud. Students are expected to analyse fundamental symmetric, asymmetric and hashing encryption methods, and investigate examples of these in practice. Students are expected to demonstrate the use of cryptography and cryptanalysis tools, methods and their applications. Students are also expected to appraise the inner workings of cryptographic protocols and principles, including transport layer security (TLS) and blockchain, and evaluate how they can be used by organisations to enhance security when considering a move to a cloud environment.
On successful completion of this course students will be able to analyse functions of stream ciphers and block ciphers, produce code implementing ciphers, analyse methods such as KEM, DEM and PKE’s to secure data in a cloud environment. Students will design a security case and implement it demonstrating the use of cryptographic and cryptoanalysis tools for improving security in a virtual private network, for an organisation considering a move to the cloud. As a result, they will develop skills such as critical thinking, analysis, and interpretation, which are crucial
for gaining employment and developing academic competence.