This module aims to provide you with an understanding of the need for computer security and the technologies that support it. It has both a theoretical component that will teach you mathematical underpinnings of security systems and a practical element that will help you discover the pitfalls of security design and to comprehend the mathematics underlying the protocols by programming small examples.
- Dr. Matthew Yee-King
- Dr. Robert Zimmer
- Security threats
- Social Issues in Computer Security
- Access Control and Authentication
- Security Models
- Operating System Security
- Network security
- Cryptography
- Cryptographic protocols and key management
- Public Key Cryptography
- Blockchain protocols
One two hour unseen written examination and coursework (Type I)
Public-Key Cryptography RSA Attacks against RSA - From www.lri.fr.
- RSA Encryption - Brilliant.org.
- How the RSA algorithm works, including how to select d, e, n, p, q, and φ (phi) - Anthony Vance.
- Public Key Cryptography: RSA Encryption Algorithm - Art of the Problem.
- RSA algorithm step by step example - shad sluiter.