Module Descriptors
CRYPTOGRAPHY AND AI
COMP60062
Key Facts
Digital, Technology, Innovation and Business
Level 6
20 credits
Contact
Leader: Mohammad Heydari Fami Tafreshi
Hours of Study
Scheduled Learning and Teaching Activities: 39
Independent Study Hours: 161
Total Learning Hours: 200
Pattern of Delivery
  • Occurrence A, Stoke Campus, UG Semester 1
  • Occurrence B, Digital Institute London, UG Semester 1
  • Occurrence C, British University Vietnam, UG Semester 1
Sites
  • British University Vietnam
  • Digital Institute London
  • Stoke Campus
Assessment
  • IN CLASS TEST - 1 hour weighted at 50%
  • WRITTEN REPORT - 3000 words weighted at 50%
Module Details
INDICATIVE CONTENT
This module will cover topics of:



Introduction to cryptographic concepts

Symmetric Encryption

Asymmetric Encryption

Encryption standards

Security protocols

Cryptographic mechanisms

Quantum Computing and Quantum resistant cryptography

Legal and Ethical Issues

Fundamentals of AI and how AI can solve problems in cryptography.

AI Technologies: statistical patterns, Bayesian statistics, statistical distributions and natural language processing

Impact of AI on cryptography
ADDITIONAL ASSESSMENT DETAILS
In-Class test - A test to assess fundamental cryptography and AI knowledge learnt through both the lectures and practical sessions of the module (Learning Outcomes 1, 2, and 4).

Written Report – A coursework to discuss various cryptography and AI techniques and their working relationship . Part of the report will involve the documenting of practical approaches the student has undertaken in formulating the report through the development of small artefacts (Learning Outcomes 3 and 4).
LEARNING OUTCOMES

1. Critically discuss the principles and concepts of cryptography for computer systems.

Communication,

Knowledge & Understanding

2. Discuss, design and justify the decisions of an exemplar cryptography approach for computer security.

Application,

Problem Solving

3. Analyse, apply and evaluate the application of artificial intelligence technologies to cryptography.

Analysis,

Application,

problem Solving

4. Critically discuss the ethical and legal issues involved in security of computer and AI systems.

Analysis,

Communication

LEARNING STRATEGIES
All teaching sessions will blend theory and practical learning. Students will be introduced to curriculum concepts and ideas and will then be able to apply theory to practical examples within the same sessions. In addition, students will be provided with a range of resources for independent study such as case studies, academic papers and industry stories. There will be a mixture of practical and theoretical formative (mock or practice) exercises which will help students build knowledge and confidence in preparation for summative (formal) assessment.
RESOURCES
VMWare Workstation
REFERENCE TEXTS
All texts and electronic resources will be updated and refreshed on an annual basis and available for students via the online Study Links resource platform. All reference materials will be collated and curated and aligned to Equality, Diversity & Inclusion indicators.


Core Text/Resource:

Holden, J. (2018), The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption, Princeton University Press

Aumasson, J. P. (2017), Serious Cryptography: A Practical Introduction to Modern Encryption, No Starch Press

Martin, K. (2020). Cryptography: The Key to Digital Security, How It Works and Why It Matters, CRC Press

Madsen, T. (2022), Security Architecture – How & Why (River Publishers Series in Security and Digital Forensics), River Publishers; 1st edition

Holt, T, J et. al. (2022), Cybercrime and Digital Forensics: An Introduction, Routledge; 3rd edition

Johansen, G, (2022), Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat response, 3rd Edition, Packt Publishing; 3rd edition

Oettinger, G. (2022), Learn Computer Forensics: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence, 2nd Edition, Packt Publishing; 2nd edition

Mullins, M. (2022), Cyber Security Awareness: Employee Handbook, Kindle Edition

Anderson, R. (2021), Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition, Wiley, 3rd Edition
WEB DESCRIPTOR
You will learn about the cryptographic technologies that secure all modern digital communications and systems – how they work, what can go wrong and how they are implemented in the world around us. You will also learn about the wider context of these issues and how they carry ethical and legal weight. You will also learn about AI technologies and how they interact with cryptography, as well as how they are changing the cyber security landscape.