Module Descriptors
CRYPTOGRAPHY AND AI
COMP63048
Key Facts
Digital, Technology, Innovation and Business
Level 6
20 credits
Contact
Leader: Ange Aly
Hours of Study
Scheduled Learning and Teaching Activities:
Independent Study Hours:
Total Learning Hours:
Pattern of Delivery
  • Occurrence A, Stoke Campus, UG Semester 1
  • Occurrence B, Stoke Campus, UG Semester 2
Sites
  • Stoke Campus
Assessment
  • REPORT - 4000 WORDS weighted at 100%
Module Details
LEARNING OUTCOMES
1. Demonstrate a systematic understanding of the key aspects and concepts of cryptography for application in secure computer systems.

Enquiry

Knowledge & Understanding

2. Design and justify solutions to technical specialists and non-specialists, for applying cryptography in complex and unpredictable cyber security scenarios.

Application

Problem Solving

Communication

3. Apply and critically evaluate the impact of AI technologies to cryptography in cyber security scenarios.

Analysis

Application

Problem Solving

4. Critically evaluate the ethical and legal issues involved in security of IT and AI systems.

Learning

Analysis

ADDITIONAL ASSESSMENT DETAILS
Report 100%

An assignment to discuss various cryptography and AI techniques and their working relationship. Part of the report will involve the documenting of practical approaches has undertaken in the development of small artefacts to illustrate the application of cryptography and AI as well as an overview for a non-technical audience (Learning Outcomes 1, 2, 3 and 4).



Assessing aspects of the following KSBs from the CSTP Apprenticeship Standard:

K3: Information management, big data concepts, statistical techniques, database concepts and data quality

S3: Apply statistical techniques to large data sets. Identify vulnerabilities in big data architectures and deployment

K15 Management of cyber security risk, tools and techniques

S15: Undertake risk modelling, analysis and trades

K18: Security components: how they are used for security / business benefit. Crypto & key management

S18: Configure and use security technology components and key management

K19: How to compose a justified security case

S19: Design & evaluate a system to a security case

K21: Assurance concepts & approaches

S21: Develop an assurance strategy

B1: Fluent in written communications and able to articulate complex issues

B8: Analytical and critical thinking skills for Technology Solutions development and can systematically analyse and apply structured problem-solving techniques to complex systems and situations

B10: Can conduct effective research, using literature and other media

B11: Logical thinking and creative approach to problem solving

B12: Able to demonstrate a ‘security mind-set’ (how to break as well as make)
INDICATIVE CONTENT
Introduction to cryptographic concepts
Symmetric Encryption
Asymmetric Encryption
Encryption standards
Security protocols
Cryptographic mechanisms
Quantum Computing and Quantum resistant cryptography
Legal and Ethical Issues
Fundamentals of AI and how AI can solve problems in cryptography.
AI Technologies: statistical patterns, Bayesian statistics, statistical distributions and natural language processing
Impact of AI on cryptography



This module will support the development and assessment of the following KSBs from the CSTP Apprenticeship Standard:

K3: Information management, big data concepts, statistical techniques, database concepts and data quality

S3: Apply statistical techniques to large data sets. Identify vulnerabilities in big data architectures and deployment

K7: Algorithms, complexity and discrete maths

S7: Design, implement and analyse algorithms

K12: Threats, vulnerabilities, impacts and mitigations in ICT systems and the enterprise environment

S12: Discover, identify and analyse threats, attack techniques, vulnerabilities and mitigations

K15 Management of cyber security risk, tools and techniques

S15: Undertake risk modelling, analysis and trades

K18: Security components: how they are used for security / business benefit. Crypto & key management

S18: Configure and use security technology components and key management

K19: How to compose a justified security case

S19: Design & evaluate a system to a security case

K21: Assurance concepts & approaches

S21: Develop an assurance strategy

B1: Fluent in written communications and able to articulate complex issues.

B8: Analytical and critical thinking skills for Technology Solutions development and can systematically analyse and apply structured problem-solving techniques to complex systems and situations

B10: Can conduct effective research, using literature and other media

B11: Logical thinking and creative approach to problem solving

B12: Able to demonstrate a ‘security mind-set’ (how to break as well as make)



Learning within this module maps to the following Fundamental British Values:¿¿

Democracy



Learning within this module maps to the following principles of Safeguarding & Prevent:¿

Protecting from harm

Duty of care

Promoting safe environments
WEB DESCRIPTOR
You will study core cryptographic concepts, including symmetric and asymmetric encryption, encryption standards, security protocols, and quantum-resistant cryptography. Alongside this, you'll examine AI fundamentals and technologies such as statistical patterns, Bayesian methods, and natural language processing to understand how AI can enhance threat detection and automate security processes. The module also addresses how AI can compromise cryptographic systems and explores legal, ethical, and privacy considerations. Practical work includes applying AI tools to cryptographic challenges, offering insight into AI’s dual role in securing and attacking encrypted systems.
LEARNING STRATEGIES
This module will be delivered in a Blended Learning Mode consisting of face-to-face, online and guided learning sessions.



Teaching sessions will blend theory and practical learning, and most importantly where possible will seek to be contextualised in your workplace as part of your apprenticeship. You will be introduced to curriculum concepts and ideas and will then be able to apply theory to practical examples. In addition, you will be provided with a range of resources for independent study such as case studies, academic papers and industry case studies. There will be a mixture of practical and theoretical formative (mock or practice) exercises which will help you build knowledge and confidence in preparation for summative (formal) assessment.



The delivery will be delivered as follows:



Module Launch week: 12 hours.
There will be a module launch week with up to 12 hours of face-to-face contact time devoted to developing your understanding of the core purpose and assessment of the module. You will be presented with details of how the learning will be structured and how to access to the learning materials for the remainder of the module.



Structured Learning Sessions: 15 hours
Following the module launch week you will have a further 15 hours of attendance-based contact time as a class with the module team. This will typically be as 10 x 1.5-hour online classes. Classes which will be a combination of activities including lectures, demonstrations, discussions, tutorials and seminars. Some sessions maybe in flipped classroom style, where you will be expected to watch online recordings, read materials or respond to practical activities in preparation for active engagement with problem solving in the online session.



1:1 Progress Checks: 1 hour
As a Blended Learner understanding your progress can be a challenge so you are allocated an hour of 1:1 time with your tutor (typically 3 x 20-minute meetings). Some of these may be in small groups if appropriate. These sessions may be used to discuss key topics, troubleshoot solutions, review working drafts etc.



Assignment Development: Time 30 hours

A typical assignment will take you a minimum 30 hours to complete.



This module includes 58 off-the-job (OTJ) training hours as standard, covering new learning funded by the apprenticeship levy. A total 200 nominal learning hours has been attributed to this module, incorporating OTJ training alongside broader academic development beyond levy-funded new learning.
TEXTS
Ferguson, N., Schneier, B. & Kohno, T. (2024) Cryptography Engineering: Design Principles and Practical Applications. 3rd edn. Indianapolis, IN: Wiley.

Katz, J. & Lindell, Y. (2024) Introduction to Modern Cryptography. 4th edn. Boca Raton, FL: Chapman and Hall/CRC.

Smart, N. P. (2023) Cryptography Made Simple. Cham: Springer.

Stallings, W. (2023) Cryptography and Network Security: Principles and Practice. 9th edn. Boston: Pearson.

Boneh, D. & Shoup, V. (2023) A Graduate Course in Applied Cryptography. [Online]: Stanford University.

Holden, J. (2018), The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption, Princeton University Press

Aumasson, J. P. (2017), Serious Cryptography: A Practical Introduction to Modern Encryption, No Starch Press

Martin, K. (2020). Cryptography: The Key to Digital Security, How It Works and Why It Matters, CRC Press

Madsen, T. (2022), Security Architecture – How & Why (River Publishers Series in Security and Digital Forensics), River Publishers; 1st edition

Mullins, M. (2022), Cyber Security Awareness: Employee Handbook, Kindle Edition

Anderson, R. (2021), Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition, Wiley, 3rd Edition
RESOURCES
Software & Tools: OpenSSL, Python (PyCrypto, scikit-learn), TensorFlow/Keras

Hardware: Hardware security module emulators, GPUs for ML training

VLE: Blackboard site with code labs, datasets, reading lists