LEARNING OUTCOMES
1. Demonstrate a systematic understanding of the key aspects and concepts of cryptography for application in secure computer systems.
Enquiry
Knowledge & Understanding
2. Design and justify solutions to technical specialists and non-specialists, for applying cryptography in complex and unpredictable cyber security scenarios.
Application
Problem Solving
Communication
3. Apply and critically evaluate the impact of AI technologies to cryptography in cyber security scenarios.
Analysis
Application
Problem Solving
4. Critically evaluate the ethical and legal issues involved in security of IT and AI systems.
Learning
Analysis
ADDITIONAL ASSESSMENT DETAILS
Report 100%
An assignment to discuss various cryptography and AI techniques and their working relationship. Part of the report will involve the documenting of practical approaches has undertaken in the development of small artefacts to illustrate the application of cryptography and AI as well as an overview for a non-technical audience (Learning Outcomes 1, 2, 3 and 4).
Assessing aspects of the following KSBs from the CSTP Apprenticeship Standard:
K3: Information management, big data concepts, statistical techniques, database concepts and data quality
S3: Apply statistical techniques to large data sets. Identify vulnerabilities in big data architectures and deployment
K15 Management of cyber security risk, tools and techniques
S15: Undertake risk modelling, analysis and trades
K18: Security components: how they are used for security / business benefit. Crypto & key management
S18: Configure and use security technology components and key management
K19: How to compose a justified security case
S19: Design & evaluate a system to a security case
K21: Assurance concepts & approaches
S21: Develop an assurance strategy
B1: Fluent in written communications and able to articulate complex issues
B8: Analytical and critical thinking skills for Technology Solutions development and can systematically analyse and apply structured problem-solving techniques to complex systems and situations
B10: Can conduct effective research, using literature and other media
B11: Logical thinking and creative approach to problem solving
B12: Able to demonstrate a ‘security mind-set’ (how to break as well as make)
INDICATIVE CONTENT
Introduction to cryptographic concepts
Symmetric Encryption
Asymmetric Encryption
Encryption standards
Security protocols
Cryptographic mechanisms
Quantum Computing and Quantum resistant cryptography
Legal and Ethical Issues
Fundamentals of AI and how AI can solve problems in cryptography.
AI Technologies: statistical patterns, Bayesian statistics, statistical distributions and natural language processing
Impact of AI on cryptography
This module will support the development and assessment of the following KSBs from the CSTP Apprenticeship Standard:
K3: Information management, big data concepts, statistical techniques, database concepts and data quality
S3: Apply statistical techniques to large data sets. Identify vulnerabilities in big data architectures and deployment
K7: Algorithms, complexity and discrete maths
S7: Design, implement and analyse algorithms
K12: Threats, vulnerabilities, impacts and mitigations in ICT systems and the enterprise environment
S12: Discover, identify and analyse threats, attack techniques, vulnerabilities and mitigations
K15 Management of cyber security risk, tools and techniques
S15: Undertake risk modelling, analysis and trades
K18: Security components: how they are used for security / business benefit. Crypto & key management
S18: Configure and use security technology components and key management
K19: How to compose a justified security case
S19: Design & evaluate a system to a security case
K21: Assurance concepts & approaches
S21: Develop an assurance strategy
B1: Fluent in written communications and able to articulate complex issues.
B8: Analytical and critical thinking skills for Technology Solutions development and can systematically analyse and apply structured problem-solving techniques to complex systems and situations
B10: Can conduct effective research, using literature and other media
B11: Logical thinking and creative approach to problem solving
B12: Able to demonstrate a ‘security mind-set’ (how to break as well as make)
Learning within this module maps to the following Fundamental British Values:¿¿
Democracy
Learning within this module maps to the following principles of Safeguarding & Prevent:¿
Protecting from harm
Duty of care
Promoting safe environments
WEB DESCRIPTOR
You will study core cryptographic concepts, including symmetric and asymmetric encryption, encryption standards, security protocols, and quantum-resistant cryptography. Alongside this, you'll examine AI fundamentals and technologies such as statistical patterns, Bayesian methods, and natural language processing to understand how AI can enhance threat detection and automate security processes. The module also addresses how AI can compromise cryptographic systems and explores legal, ethical, and privacy considerations. Practical work includes applying AI tools to cryptographic challenges, offering insight into AI’s dual role in securing and attacking encrypted systems.
LEARNING STRATEGIES
This module will be delivered in a Blended Learning Mode consisting of face-to-face, online and guided learning sessions.
Teaching sessions will blend theory and practical learning, and most importantly where possible will seek to be contextualised in your workplace as part of your apprenticeship. You will be introduced to curriculum concepts and ideas and will then be able to apply theory to practical examples. In addition, you will be provided with a range of resources for independent study such as case studies, academic papers and industry case studies. There will be a mixture of practical and theoretical formative (mock or practice) exercises which will help you build knowledge and confidence in preparation for summative (formal) assessment.
The delivery will be delivered as follows:
Module Launch week: 12 hours.
There will be a module launch week with up to 12 hours of face-to-face contact time devoted to developing your understanding of the core purpose and assessment of the module. You will be presented with details of how the learning will be structured and how to access to the learning materials for the remainder of the module.
Structured Learning Sessions: 15 hours
Following the module launch week you will have a further 15 hours of attendance-based contact time as a class with the module team. This will typically be as 10 x 1.5-hour online classes. Classes which will be a combination of activities including lectures, demonstrations, discussions, tutorials and seminars. Some sessions maybe in flipped classroom style, where you will be expected to watch online recordings, read materials or respond to practical activities in preparation for active engagement with problem solving in the online session.
1:1 Progress Checks: 1 hour
As a Blended Learner understanding your progress can be a challenge so you are allocated an hour of 1:1 time with your tutor (typically 3 x 20-minute meetings). Some of these may be in small groups if appropriate. These sessions may be used to discuss key topics, troubleshoot solutions, review working drafts etc.
Assignment Development: Time 30 hours
A typical assignment will take you a minimum 30 hours to complete.
This module includes 58 off-the-job (OTJ) training hours as standard, covering new learning funded by the apprenticeship levy. A total 200 nominal learning hours has been attributed to this module, incorporating OTJ training alongside broader academic development beyond levy-funded new learning.
TEXTS
Ferguson, N., Schneier, B. & Kohno, T. (2024) Cryptography Engineering: Design Principles and Practical Applications. 3rd edn. Indianapolis, IN: Wiley.
Katz, J. & Lindell, Y. (2024) Introduction to Modern Cryptography. 4th edn. Boca Raton, FL: Chapman and Hall/CRC.
Smart, N. P. (2023) Cryptography Made Simple. Cham: Springer.
Stallings, W. (2023) Cryptography and Network Security: Principles and Practice. 9th edn. Boston: Pearson.
Boneh, D. & Shoup, V. (2023) A Graduate Course in Applied Cryptography. [Online]: Stanford University.
Holden, J. (2018), The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption, Princeton University Press
Aumasson, J. P. (2017), Serious Cryptography: A Practical Introduction to Modern Encryption, No Starch Press
Martin, K. (2020). Cryptography: The Key to Digital Security, How It Works and Why It Matters, CRC Press
Madsen, T. (2022), Security Architecture – How & Why (River Publishers Series in Security and Digital Forensics), River Publishers; 1st edition
Mullins, M. (2022), Cyber Security Awareness: Employee Handbook, Kindle Edition
Anderson, R. (2021), Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition, Wiley, 3rd Edition
RESOURCES
Software & Tools: OpenSSL, Python (PyCrypto, scikit-learn), TensorFlow/Keras
Hardware: Hardware security module emulators, GPUs for ML training
VLE: Blackboard site with code labs, datasets, reading lists