Module Descriptors
QUANTUM COMPUTING AND CRYPTOGRAPHY
COMP70060
Key Facts
Digital, Technology, Innovation and Business
Level 7
20 credits
Contact
Leader: Ange Aly
Hours of Study
Scheduled Learning and Teaching Activities: 52
Independent Study Hours: 148
Total Learning Hours: 200
Pattern of Delivery
  • Occurrence A, Stoke Campus, PG Semester 2
  • Occurrence B, Digital Institute London, PG Semester 1
  • Occurrence C, Digital Institute London, PG Semester 2
Sites
  • Digital Institute London
  • Stoke Campus
Assessment
  • WRITTEN REPORT - 3000 WORDS weighted at 100%
Module Details
Indicative Content
In the module, the following topics are covered:



Traditional Computing Concepts

Quantum Principles and Concepts

Quantum Computing Technology I – Quantum vs. Traditional Computing

Quantum Computing Technology II – Qubits

Quantum Programming & Algorithms

Quantum Entanglement & Quantum Protocols

Cryptographic Concepts

Cryptographic Technologies & Tools I – Symmetric Key Encryption

Cryptographic Technologies & Tools II – Asymmetric Key Encryption

Cryptographic Technologies & Tools III – Advanced Technologies, Hybrid Systems, PKI and Digital Signatures

Identification and use of appropriate mathematics

Traditional Cryptography vs. Quantum Computers

Quantum Cryptography & Quantum Resistant Cryptography
Additional Assessment Details
Written Report – The written report will be based on research around Quantum Cryptography and how it differs from traditional cryptography. The report will also focus on future challenges. The report will enable students the opportunity to demonstrate learning, understanding and application of the principles and concepts of quantum computing, and how these are being applied to the cryptography landscape (Learning Outcomes 1 to 4).
Learning Strategies
The module will be delivered using a combination of independent research, lectures and tutorials. The lectures are intended to give the theory work and the tutorials are an opportunity to test out the theories. The lectures are based on official standards Quantum Computing / Cryptography material but have been adapted for student needs. Students will also be provided with a lab manual which they can work through in the tutorials.
Learning Outcomes

1. Demonstrate an understanding of quantum principles and how these are applied to computing paradigms

Knowledge and Understanding, Learning

2. Demonstrate an understanding of how quantum computing differs from traditional computing through a thorough knowledge of cryptographic tools, technologies and principles

Knowledge and Understanding, Enquiry

3. Explain how quantum computing is challenging traditional cryptographic methods and technologies

Problem Solving

4. Critically evaluate how quantum computing is being integrated into cryptographic methods and techniques

Analysis, Application

Texts
Wong, T. (2022) Introduction to Classical and Quantum Computing

Katwala, A. (2021) Quantum Computing (WIRED Guides): How It Works and How It Could Change The World

Martin, K. (2021) Cryptography: The Key to Digital Security, How It Works and Why It Matters

Aumasson, J. (2017) Serious Cryptography: A Practical Introduction to Modern Encryption

Madsen, T. (2022), Security Architecture – How & Why (River Publishers Series in Security and Digital Forensics), River Publishers; 1st edition

Holt, T, J et. al. (2022), Cybercrime and Digital Forensics: An Introduction, Routledge; 3rd edition

Johansen, G, (2022), Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat response, 3rd Edition, Packt Publishing; 3rd edition

Oettinger, G. (2022), Learn Computer Forensics: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence, 2nd Edition, Packt Publishing; 2nd edition

Mullins, M. (2022), Cyber Security Awareness: Employee Handbook, Kindle Edition

Anderson, R. (2021), Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition, Wiley, 3rd Edition
Resources
VMWare Workstation

2x Virtual Machines running Linux (will be provided)
Web Descriptor
Cryptography secures the world’s communications, we use it every single day in the mobile devices, applications, computers and devices that we use to talk to each other and interact with the world around us. Those devices, and the technology behind them are changing, and along with it the cryptographic methods that we use to secure them.

Quantum computing is the bleeding edge of computational technology, and is on the advent of changing the way that we see everything – it is also going to have a big impact on how we communicate, and secure these communications.

This module will give you the opportunity to explore these technologies, and how the forefront of computational technology is changing the way that we encrypt our most sensitive data.