Indicative Content
In the module, the following topics are covered:
Traditional Computing Concepts
Quantum Principles and Concepts
Quantum Computing Technology I Quantum vs. Traditional Computing
Quantum Computing Technology II Qubits
Quantum Programming & Algorithms
Quantum Entanglement & Quantum Protocols
Cryptographic Concepts
Cryptographic Technologies & Tools I Symmetric Key Encryption
Cryptographic Technologies & Tools II Asymmetric Key Encryption
Cryptographic Technologies & Tools III Advanced Technologies, Hybrid Systems, PKI and Digital Signatures
Identification and use of appropriate mathematics
Traditional Cryptography vs. Quantum Computers
Quantum Cryptography & Quantum Resistant Cryptography
Additional Assessment Details
Written Report The written report will be based on research around Quantum Cryptography and how it differs from traditional cryptography. The report will also focus on future challenges. The report will enable students the opportunity to demonstrate learning, understanding and application of the principles and concepts of quantum computing, and how these are being applied to the cryptography landscape (Learning Outcomes 1 to 4).
Learning Strategies
The module will be delivered using a combination of independent research, lectures and tutorials. The lectures are intended to give the theory work and the tutorials are an opportunity to test out the theories. The lectures are based on official standards Quantum Computing / Cryptography material but have been adapted for student needs. Students will also be provided with a lab manual which they can work through in the tutorials.
Learning Outcomes
1. Demonstrate an understanding of quantum principles and how these are applied to computing paradigms
Knowledge and Understanding, Learning
2. Demonstrate an understanding of how quantum computing differs from traditional computing through a thorough knowledge of cryptographic tools, technologies and principles
Knowledge and Understanding, Enquiry
3. Explain how quantum computing is challenging traditional cryptographic methods and technologies
Problem Solving
4. Critically evaluate how quantum computing is being integrated into cryptographic methods and techniques
Analysis, Application
Texts
Wong, T. (2022) Introduction to Classical and Quantum Computing
Katwala, A. (2021) Quantum Computing (WIRED Guides): How It Works and How It Could Change The World
Martin, K. (2021) Cryptography: The Key to Digital Security, How It Works and Why It Matters
Aumasson, J. (2017) Serious Cryptography: A Practical Introduction to Modern Encryption
Madsen, T. (2022), Security Architecture How & Why (River Publishers Series in Security and Digital Forensics), River Publishers; 1st edition
Holt, T, J et. al. (2022), Cybercrime and Digital Forensics: An Introduction, Routledge; 3rd edition
Johansen, G, (2022), Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat response, 3rd Edition, Packt Publishing; 3rd edition
Oettinger, G. (2022), Learn Computer Forensics: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence, 2nd Edition, Packt Publishing; 2nd edition
Mullins, M. (2022), Cyber Security Awareness: Employee Handbook, Kindle Edition
Anderson, R. (2021), Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition, Wiley, 3rd Edition
Resources
VMWare Workstation
2x Virtual Machines running Linux (will be provided)
Web Descriptor
Cryptography secures the worlds communications, we use it every single day in the mobile devices, applications, computers and devices that we use to talk to each other and interact with the world around us. Those devices, and the technology behind them are changing, and along with it the cryptographic methods that we use to secure them.
Quantum computing is the bleeding edge of computational technology, and is on the advent of changing the way that we see everything it is also going to have a big impact on how we communicate, and secure these communications.
This module will give you the opportunity to explore these technologies, and how the forefront of computational technology is changing the way that we encrypt our most sensitive data.