Course overview
The course aims to introduce senior undergraduates and early postgraduates in telecommunications engineering to methods of system security and data security. For system security, students will be acquainted with the principles of information assurance as well as frameworks of threat analysis and threat mitigation (e.g., MITRE ATT&CK, NIST Cybersecurity Framework). For data security, students will be trained in the applications of cryptography to data confidentiality, data integrity, source authentication and nonrepudiation. Students will also analyse how Shors algorithm hastens the development of post-quantum cryptography.
- Overview And Frameworks
- Theoretical Foundation
- Cryptography
Course learning outcomes
- Using standard frameworks, analyse threats to a telecommunication system and formulate a plan to mitigate the threats
- Explain the assumptions, threat model, security definitions and design rationales on which a cryptographic primitive is based, and therefore the strengths and weaknesses of the primitive
- Given application requirements and security objectives, determine the appropriate cryptographic schemes and associated parameters to use
- Implement cryptographic algorithms and protocols for a given problem or application using established cryptographic libraries
- Discuss the impact of quantum computing on traditional public-key cryptosystems, and the salient characteristics of post-quantum cryptosystems
Degree list
The following degrees include this course