Cryptography Honours

Undergraduate | 2026

Course page banner
area/catalogue icon
Area/Catalogue
INFO 4007
Course ID icon
Course ID
203937
Level of study
Level of study
Undergraduate
Unit value icon
Unit value
6
Course level icon
Course level
4
Study abroad and student exchange icon
Inbound study abroad and exchange
Inbound study abroad and exchange
The fee you pay will depend on the number and type of courses you study.
No
University-wide elective icon
University-wide elective course
No
Single course enrollment
Single course enrolment
No
alt
Note:
Course data is interim and subject to change

Course overview

Cryptography is a vital aspect of cybersecurity. This course introduces modern cryptographic techniques in the context of

information security in the workplace. It provides a sound understanding of the different types of cryptosystems available, the practical issues of applying cryptographic methods and key issues in the management of information security. Topics covered are introduction to cryptography - encryption, decryption, attacks; symmetric encryption - stream and block ciphers, AES, block cipher modes; hash functions; message authentication; public key cryptography; data integrity; digital signature schemes; authentication; cryptographic protocols; key management; secret sharing schemes, post quantum cryptography; and applications.

Course learning outcomes

  • Understand that different types of cryptosystems are needed for different security needs
  • Understand the practical issues associated with using cryptography
  • Identify key issues relating to managing security of informationAn awareness that cryptography is just one part of information security in the workplace
  • How to think about the adversary in the context of cryptography
  • Look at existing toolkits, understand their core functionality and know how to use them
  • Understand why key management is an essential process which underpins the security of any cryptographic scheme
  • Develop the tools to implement an application specific key management process
  • Understand why no cryptographic mechanism should be implemented before consulting the relevant standard

Prerequisite(s)

N/A

Corequisite(s)

N/A

Antirequisite(s)

N/A