COMP41280 Introduction to Information Security

Academic Year 2022/2023

This course provides an introduction to the field of information security. The focus of the course is on cryptographic primitives --- an important set of tools on which information security usually relies.

Show/hide contentOpenClose All

Curricular information is subject to change

Learning Outcomes:

- Fundamentals of cryptography. Shannon's model. Perfect secrecy. Communication channels and cryptography.

- Classic ciphers. Block ciphers. Modes of operation. Data Encryption Standard (DES). Advanced Encryption Standard (AES).

- Public key cryptography. Diffie-Hellman scheme. RSA cryptography.

- Digital signatures. Hash functions. SHA family. Message authentication codes. The public key infrastructure.

Indicative Module Content:

(see above)

Student Effort Hours: 
Student Effort Type Hours
Autonomous Student Learning






Approaches to Teaching and Learning:
lectures; reflective learning; problem-based learning; 
Requirements, Exclusions and Recommendations
Learning Recommendations:

Basic knowledge of probability theory is recommended, although the course is self-contained in this respect.

Module Requisites and Incompatibles
Not applicable to this module.
Assessment Strategy  
Description Timing Open Book Exam Component Scale Must Pass Component % of Final Grade
Continuous Assessment: Practical and Theoretical Assignments/Tests Varies over the Trimester n/a Alternative linear conversion grade scale 40% No


Carry forward of passed components
Resit In Terminal Exam
Autumn No
Please see Student Jargon Buster for more information about remediation types and timing. 
Feedback Strategy/Strategies

• Feedback individually to students, post-assessment

How will my Feedback be Delivered?

Not yet recorded.

Timetabling information is displayed only for guidance purposes, relates to the current Academic Year only and is subject to change.
Lecture Offering 1 Week(s) - 21, 23, 24, 25, 26, 29, 30, 32, 33 Mon 15:00 - 16:50