Explore UCD

UCD Home >

COMP41280

Academic Year 2022/2023

Introduction to Information Security (COMP41280)

Subject:
Computer Science
College:
Science
School:
Computer Science
Level:
4 (Masters)
Credits:
5
Module Coordinator:
Dr Félix Balado Pumarino
Invalid Option
Invalid Option
Spring
Mode of Delivery:
On Campus
Invalid Option
Invalid Option
Invalid Option
Invalid Option

Curricular information is subject to change.

Invalid Option This course provides an introduction to the field of information security. The focus of the course is on cryptographic primitives --- an important set of tools on which information security usually relies.

About this Module

Learning Outcomes:

- Fundamentals of cryptography. Shannon's model. Perfect secrecy. Communication channels and cryptography.

- Classic ciphers. Block ciphers. Modes of operation. Data Encryption Standard (DES). Advanced Encryption Standard (AES).

- Public key cryptography. Diffie-Hellman scheme. RSA cryptography.

- Digital signatures. Hash functions. SHA family. Message authentication codes. The public key infrastructure.

Indicative Module Content:

(see above)

Student Effort Hours:
Student Effort Type Hours
Autonomous Student Learning

88

Lectures

22

Total

110


Approaches to Teaching and Learning:
lectures; reflective learning; problem-based learning;

Requirements, Exclusions and Recommendations
Learning Recommendations:

Basic knowledge of probability theory is recommended, although the course is self-contained in this respect.


Module Requisites and Incompatibles
Not applicable to this module.
 

Assessment Strategy Invalid Option
Description Timing Open Book Exam Component Scale Must Pass Component % of Final Grade In Module Component Repeat Offered
Continuous Assessment: Practical and Theoretical Assignments/Tests Varies over the Trimester n/a Alternative linear conversion grade scale 40% No
100
No

Carry forward of passed components Invalid Option
Yes
 

Resit In Terminal Exam
Summer No
Please see Student Jargon Buster for more information about remediation types and timing. 

Feedback Strategy/Strategies

• Feedback individually to students, post-assessment

How will my Feedback be Delivered?

Not yet recorded.