Table of contents
Computer Security
This module aims to provide you with an understanding of the need for computer security and the technologies that support it. It has both a theoretical component that will teach you mathematical underpinnings of security systems and a practical element that will help you discover the pitfalls of security design and to comprehend the mathematics underlying the protocols by programming small examples.
Professor(s)
- Dr. Matthew Yee-King
- Dr. Robert Zimmer
Topics covered
- Security threats
- Social Issues in Computer Security
- Access Control and Authentication
- Security Models
- Operating System Security
- Network security
- Cryptography
- Cryptographic protocols and key management
- Public Key Cryptography
- Blockchain protocols
Assessment
One two hour unseen written examination and coursework (Type I)
Mock exams
Module specification
Past exams
Syllabus
Resources
Documents
Public-Key Cryptography RSA Attacks against RSA - From www.lri.fr.
Notes
Websites
- RSA Encryption - Brilliant.org.
YouTube
- How the RSA algorithm works, including how to select d, e, n, p, q, and φ (phi) - Anthony Vance.
- Public Key Cryptography: RSA Encryption Algorithm - Art of the Problem.
- RSA algorithm step by step example - shad sluiter.