15 Credits AUTUMN



Aims/Description: This wide-ranging module covers some fundamental concepts, properties, and mechanisms in security, e.g. identity, authentication, confidentiality, privacy, anonymity, availability and integrity. Cryptographic algorithms are explored together with major attacks (using a break-understand-and-fix approach). High level security protocols are explored (passwords, graphical passwords, key distribution and authentication protocols) together with some rigorous mechanisms for reasoning about their correctness (e.g. belief logics). Other mechanisms such as biometric authentication are also covered.

Restrictions on availability: An ability to program in a commonly used language, e.g. Java or Python. Some very basic familiarity with probability.

Staff Contact: CLARK JOHN
Teaching Methods: Lectures, Problem solving, Independent Study
Assessment: Course work

Information on the department responsible for this unit (Computer Science):

Departmental Home Page
Teaching timetable

|

NOTE
The content of our courses is reviewed annually to make sure it's up-to-date and relevant. Individual modules are occasionally updated or withdrawn. This is in response to discoveries through our world-leading research; funding changes; professional accreditation requirements; student or employer feedback; outcomes of reviews; and variations in staff or student numbers. In the event of any change we'll consult and inform students in good time and take reasonable steps to minimise disruption.

URLs used in these pages are subject to year-on-year change. For this reason we recommend that you do not bookmark these pages or set them as favourites.

Teaching methods and assessment displayed on this page are indicative for 2025-26.

Western Bank, Sheffield, S10 2TN, UK