Computer Security and Cryptography - CO634

Location Term Level Credits (ECTS) Current Convenor 2019-20
Canterbury Autumn
View Timetable
6 15 (7.5) PROF J Hernandez Castro
Medway Autumn
View Timetable
6 15 (7.5) DR C Perez Delgado


COMP3240 Computer Systems

COMP5270 Operating Systems and Architecture





Security has always been an important aspect of computing systems but its importance has increased greatly in recent years. In this module you learn about areas where security is of major importance and the techniques used to secure them. The areas you look at include computer operating systems (and increasingly, distributed operating systems), distributed applications (such as electronic commerce over the Internet) and embedded systems (ranging from smart cards and pay-TV to large industrial plant and telecommunications systems).


This module appears in:

Contact hours

Total contact hours: 30
Private study hours: 120
Total study hours: 150

Method of assessment

2 hour written exam (70%)
Modular Arithmetic (5%)
Decryption (10%)
Security concepts and threat analysis (15%)

2 hour unseen written examination (50%)
Cryptography (25%)
Authentication (25%)

Indicative reading

Charles P. Pfleeger , "Security in Computing ", 2nd ed. , September 1996, Prentice Hall William Stallings, "Cryptography and Network Security : Principles and Practice", 2nd ed. , July 1998, Prentice Hall
Rita C. Summers, "Secure Computing : Threats and Safeguards", January 1997, McGraw Hill
Bruce Schneier , "Applied Cryptography : Protocols, Algorithms, and Source Code in C", 2nd ed., December 1995, John Wiley & Sons
Jonathan Knudsen , "Java Cryptography", May 1998, O'Reilly & Associates
Scott Oaks, "Java Security", May 1998, O'Reilly & Associates
Ingemar Cox, Matthew Miller & Jeffrey Bloom, "Digital Watermarking: Principles and Practice", 2003, Morgan Kaufman.

See the library reading list for this module (Canterbury)

See the library reading list for this module (Medway)

Learning outcomes

Have an understanding of the algorithms used in cryptography and be able to perform implementations of selected algorithms in this area;
Have an understanding of the threats faced by computer operating systems, applications and networks and the various countermeasures that can be used;
Be able to make informed choices of the appropriate security measures to put into place for a given network and/or operating system;
Have an understanding of how cryptography can be used for providing security within applications.

University of Kent makes every effort to ensure that module information is accurate for the relevant academic session and to provide educational services as described. However, courses, services and other matters may be subject to change. Please read our full disclaimer.