CE708-7-AU-CO:
Computer Security
    
    
    
         
        
            
                 2025/26
 
                 Computer Science and Electronic Engineering (School of)
                 Colchester Campus
 
                 Autumn
                 Postgraduate: Level 7
              
            
                 Current
 
                 Thursday 02 October 2025
 
                 Friday 12 December 2025
 
                 15
 
                 27 June 2024
             
         
     
     
    
        
            Requisites for this module
          
        
            
                 (none)
 
                 (none)
                 (none)
 
                 (none)
              
         
     
     
    
        
        
             CE823
 
         
     
    
        
            
                
                    
                        
                        
                            MSC G40012 Advanced Computer Science, 
MSC G400CH Advanced Computer Science, 
MSC H60112 Computer Networks and Security, 
MSC G456N1 Computing, 
MSC GH64N3 Computer Systems Engineering, 
MSC G41912 Cyber Security, 
MPHDG40048 Computer Science, 
PHD G40048 Computer Science, 
MSCIG402   Computer Science, 
MSCII100   Computer Science (Integrated Masters, Including Placement Year)         
                        
                     
                    
                        
                        
                            This course gives an introduction to computer security and cryptography, from theory to practical as well as giving students the necessary background on making data stored and communicated in a safe manner.
Introductory material is independent of any programming language but the consideration of Python is used, partly because its open-source nature facilitates this and partly because it is widely used on server systems. The introduction to cryptography will be used to consider its use in encryption and message authentication.
                         
                     
                    
                        
                        
                            The aim of this module is:
- To introduce computer security and cryptography and consider security of data for storage and communications.
 
                         
                     
                    
                        
                        
                            By the end of this module, students will be expected to be able to:
- List and explain common data security vulnerabilities.
 
- List and explain different types of attack on data confidentiality, availability and integrity.
 
- Explain, apply and analyse weak and strong data security cryptography tools and methods.
 
- Evaluate the use of cryptography in certification and authentication.
 
                         
                     
                    
                        
                        
                            Outline Syllabus
1. Introduction:
Principles of security and privacy, introduction to the different types of computer attack
Common security policies, techniques and tools:
Good administrative procedures for computer systems. Data security (e.g. good backup policy).
Combating social engineering. Tools for identifying system vulnerabilities. Monitoring for break-ins. Recovering from a break-in.
2. Overview of Encryption:
Applications of encryption to computer security. Types of encryption algorithms.
Examples of encryption algorithms commonly used.
3. Theoretical Background for Cryptography:
Fundamentals and principles used in cryptography including, binary arithmetic, prime numbers, exponential and logarithmic operations, Euler’s theorem Galois fields and Chinese Remainder Theorem.
4. Symmetric Encryption:
Perfect secrecy and the one-time pad, Feistel Cypher, DES (Data Encryption Standard), AES (Advanced Encryption Standard). Key generation algorithms.
5. Assymetric Encryption:
Public-key cryptography. Anonymous key exchange (Diffie-Hellman). RSA (Rivest-Shamir-Adelman)
6. High-level Ciphers:
Block ciphers (substitution, transposition, product), Stream ciphers and Modes of operation (ECB, CBC, CFB, OFB)
7. Message Authentication:
Hashing (SHA and HMAC) and Digital signature schemes: DSA (Digital Signature Algorithm) and DSS (Digital Signature Standard)
8. Advanced Cryptography
Elliptic Curve Cryptography and post-quantum crypto: signatures and key exchange
                         
                     
                    
                        
                        
                            This module will be delivered via:
- Theoretical knowledge is imparted through live lectures, emphasizing core principles.
 
- Practical skills are honed in laboratory sessions, where real-world applications are explored.
 
                         
                     
                    
                        
                        
                            
	This module does not appear to have a published bibliography for this year.
                         
                     
                 
             
         
     
    
			
    
        Assessment items, weightings and deadlines
        
        
            
                
                
                
                
            
            
                | Coursework / exam | 
                Description | 
                Deadline | 
                Coursework weighting | 
            
            
                    
                        | Coursework    | 
                        Assignment 1 - Lab Report  | 
                        14/11/2025  | 
                        33.33%  | 
                    
                
                    
                        | Coursework    | 
                        Assignment 2 - Lab Report  | 
                        18/12/2025  | 
                        33.34%  | 
                    
                
                    
                        | Written Exam  | 
                        Progress Test 1 (In person, MCQ Moodle Based Test, Closed Book)     | 
                          | 
                        33.33%  | 
                    
                
            
				
                
                        
                            | Exam  | 
                            Main exam: In-Person, Open Book (Restricted), 120 minutes during Early Exams 
                         | 
                    
                        
                            | Exam  | 
                            Reassessment Main exam: In-Person, Open Book (Restricted), 120 minutes during September (Reassessment Period) 
                         | 
                    
            
			
        
    
		 
    
    Exam format definitions
    
        - Remote, open book: Your exam will take place remotely via an online learning platform. You may refer to any physical or electronic materials during the exam.
 
        - In-person, open book: Your exam will take place on campus under invigilation. You may refer to any physical materials such as paper study notes or a textbook during the exam. Electronic devices may not be used in the exam.
 
        - In-person, open book (restricted): The exam will take place on campus under invigilation. You may refer only to specific physical materials such as a named textbook during the exam. Permitted materials will be specified by your department. Electronic devices may not be used in the exam.
 
        - In-person, closed book: The exam will take place on campus under invigilation. You may not refer to any physical materials or electronic devices during the exam. There may be times when a paper dictionary, 
            for example, may be permitted in an otherwise closed book exam. Any exceptions will be specified by your department.
 
    
    Your department will provide further guidance before your exams.
    Overall assessment
    
    Reassessment
    
    
        Module supervisor and teaching staff
 
        
            
                 Dr Insaf Ullah, email: insaf.ullah@essex.ac.uk. 
  
                 Dr Insaf Ullah                                                                                                                                                                                                                                                 
 
                 School Office, email: csee-schooloffice (non-Essex users should add @essex.ac.uk to create full e-mail address), Telephone 01206 872770
 
              
         
     
     
    
        
        
            
                
                         
                            
                                No
                            
                        
 
                    
                         
                            
                                No
                            
                        
 
                    
                         
                            
                                Yes
                            
                        
 
                    
              
         
     
    
        
            
                
                    
                        
                        
                            
                                     
                                        
                                            Dr Anthony Olufemi Tesimi Adeyemi-Ejeye
                                        
                                    
 
                                     
                                     
                                
                            
                         
                     
                 
             
         
     
    
         
        
            
                 Available via Moodle  
                 Of 14 hours, 10 (71.4%) hours available to students:
4 hours not recorded due to service coverage or fault;
0 hours not recorded due to opt-out by lecturer(s), module, or event type.  
              
         
     
    
     
    
    
    
    Disclaimer: The University makes every effort to ensure that this information on its Module Directory is accurate and up-to-date. Exceptionally it can 
        be necessary to make changes, for example to programmes, modules, facilities or fees. Examples of such reasons might include a change of law or regulatory requirements, 
        industrial action, lack of demand, departure of key personnel, change in government policy, or withdrawal/reduction of funding. Changes to modules may for example consist 
        of variations to the content and method of delivery or assessment of modules and other services, to discontinue modules and other services and to merge or combine modules. 
        The University will endeavour to keep such changes to a minimum, and will also keep students informed appropriately by updating our programme specifications and module directory.
    The full Procedures, Rules and Regulations of the University governing how it operates are set out in the Charter, Statutes and Ordinances and in the University Regulations, Policy and Procedures.