Learning Outcomes

On successful completion of this module, students should be able to:

  • Analyze scientific research papers and describe the use of cryptographic algorithms to satisfy security requirements.
  • Propose appropriate algorithms and cryptosystems based on the system’s security requirements.
  • Develop cryptosystems to satisfy confidentiality, integrity and authentication requirements.
  • Design cryptographic authentication and key agreement protocols, as well as zero-knowledge. Protocols.
  • Explain the use of trust services and the corresponding legal framework.
  • Analyze security properties for blockchains and propose appropriate uses.
  • Deploy blockchain solutions to satisfy security requirements.