The course is connected to the following study programs

  • Cyber Security, Master’s Programme

Teaching language

English

Learning outcomes

After completing the course, the student must have

  • solid understanding of cryptographic primitives and cryptographic systems

  • insight into information theory, symmetric and asymmetric cryptography, hash functions, digital signatures

  • have an understanding of quantum cryptographic theory and the need for quantum-resistant cryptography

Teaching methods

The subject is given in the form of lectures, exercises and compulsory work. The total expected scope of work is estimated at approx. 210 hours.

Evaluation

The person responsible for the course decides, in cooperation with student representative, the form of student evaluation and whether the course is to have a midway or end of course evaluation in accordance with the quality system for education, chapter 4.1.

Offered as Single Standing Module

Yes. Subject to availability or capacity.

Admission Requirement if given as Single Standing Module

The admission requirements for the course are the same as for the master's program in Cybersecurity Engineering, as well as IKT447-G Trust, threats, risk and vulnerability

Assessment methods and criteria

3 hours individual written exam (60%). Project (40%). Graded grade.

Last updated from FS (Common Student System) June 30, 2024 7:36:55 PM