Teaching

We teach cryptography at Royal Holloway, University of London on both undergraduate and postgraduate level. More specifically, we provide modules for the BSc/MSci Computer Science (Cyber Security) and the MSc Information Security courses. Additionally, we supervise BSc/MSci/MSc student projects related to cryptography. We also work with University of London Worldwide for the distance learning MSc Cyber Security programme that is delivered via Coursera.


IY5502: Introduction to Cryptography and Security Technologies

Keith Martin and Geraint Price, Autumn Term, Academic Year 2024/25

This module is divided into three parts. The first part sets the scene: core security services provided by cryptography, basic model of a cipher system and use of cryptography, historical algorithms, security in theory and practice. The second part examines a Cryptographic Toolkit: symmetric and public key encryption, data integrity, entity authentication, digital signatures, cryptographic protocols. The third part focusses on the practical aspects of key management and cryptographic applications.

IY3660: Applications of Cryptography

Elizabeth Quaglia, Autumn Term, Academic Year 2024/25

The aim of this module is to explain the fundamentals behind cryptography and how it is deployed in real systems. Topics that will be explored include fundamentals (security services, security models, basic attacks on cryptosystems), cryptographic mechanisms (symmetric and public-key encryption, hash functions, MACs, digital signatures, authentication protocols), real-world cryptography (key management, implementation issues, cryptographic standards, crypto politics), and applications (case studies of systems such as 3G, EMV, SSL/TLS).

IY2760/DC3760: Introduction to Information Security

Siaw-Lynn Ng, Autumn Term, Academic Year 2024/25

This module provides a foundational understanding of information security, covering core principles like Confidentiality, Integrity, and Availability (CIA). Students explore key areas including cryptographic methods (e.g., AES, RSA), identity verification techniques, access control models, and network security essentials. Topics also address authentication protocols like Kerberos, cybersecurity for physical systems, and data protection legislation. Through case studies, students analyze real-world security challenges, applying concepts to evaluate and strengthen security measures across diverse systems.

CYM040: Introduction to Applied Cryptography

Keith Martin, Autumn Term, Academic Year 2024/25

In this module, students explore the role of cryptography in securing everyday applications like the internet, mobile phones, wireless networks, and cryptocurrency. They gain an understanding of the functionality and purpose of today’s main cryptographic tools and learn to make informed decisions about which tools are best suited for specific settings. Finally, the module examines the broader infrastructure supporting cryptography and its impact on the overall security of cryptographic systems.

CYM090: Information Privacy

Erin Hales, Elizabeth Quaglia, and Christian Weinert, Spring Term, Academic Year 2024/25

In this module, students explore the challenges organizations face in managing data privacy. They gain an understanding of data privacy's importance and examine the legal constraints that make it a critical issue for cybersecurity risk management. Key governance topics are covered, including privacy impact assessments, along with the role of technology in supporting privacy through methods like de-identification and homomorphic encryption. The module concludes with a privacy case study, such as e-voting.