Durham University
Programme and Module Handbook

Postgraduate Programme and Module Handbook 2025-2026

Module COMP54515: Security Engineering and Cryptography

Department: Computer Science

COMP54515: Security Engineering and Cryptography

Type Tied Level 5 Credits 15 Availability Available in 2025/2026 Module Cap
Tied to G5T609
Tied to G5T709

Prerequisites

  • None

Corequisites

  • None

Excluded Combination of Modules

  • None

Aims

  • To give students an in-depth understanding of the design and assessment of secure connected systems.

Content

  • Themes will be chosen from the following:
  • Principles of architecting a secure system
  • Threat models and security assessment.
  • Application and design of cryptographic systems.
  • Principles of securing networks.

Learning Outcomes

Subject-specific Knowledge:
  • By the end of this module, students will be able to demonstrate:
  • an understanding of the core security principles
  • an understanding of cryptographic primitives.
  • an understanding of computer and network security, common attacks and appropriate countermeasures.
Subject-specific Skills:
  • By the end of this module, students should be able to demonstrate:
  • an ability to critically analyse security measures and architectures.
  • an ability to recognise comprehensive threat models and design security architectures accordingly.
  • an ability to evaluate secure protocols.
Key Skills:
  • By the end of this module, students should be able to demonstrate:
  • an ability to design and implement countermeasures against various attack scenarios.
  • an ability to employ suitable cryptographic protocols to enforce secrecy, and integrity.

Modes of Teaching, Learning and Assessment and how these contribute to the learning outcomes of the module

  • A combination of lectures, computer classes, and guided reading will contribute to achieving the aims and learning outcomes of this module.
  • Independent study and suggested lists of articles and books enable students to develop and apply their knowledge to real-world problems.
  • The summative assessment consists of a group work assignment where students design a secure connected application, followed by an individual assessment where each student assesses the security of applications designed by other groups and write an assessment report, thus testing students’ knowledge and critical understanding of the material covered in the module, their analytical and problem-solving skills and the practical implementation of the acquired knowledge.

Teaching Methods and Learning Hours

Activity Number Frequency Duration Total/Hours
Lectures 8 1 per week 2 hours 16
Computer Classes 8 1 per week 2 hours 16
Preparation and Reading 118
Total 150

Summative Assessment

Component: Coursework Component Weighting: 100%
Element Length / duration Element Weighting Resit Opportunity
Assignment 40%
Report 60%

Formative Assessment:

Via computer classes.


â–  Attendance at all activities marked with this symbol will be monitored. Students who fail to attend these activities, or to complete the summative or formative assessment specified above, will be subject to the procedures defined in the University's General Regulation V, and may be required to leave the University