Cryptography Fundamentals

Cyber Security

Unit Code
Level 5
Distance Learning
Class Room
Unit Code
Level 5
Distance Learning Fee
Face to Face Fee
Accelerate your career with London Institute of Business & Technology's flexible executive pathway programmes today!
Total Fee £1600

£2360 (£1600 during the tuition waiver period)

Please see the Tuition Fee section to see if you are eligible for a scholarship.
Course Overview

The process of encrypting and decrypting information forms the basis of much computer, device and network security. Cryptography is designed and used to protect the confidentiality, integrity and authenticity of information. From the very beginnings of computing, and throughout the industry’s evolution, the establishment of policies, guidelines and laws has shaped the disciplines of information security and organisational resilience in profound and, often, unintended, ways. 

In this course learners will be introduced to the concept and history of cryptography, and its subdisciplines (including cryptology), and how cyber-enabled networks and devices have their communications security underpinned by cryptographic methods and sector standards. Learners will explore methods of attack, including side-channel, additional encryption methods and escrow principles and key. Learners will look at how businesses can deploy encryption to enhance their information security approaches.

Course Content


  • What is Cryptography?
  • History of Cryptography
  • Discrete Probability
  • Information Theoretic Security and The One Time Pad

Stream Ciphers

  • Stream Ciphers and Pseudo Random Generators
  • Attacks on Stream Ciphers
  • Real-world Stream Ciphers
  • PRG Security Definitions
  • Semantic security

Block Ciphers

  • What are Block Ciphers?
  • The Data Encryption Standard
  • More Attacks on Block Cipher
  • The AES Block Cipher
  • Block Ciphers From PRGs

Authenticated Encryption

  • Active Attacks
  • Definition
  • Chosen Ciphertext Attacks
  • Constructions From Ciphers and MACs
  • CBC Padding Attacks
  • Cryptographic Attacking
  • Key Derivation
  • Deterministic Encryption

Basic Key Exchange

  • Introduction to Basic Key Exchange
  • Trusted 3rd Parties
  • Merkle’s Puzzles
  • The Diffie-Hellman Protocol
  • Public-Key Cryptography
  • Notation

Public-Key Encryption

  • Definitions and Security
  • Construction
  • The RSA Trapdoor Permutation
  • PKCS 1
  • Is RSA a One-Way Function?
  • RSA in Practice
Learning Outcome & Assessment Criteria

1.  Understand key cryptographic principles and modes

  1. Define the concept and application of cryptography
  2. Explain symmetric and asymmetric modes and approaches
  3. Assess how cryptographic methods and standards underpin the communications security of cyber-enabled networks and devices

2.  Understand the standards, regulations and laws that apply to business and government organisations in relation to encryption

  1. Explain the key principles of the related standards, regulations and laws and why they are in place
  2. Assess the consequences for organisations and individuals of non-compliance with these standards, regulations and laws

3.  Design an encryption plan and courses of action for a given organisation

  1. Explain the methods of attack used to target encrypted data
  2. Assess the additional encryption methods available
  3. Explain the key principles of escrow and recovery
  4. Explain the importance of having robust encryption arrangements within IT systems
  5. Evaluate the existing encryption arrangements
  6. Design an encryption plan to meet the needs of a given organisation, with recommended courses of actions
  • The assessment strategy for this course is designed to test all the learning outcomes.
  • Learners must demonstrate successful achievement of all learning outcomes to pass the course.
Assessment Marking Criteria


Citizens of the following countries are eligible for a 50% scholarship upon writing a personal statement. All scholarships are to be approved by the Academic Board. The list of countries are: Sri Lanka, Indonesia, Philippines, Bhutan, Morocco, Vietnam, Papua New Guinea, Laos, Cambodia, India, Nigeria, Ghana, Bangladesh, Laos, Myanmar, Pakistan, Nepal and South Africa. Please talk to your student counselor and ask for the Coupon Code to get the 50% Tuition Waiver.

  • The assessment criteria for a pass will be presented with the summative exercise.
  • Further information and guidance on the assessment will be made available through the tutor.
Unit Pass Requirements

To pass the unit a 40% overall grade must be achieved.

Frequently Asked Questions
What is included in the cost of my programme?
  • All course material, including online modules and written assignments
  • Unlimited personal tutor support with online sessions
  • Dedicated student support
  • Access to an online community learning forums
  • Assignment marking and feedback
Am I eligible for this programme?

You are eligible if you meet our stipulated entry requirements.

Standard ROUTE

Easy Monthly Payments


Access to LMS

Easy 12 instalments

Complete in 12 months

Unlimited tutor support

Requires submitting 1 assignment per month



Easy Monthly Payments


Access to LMS

Easy 6 instalments

Complete in 6 months

Priority support

Unlimited tutor support

Requires submitting 2 assignments per month

Start TrialEnrol




Access to LMS

No monthly payments

Complete at your own pace

Priority support

Unlimited tutor support

Dedicated counselor

No additional bank charges

Career guidance & advise

Start TrialEnrol
Download Brochure

The London Institute of Business and Technology holds an official registration with the Intellectual Property Office, bearing the Trademark Number UK00003896607.

UK Register of Learning Providers - Provider Reference Number (UKPRN): 10092833