Secure Software Development

Cryptography and Its Use in Operating Systems

Unit 8

Welcome to Week 8 where we will investigate the principles, technology and use of cryptography and how it is used with operating systems.

Outcomes

  • Summary of the learning outcomes

This unit aims to:

  • Describe some of the issues encountered with cryptographic libraries
  • Explain the pros and cons of using common cryptographic libraries
  • Demonstrate the use of cryptographic libraries in a simple application
  • Reflection

What exactly have I learnt and how?

I never thought there were many techniques for encrypting a simple password. With this unit, I explored a handful of cryptography methods. I also understand the importance of encryption in the context of cyber security. However, even an encrypted Password is still not secure. Simple encryption techniques are easy to crack. Therefore, choosing a password that is still difficult to detect is essential. In the future, I will focus on blockchain technology, one of the most robust cryptography technologies.
  • Notes

Notes from the elaboration of the unit, various meetings, and feedback from team members and tutors

Feedback from tutor on my Collaborative Discussion 2: TrueCrypt
Thanks very much for this posting, Gianluca. It has been effectively supported using academic referencing. In the future, please try to use English sources of literature, given that your work is being assessed by an institution based in the UK.
Please also note the requirement to design an ontology which captures the vulnerabilities in TrueCrypt as part of this task. I look forward to seeing this aspect of your work.
Best wishes,
Tutor

Contact Me