DCS: 701 – Quantum Computing and Cryptography
Categories: Doctorate of Computer Science
About Course
- This core course explores the principles of quantum computing and its implications for cryptography. It covers quantum algorithms, quantum key distribution, and the development of post-quantum cryptographic systems, equipping students with the knowledge to engage in advanced research in quantum technologies.
- Students will gain an in-depth understanding of how quantum computing can disrupt traditional cryptographic methods and the strategies needed to develop secure systems in a quantum future.
Course Objectives:
- Develop an understanding of the foundational principles of quantum computing.
- Explore the impact of quantum computing on modern cryptographic systems.
- Learn to design and analyze quantum algorithms and their applications in cryptography.
- Understand post-quantum cryptographic techniques and their importance in a quantum era.
- Engage in advanced research topics within quantum computing and cryptography.
Course Content
Live Session Recording
-
Live Session 1
51:47 -
Live Session 2
37:50 -
Live Session 3
47:43 -
Live Session 4
45:41
Week 1: Introduction to Quantum Computing
-
Week 1: Introduction to Quantum Computing
03:10 -
LO1: Define the fundamental concepts of Qubits and Quantum Gates
07:00 -
LO2: Explain how Quantum computing differs from classical Computing
10:09 -
LO3: Illustrate simple Quantum circuits using basic Gates
09:50 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 2: Quantum Algorithms
-
Week 2: Quantum Algorithms
04:20 -
LO1: Describe the principles underlying Shor’s and Grover’s algorithms
13:04 -
LO2: Analyse the computational advantages of Quantum algorithms over classical ones
12:19 -
LO3: Apply algorithmic steps of Grover’s search to solve small-scale examples
10:53 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 3: Quantum Key Distribution (QKD)
-
Week 3: Quantum Key Distribution (QKD)
03:31 -
LO1: Explain the operational principles of QKD protocols such as BB84 and E91
11:20 -
LO2: Evaluate the security features and limitations of QKD systems
11:55 -
LO3: Discuss the role of QKD in modern Cryptographic frameworks
10:07 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 4: Quantum Entanglement and Cryptography
-
Week 4: Quantum Entanglement and Cryptography
03:28 -
LO1: Define Quantum entanglement and its physical characteristics
12:28 -
LO2: Explain how entanglement enhances security in Cryptographic protocols
11:07 -
LO3: Assess the challenges of implementing Entanglement-based Cryptography
11:03 -
Multiple Choice Questions (copy)
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 5: Quantum Error Correction
-
Week 5: Quantum Error Correction
03:11 -
LO1: Describe the need for error correction in Quantum systems
11:17 -
LO2: Explain the principles of Quantum error-correcting codes such as Shor’s code
11:44 -
LO3: Analyse the trade-offs between Error correction and Quantum resource requirements
10:43 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 6: Post-Quantum Cryptography
-
Week 6: Post-Quantum Cryptography
03:01 -
LO1: Define post-Quantum Cryptography and its role in securing systems against Quantum attacks
10:14 -
LO2: Explain the principles of lattice-based Cryptographic methods
09:13 -
LO3: Evaluate the effectiveness of various post-Quantum algorithms using case studies
10:37 -
Multiple Choice Questions (copy)
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 7: Quantum Computing and Cryptanalysis
-
Week 7: Quantum Computing and Cryptanalysis
03:33 -
LO1: Explain how Quantum algorithms threaten classical cryptosystems such as RSA
11:32 -
LO2: Analyse Cryptographic vulnerabilities exposed by Quantum computation
08:59 -
LO3: Compare classical and Quantum approaches to Cryptanalysis
08:17 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 8: Midterm Test
-
Week 8: Midterm Test
05:16 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Short Answer Questions
Week 9: Advanced Quantum Algorithms for Cryptography
-
Week 9: Advanced Quantum Algorithms for Cryptography
00:00 -
LO1: Identify advanced Quantum algorithms relevant to Cryptographic applications
00:00 -
LO2: Explain the potential of algorithms beyond Shor and Grover in Cryptanalysis
00:00 -
LO3: Critically assess research literature on emerging Quantum algorithms
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 10: Security Models in Quantum Cryptography
-
Week 10: Security Models in Quantum Cryptography
00:00 -
LO1: Define key concepts in Quantum security proofs and models
00:00 -
LO2: Explain the role of composability in Quantum Cryptographic Security
00:00 -
LO3: Evaluate the strengths and weaknesses of security models applied to Quantum protocols
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 11: Quantum Computing Hardware
-
Week 11: Quantum Computing Hardware
00:00 -
LO1: Describe the main physical implementations of Qubits
00:00 -
LO2: Explain the technical challenges in building scalable Quantum computers
00:00 -
LO3: Assess the implications of hardware limitations for Cryptographic applications
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 12: Quantum Cryptographic Protocols
-
Week 12: Quantum Cryptographic Protocols
00:00 -
LO1: Explain the design principles of Quantum Cryptographic protocols beyond QKD
00:00 -
LO2: Analyze real-world applications of Quantum authentication and commitment protocols
00:00 -
LO3: Evaluate the efficiency and feasibility of protocol implementation
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 13: Future Trends in Quantum Computing and Cryptography
-
Week 13: Future Trends in Quantum Computing and Cryptography
00:00 -
LO1: Identify emerging trends in Quantum computing research
00:00 -
LO2: Summarize the potential impact of Quantum advances on global cybersecurity
00:00 -
LO3: Predict future directions of Quantum-safe Cryptography based on current research
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 14: Ethical and Societal Implications of Quantum Computing
-
Week 14: Ethical and Societal Implications of Quantum Computing
00:00 -
LO1: Explain the ethical challenges posed by Quantum Technologies
00:00 -
LO2: Analyze the societal impact of widespread adoption of Quantum Cryptography
00:00 -
LO3: Evaluate policies and governance frameworks for responsible Quantum development
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 15: Course Review
-
Week 15: Course Review
00:00 -
LO1: Summarize the key concepts covered throughout the course
00:00 -
LO2: Integrate knowledge from different topics to design secure Quantum-era Cryptographic solutions
00:00 -
LO3: Prepare for final assessment by reviewing algorithms, protocols, and post-Quantum systems
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 16: Final Test
-
Week 16: Final Test
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation