From 539e244a742cac784d1e98da896b2553b3ce76ce Mon Sep 17 00:00:00 2001 From: Bill Buchanan Date: Tue, 17 Feb 2026 08:42:44 +0000 Subject: [PATCH] Enhance README with details on cryptographic methods Added details about typical methods for zero-knowledge proofs and quantum-robust cryptography performance investigation. --- z_assessments/coursework/README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/z_assessments/coursework/README.md b/z_assessments/coursework/README.md index 986f5fb..8ff7569 100644 --- a/z_assessments/coursework/README.md +++ b/z_assessments/coursework/README.md @@ -10,14 +10,14 @@ At the end of your coursework document submission, please include a short declar You are requested to investigate, build a prototype, and evaluate one of the following: -* **Zero-knowledge proof (ZKP) methods**. This involves using cryptography to allow users to prove shared knowledge without having to reveal the original information. This might involve passing on knowledge of a password, without actually revealing the password. +* **Zero-knowledge proof (ZKP) methods**. This involves using cryptography to allow users to prove shared knowledge without having to reveal the original information. This might involve passing on knowledge of a password, without actually revealing the password. Typical methods are zkSnarks and zkStarks. * **Homomorphic encryption**. This involves processing encrypted data and can be partial homomorphic encryption (where a few mathematical methods can be implemented) or full homomorphic encryption. * **AI and Cryptographic flaws**. This involves using GenAI to investigate how it can be used to identify flaws in cryptographic code, such as static flaws caused by incorrect parameters, or dynamic flaws, such as pointer memory violations. * **Light-weight cryptography**. This involves cryptography methods that support encryption, which are suitable for IoT devices. This is normally optimised in terms of reducing processing requirements, memory utilisation, and energy drain. -* **Quantum-robust cryptography**. Quantum computers are likely to crack existing public key methods, and thus we need to move toward public key methods which are quantum robust. +* **Quantum-robust cryptography**. Quantum computers are likely to crack existing public key methods, and thus, we need to move toward public key methods which are quantum robust. This assignment could investigate the performance of the quantum robust methods (eg ML-DSA) against classical methods (eg RSA). * **Key Distribution Centres**. The complexity of handling keys is an increasing challenge for many companies. Within a KDC, we can implement methods which will generate encryption keys for users. This topic will involve investigating possible methods that could be used. * **Blockchain integration**. Many applications are moving towards storing data on a blockchain and in using smart contracts. This area will investigate new areas of improving the security and/or performance of blockchain-related methods. -* **Tokenization**. There is a vast increase in the usage of tokens to either protect sensitive details or provide one-time access. This area will allow you to investigate different tokenisation methods, such as using Ferrnet tokens or some of the security weaknesses of OAuth 2. +* **Tokenization**. There is a significant increase in the use of tokens to protect sensitive information or provide one-time access. This area will allow you to investigate different tokenisation methods, such as using Ferrnet tokens or some of the security weaknesses of OAuth 2. * **IPFS (Interplanetary File System)**. This breaks files into chunks and then distributes them around the world and where we can integrate version control on files. Overall, it has advanced in reducing latency, improving resilience, and avoiding censorship. * **Reverse engineering of cryptography code**. There are a number of tools that can be used to reverse engineer cryptographic code, including with GenAI. This specification will analyse the success or otherwise of the reverse engineering of cryptographic code, and the methods that can be applied to obfuscate its reverse engineering. * **Passwordless systems**. This supports MFA using biometrics, NFC, and BLE, and supports FIDO2 using public key encryption.