From f87f69a05cde0a0da2c4721be1a4e540169551a5 Mon Sep 17 00:00:00 2001 From: Bill Buchanan Date: Tue, 17 Feb 2026 08:34:52 +0000 Subject: [PATCH] Fix grammatical error in README.md Corrected the phrase 'setup' to 'set up' for grammatical accuracy. --- z_assessments/coursework/README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/z_assessments/coursework/README.md b/z_assessments/coursework/README.md index 54e31ca..00b1243 100644 --- a/z_assessments/coursework/README.md +++ b/z_assessments/coursework/README.md @@ -23,12 +23,12 @@ You are requested to investigate, build a prototype, and evaluate one of the fol * **Passwordless systems**. This supports MFA using biometrics, NFC, and BLE, and supports FIDO2 using public key encryption. * **Privacy-Preserving Machine Learning**. With this, we can use cryptographic methods to preserve the privacy of our data for machine-learning applications. * **Assessment of AI-generated code**. GenAI can be used to generate cryptographic code for a given specification. This requirement will investigate the success of the code generation of a given specification and assess its success or otherwise, and will involve compiling the code, and then assessing its performance with human-written performance, or could relate to a static analysis of the code. -* * **Side Challenge Analysis of Cryptography**. Cryptographic code - if not designed correctly - can leak information within the execution of code. This specification will setup running code that could be used to assess whether there is information leaked from the execution of the code, such as for bits in the encryption key used. +* **Side Challenge Analysis of Cryptography**. Cryptographic code - if not designed correctly - can leak information within the execution of code. This specification will set up running code that could be used to assess whether there is information leaked from the execution of the code, such as for bits in the encryption key used. There are many different methods involved in each of these areas, so while your literature review might have a relatively wide scope, you might want to focus in on one or more methods for your implementation and evaluation. You may also pick another related area, but this would have to be approved by your tutor. ## Requirement -You should set up a private GitHub repository and share it with the GitHub ID of billbuchanan. Your code and any results should be stored in this repository, and which will be used as evidence for your submitted coursework. +You should set up a private GitHub repository and share it with the GitHub ID of billbuchanan. Your code and any results should be stored in this repository, and which will be used as evidence for your submitted coursework. Once set up, please send Bill the URL of your private GitHub on Teams chat. ## Tasks You should pick one of the areas defined and then: