Module Catalogues, Xi'an Jiaotong-Liverpool University

Module Code: EEE416
Module Title: Coding and Cryptography
Module Level: Level 4
Module Credits: 5.00
Semester: SEM2
Originating Department: Electrical and Electronic Engineering
Pre-requisites: N/A

 Aims To introduce the coding theorem and various types of channel coding for communication system;To provide the knowledge of fundamental cryptography, and techniques for encryption.
 Learning outcomes A. Identify and explain the importance of source coding and channel coding in a communication link; B. Elaborate on coding theorem and its significance; C. Design source coding schemes for data compression and multimedia compression; D. Design channel codes with specific error detection and correction capability; E. Identify and explain how cryptography plays an important role in a communication system; F. Design symmetric key and asymmetric key cryptosystems for data encryption and decryption.
 Method of teaching and learning This module will be delivered through a combination of formal lectures and tutorials.
 Syllabus 1 IntroductionInformation theory and entropy;Noises and channels;Introduction to cryptography.2 Source coding and Channel codingSource coding theorem;Huffman coding;Noisy channel;Noisy coding theorem;Channel coding.3 Coding TheoremCoding and Hamming distance;Nearest neighbour decoding and most likelihood decoding;Error-detection and error-correction.4-6 Linear CodesGenerator (matrix);Incomplete and complete decoding;Parity-check matrix;Hamming codes;Golay codes; 7-8 Cyclic CodesPolynomial and matrix of cyclic codes;Encoding and decoding;Hamming cyclic codes;BCH codes;Reed-Solomon codes. 9-10 Convolutional CodesGenerator and check matrix;Coding and decoding;Viterbi decoding algorithm;Convolutional codes in channels.11 Turbo CodesRecursive System Convolution;Encoding and decoding;Performance evaluation.Fountain Codes 12 Introduction to Cryptography13 Safeguard and AttackCryptographic Systems and Protocols;Encryption — Symmetric Techniques;Encryption — Asymmetric Techniques;Bit Security and Data Integrity.14 RevisionSummary of the module
Delivery Hours
 Lectures Seminars Tutorials Lab/Prcaticals Fieldwork / Placement Other(Private study) Total Hours/Semester 26 24 100 150

## Assessment

 Sequence Method % of Final Mark 1 Assignment 1 10.00 2 Assignment 2 10.00 3 Take-Home Open Book Exam (3Hours) 80.00
 Module Catalogue generated from SITS CUT-OFF: 6/2/2020 12:32:11 AM