BTEC Level 5 Unit 30 Applied Cryptography in the Cloud (F/618/4899) Assessment Brief 2026

University Pearson Qualifications
Subject Unit 30 Applied Cryptography in the Cloud (F/618/4899)

Unit 30 Applied Cryptography in the Cloud Assessment Brief 2026

Qualification Pearson BTEC Levels 4 and 5 Higher Nationals in Computing
Unit Number 30
Unit Title Applied Cryptography in the Cloud
Unit code F/618/4899
Unit type Unit level 5
Unit level 5
Credit value 15

Introduction

Almost every interaction we make with an electronic device will involve cryptography in some form. Cryptography is an indispensable tool for protecting information in computer systems. Applied cryptography for cloud services uses encryption techniques that protects data used, shared and stored in the cloud. Cryptography underpins many aspects of security and is a crucial component in protecting the confidentiality and integrity of information. Given the considerable information on individuals and organisations identified in the cloud, concerns are often raised regarding the safety of the cloud environment. Dangers of uploading data into this new environment requires cryptographers and cryptanalysts to protect the cloud environment using a variety of technologies, processes and forms of encryption. The complexity with how cloud computing manages data secrecy and information security is another reason people avoid the cloud. As a result, despite the hype surrounding cloud computing, some users remain reluctant to deploy their personal information or deploy commercial enterprises into the cloud. Understanding cloud security issues, the application of crypto algorithms and to ensure data is secured are vital to its continued functionality, longevity and sustainability. In addition, students are expected to understand the differences between the roles and responsibilities of a cryptographer and cryptanalyst.

This unit introduces students to the applied principles of cryptography and looks at its practical applications and methods, many of which are fundamental to secure data in the cloud. Students are expected to analyse fundamental symmetric, asymmetric and hashing encryption methods, and investigate examples of these in practice. Students are expected to demonstrate the use of cryptography and cryptanalysis tools, methods and their applications. Students are also expected to appraise the inner workings of cryptographic protocols and principles, including transport layer security (TLS) and blockchain, and evaluate how they can be used by organisations to enhance security when considering a move to a cloud environment. Among the topics included in this unit are: the mathematical algorithms used in cryptography, the mechanisms by which cryptographic and cryptanalysis work, hashing and salting, cloud-hosted public key infrastructure (PKI), benefits of encryption techniques, quantum cryptography, secure multi-party computation, security risks and issues with public key encryption, practical applications of cryptography and Cryptography as a Service (CaaS).

On successful completion of this unit students will be able to analyse functions of stream ciphers and block ciphers, produce code implementing ciphers, analyse methods such as KEM, DEM and PKE’s to secure data in a cloud environment. Students will design a security case and implement it demonstrating the use of cryptographic and cryptoanalysis tools for improving security in a virtual private network, for an organisation considering a move to the cloud. As a result, they will develop skills such as critical thinking, analysis, and interpretation, which are crucial for gaining employment and developing academic competence.

Learning Outcomes

By the end of this unit students will be able to:

LO1 Analyse encryption ciphers and algorithms as methods to secure data in a cloud environment

LO2 Discuss security risks and issues related to public key encryption in practice

LO3 Demonstrate the use of cryptographic and cryptoanalysis tools for improving security in a virtual private network

LO4 Evaluate advanced encryption protocols and their application for an organisation considering a move to the cloud.

Essential Content

LO1 Analyse encryption ciphers and algorithms as methods to secure data in the cloud environment

Symmetric Encryption:

Use of ciphers for e.g. secure messages, cloud storage.

Symmetric to include Transposition Cipher, Substitution Cipher, Lorenz Cipher.

Feistel Cipher including Data Encryption Standard (DES).

Triple Data Encryption (3DES).

Rijndael Cipher e.g. Advanced Encryption standard (AES).

Stream cipher (e.g. Rivest Cipher 4).

Block Cipher Mode (e.g. Blowfish, Twofish, Rivest Cipher 5).

Message Authentication Code (MAC).

One-time pad.

Asymmetric Encryption:

Use of algorithms for e.g. authenticity using digital signatures, website security, withdraw or transfer bitcoin.

Asymmetric to include digital signature algorithm (DSA), public key encryption algorithms such as Rivest Shamir Adleman (RSA) algorithm (e.g. RSA cryptosystem), Diffie-Hellman, El Gamal, Elliptic Curve Cryptography (ECC), ECSTR for Efficient and Compact Subgroup Trace (XTR).

Hashing:

Use of hashing for e.g. sharing documents, database encryption, safeguarding passwords.

Hashing to include message digest, secure hashing algorithm. Galois/Counter mode (GCM), MD5, Secure Hash Algorithm 1 (SHA-1), Secure Hash Algorithm 2 (SHA-2), RIPE Message Digest (RIPEMD), homomorphic encryption.

LO2 Discuss security risks and issues related to public key encryption in practice

Attacks on public key schemes:

Exploring most common attacks on public key encryption schemes using a range of examples e.g. Wiener’s attack on RSA, Lattice-based attacks on RSA, partial key exposure attacks, Meet-in-the-Middle (MITM) attack, Distributed Denial of Service (DDoS) bots, and fault analysis.

Different definitions of security:

Examining security of encryption, security of actual encryption algorithms, semantically secure systems, security of signatures.

Analysing provable security, explaining random oracles, security of encryption algorithms and encryption algorithms with random oracles.

Explaining provable security without random oracles, using examples such as strong RSA assumption, provable security-absolute assurance, signature and encryption schemes.

Analysing encryption techniques to include Key Encapsulation Mechanisms (KEMs), Data Encapsulation Mechanisms (DEMs), and hybrid public key encryption (PKE), for security.

LO3 Demonstrate the use of cryptographic and cryptoanalysis tools for improving security in a virtual private network

Cryptographic tools, methods and applications:

Secret Key to include secret key distribution, key exchange and signature schemes, Diffie-Hellman key exchange, digital signatures and authenticated key agreement.

Public Key to include one-way functions, obtaining authentic public keys, confidentiality and integrity, digital certificates and Public Key Infrastructure (PKI), analysing examples of PKI.

Hash functions to include designing hash functions, using hash functions in signature schemes, analysing hash functions.

Cryptographer role, responsibilities and continual professional development.

Cryptanalysis tools, methods and applications:

Attacking methods to include brute force, chosen plaintext, SQL injection, dictionary and rainbow tables.

Solving ciphers to include linear (i.e. Fast data Encipherment Algorithm); non-linear (i.e. linear masking), differential (i.e. mixed integer linear programming), block (i.e. simplified Tiny Encryption Algorithm).

Frustrating statistical cryptanalysis, including confusion and diffusion.

Impact of high-performance computing and quantum cryptography.

Web-based tools e.g. CrypTool, EverCrack, AlphaPeeler.

Cryptanalyst role, responsibilities and continual professional development.

Security case and system response:

Security case to include design of a system at network layer, crypto to meet defined security objectives, key management plan, evidence of system with required security controls, format e.g. Common Criteria Protection Protocol.

System response to include security objectives and common threats, assumptions, functional requirements and security controls e.g. technical, implementation, policy or process.

LO4 Evaluate advanced encryption protocols and their application for an organisation considering a move to the cloud

Assessing advanced encryption protocols and their applications:

Exploring access structures for secret sharing schemes for cloud security, general secret sharing, Reed-Solomon codes, Shamir sharing scheme.

Applying RSA key generation, securID and strategy in popular cloud environments.

Analysing Zero-Knowledge proofs, Sigma protocols, electronic voting systems.

Examining secure multi-party computation, the two-party case, multi-party cases including, honest-but-curious adversaries and malicious adversaries.

Evaluating different applications of cryptography and hybrid cryptosystems to include Cryptography as a Service (CaaS), digital cash, Bitcoin, Transport Layer Security (TLS) protocol, including configuration such as ciphersuites, blockchain, blockcloud and ZKsnarks.

Influencing factors affecting choice of cryptographic techniques for an organisation’s move to the cloud:

Cost e.g. implementing encryption, network support, resourcing.

General considerations including suitability for business needs, infrastructure, scaling, reliability, support, storage capacity, content delivery, protection, user access and training.

Learning Outcomes and Assessment Criteria

Pass Merit Distinction
LO1 Analyse encryption ciphers and algorithms as methods to secure data in a cloud environment  

D1 Justify improvements introduced by stream ciphers compared to block ciphers for public and private key encryption.

P1 Analyse the functions of stream cipher and block cipher, using a range of appropriate examples in practice.

P2 Produce code that implements mathematical ciphers and algorithms to encrypt and decrypt data.

M1 Critically analyse the operational differences between stream cipher and block cipher, using a range of appropriate examples in practice.
LO2 Discuss security risks and issues related to public key encryption in practice  

 

D2 Provide justified recommendations, synthesising different definitions of provable security, suitable for securing public key systems.

P3 Discuss risks and issues in security of public key encryption schemes, using a range of appropriate examples in practice. M2 Analyse key benefits of encryption techniques including KEMs, DEMs and PKEs and the importance of securing public key systems.
LO3 Demonstrate the use of cryptographic and cryptoanalysis tools for improving security in a virtual private network  

D3 Provide a critical review of the implemented system in terms of how it meets defined security objectives and make suggestions for improvement.

P4 Illustrate, using a diagram, encryption and decryption process functions in a PKI environment for a business scenario.

P5 Design a security case, representative of a business scenario, to solve a security threat.

M3 Assess security risks and challenges of using cloud-hosted PKI in a private network.

M4 Implement the system designed, in response to a security case, using cryptographic and cryptanalysis methods or tools.

Pass Merit Distinction
LO4 Evaluate advanced encryption protocols and their application for an organisation considering a move to the cloud  

 

 

D4 Justify the use of different cryptographic applications, for an organisation, that will inform their move to the cloud.

P6 Evaluate the key benefits of using a range of cryptography and hybrid cryptosystems to improve cloud security.

P7 Assess common factors influencing an organisations choice of cloud solution(s) to improve security.

M5 Critically analyse the use of selected cryptography and hybrid cryptosystems in protecting data within an organisation.

Recommended Resources

Textbooks

BALACHANDRAN, M.J. (2020) Cloud Engineering and Architecture Design Patterns. Chennai: Notion Press.

CARLET, C. (2020) Boolean Functions for Cryptography and Coding Theory. Cambridge: Cambridge University Press.

CHAUBEY, N.K., PRAJAPATI, B.B. (2020) Quantum Cryptography and the Future of Cyber Security. USA: IGI Global.

GOYAL, D., BALAMURUGAN, S., PENG, S.L., VERMA, O.P. (2020) Design and Analysis of Security Protocol for Communication. USA: John Wiley & Sons.

MENEZES, A.J., VAN OORSHOT, P.C., VANSTONE, S.A. (2018) Handbook of Applied Cryptography. 2nd edn. Boca Raton: CRC Press, Taylor & Francis.

NIELSON, S.J., MONSON, C.K. (2019) Practical Cryptography in Python: Learning Correct Cryptography by Example. USA: Apress.

PACHGHARE, V.K. (2019). Cryptography and Information Security. 3rd edn. Delhi: PHI Learning.

SCHMEH, K. (2006) Cryptography and Public Key Infrastructure on the Internet. UK: Wiley.

STALLINGS, W. (2013) Cryptography and Network Security: Principles and Practice. UK: Pearson.

STINSON, D.R., PETERSON, M.B. (2018) Cryptography: Theory and Practice. 4th edn. Boca Raton: CRC Press, Taylor & Francis.

SWAMMY, S., THOMPSON, R., LOH, M. (2019) Crypto Uncovered: The Evolution of Bitcoin and the Crypto Currency Marketplace. (eBook) Palgrave Macmillan.

Journals

International Association for Cryptologic Research, Online

International Journal of Applied Cryptography, Online

International Journal of Network Security, Online

Journal of Emerging Trends in Computing and Information Sciences, Online

Web

ncsc.gov.uk

National Cyber Security Centre

(General Reference)

Links

This unit links to the following related units:

Unit 5: Security

Unit 31: Forensics

Unit 32: Information Security Management.

Are You Searching Answer of this Question? Request British Writers to Write a plagiarism Free Copy for You.

Get Help By Expert

If you are facing difficulty in completing your BTEC Level 5 Unit 30 Applied Cryptography in the Cloud (F/618/4899) assignment, then you can also choose BTEC Assignment like many other students. This unit becomes confusing for students when they have to understand encryption methods, cloud security concepts, and apply them in real scenarios. Our experts provide do my btec assignment service according to your course requirements. For trust, you can also check our computing assignments to get better clarity on structure and content. So, you can place your order today and get a customised, plagiarism-free assignment solution which is written only for you.

Answer
Get AI-Free Assignment Help Instantly

Facing Issues with Assignments? Talk to Our Experts Now! Download Our App Now!

WhatsApp Icon