Cryptography & Communications Security is the design, development, test, implementation and operation of a system or product to provide cryptographic and/or secure communications.
Cryptography and Communications Security roles vary, but all are technical, requiring a high level of mathematical ability. Even for roles which do not include these kinds of skill, there needs to be a good understanding of the fundamentals of cryptography, communications standards and technologies, and other elements of information technology.
There are two strands in this specialism, but a role may combine elements of both – there are few roles as a pure cryptographer.
Cryptography involves developing, testing, and improving cryptographic elements: algorithms, key handling procedures and security protocols. The more common responsibilities in cryptography involve building, maintaining and testing existing security protocols, sometimes in hardware, but more often in software.
Communications Security focuses on implementing and maintaining crypto services as part of a larger systems. If the systems are public facing, particularly through websites, this may involve the management of digital certificates. This may also focus on managing the distribution and retirement of keys, as a crypto custodian. This activity normally proceeds at a steady pace, although in some organisations, this may be a ‘shift’ rota.
With more experience in Cryptography and Communications Security, there may be an exploration of how cryptographic techniques and related cyber security controls could be used to secure the organisation’s products and services across a wide range of application areas. This requires a broad view of the organisation’s business.
Given the significant role in cryptography in most network communications, almost any work in this specialism will need to align with industry or government standards.
Cryptography and Communications involves protecting information, either communicated internally or exchanged with individuals or other organisations, against accidental exposure and malicious attacks.
As a Cryptographer, you may:
With more experience in Cryptography, you may:
In Communications Security, you may:
With more experience in Communications Security, you may:
Job Titles
For Cryptography and Communications roles, titles include:
For more experienced Cryptography and Communications roles, titles include:
Salaries
A Communications Security role might earn between £35,500 and £51,115 a year. The median figure in March 2021 was £43,500.
A Cryptography role might earn between £47,500 and £86,250 a year. The median figure in March 2021 was £62,500.
There is insufficient data to provide either a valid salary range or a median figure for more experienced professionals in Cryptography and Communications.
The salary ranges are based on job vacancy advertisements published online in March 2021. Median salary figures are taken from calculations performed by www.itjobswatch.co.uk.
Each of the 16 specialisms are based on knowledge areas within CyBOK.
More information on CyBOK knowledge areas can be found here.
Here are the knowledge areas associated with Cyber Security Governance & Risk Management
Core knowledge – you will need a very good understanding of these areas
Security aspects of networking and telecommunication protocols, including the security of routing, network security elements and specific cryptographic protocols used for network security.
Security mechanisms relating to larger-scale coordinated distributed systems, including aspects of secure consensus, time, event systems, peer-to-peer systems, clouds, multitenant data centres and distributed ledgers.
For a Cryptographer only:
Core primitives of cryptography as presently practised and emerging algorithms, techniques for analysis of these, and the protocols that use them.
Related knowledge – you will need a solid understanding of these areas
Physical Layer & Telecommunications Security
Security concerns and limitations of the physical layer including aspects of radio frequency encodings and transmission techniques, unintended radiation, and interference.
For a Secure Communications operator:
Core primitives of cryptography as presently practised and emerging algorithms, techniques for analysis of these, and the protocols that use them.
Wider knowledge – these areas will help to provide context for your work
Authentication, Authorisation & Accountability
All aspects of identity management and authentication technologies, and architectures and tools to support authorisation and accountability in both isolated and distributed systems.
Operating Systems & Virtualisation Security
Operating systems protection mechanisms, implementing secure abstraction of hardware, and sharing of resources, including isolation in multiuser systems, secure virtualisation, and security in database systems.
International and national statutory and regulatory requirements, compliance obligations, and security ethics, including data protection and developing doctrines on cyber warfare.
Techniques for protecting personal information, including communications, applications, and inferences from databases and data processing. It also includes other systems supporting online rights touching on censorship and circumvention, covertness, electronic elections, and privacy in payment and identity systems.
Skills
Personal attributes
Specialist skills
CIISec Skills Groups* (additional Skills Groups may also be relevant to particular jobs)
C3 – Secure Development
Principles:
E2 – Secure Operations & Service Delivery
Principles:
I2 – Applied Research (for a small number of roles in this specialism)
Principles:
*Non-Commercial - No Derivatives (BY-NC-ND) license. 2021 Copyright © The Chartered Institute of Information Security. All rights reserved. Chartered Institute of Information Security®, CIISec. Chartered Institute of Information Security®, CIISec®, AfCIIS®, ACIIS®, MCIIS®, FCIIS® and the CIISec graphic logo are trademarks owned by The Chartered Institute of Information Security and may be used only with express permission of CIISec.
Experience
Cryptography roles require very special knowledge and skills which can be acquired only through advanced academic studies or, for a few people, puzzle-solving. It's therefore unlikely that someone could demonstrate transferable skills from another job for such a role.
However, a Communications Security Specialist might draw on a range of experience from previous jobs, including:
Linked Specialisms (when clicking on the route map)
Moving On
From a job in this specialism, you might move into one of these other cyber security specialisms:
You might earn a more senior role in Cryptography and Communications Security, perhaps managing a team of cryptographic /communications security specialists.
With more experience and higher-level qualifications, you might move into cryptographic research.
Our certification framework can be accessed here. This framework allows you to see which certifications may be useful to you, within the different specialisms and at which point of your career.
Entry route information can be found here.
You can also visit the National Cyber Security Centre website at the links below: