Course Title: Frontiers of Applied Cryptography

Part A: Course Overview

Course Title: Frontiers of Applied Cryptography

Credit Points: 12.00

Important Information:

To participate in any RMIT course in-person activities or assessment, you will need to comply with RMIT vaccination requirements which are applicable during the duration of the course. This RMIT requirement includes being vaccinated against COVID-19 or holding a valid medical exemption. 

Please read this RMIT Enrolment Procedure as it has important information regarding COVID vaccination and your study at RMIT: https://policies.rmit.edu.au/document/view.php?id=209

Please read the Student website for additional requirements of in-person attendance: https://www.rmit.edu.au/covid/coming-to-campus 

 

Please check your Canvas course shell closer to when the course starts to see if this course requires mandatory in-person attendance. The delivery method of the course might have to change quickly in response to changes in the local state/national directive regarding in-person course attendance. 

 


Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

INTE1127

City Campus

Postgraduate

145H Mathematical & Geospatial Sciences

Face-to-Face

Sem 1 2006,
Sem 2 2006,
Sem 2 2007,
Sem 1 2008,
Sem 1 2009,
Sem 1 2010,
Sem 1 2011,
Sem 1 2012,
Sem 1 2013,
Sem 1 2014,
Sem 1 2015,
Sem 1 2016

INTE1127

City Campus

Postgraduate

171H School of Science

Face-to-Face

Sem 1 2017,
Sem 1 2018,
Sem 1 2019,
Sem 1 2020,
Sem 1 2021,
Sem 1 2022

INTE2092

City Campus

Undergraduate

145H Mathematical & Geospatial Sciences

Face-to-Face

Sem 1 2006,
Sem 2 2006,
Sem 1 2010,
Sem 1 2011,
Sem 1 2015

INTE2092

City Campus

Undergraduate

171H School of Science

Face-to-Face

Sem 1 2018,
Sem 1 2019,
Sem 1 2020

Course Coordinator: Joanne Hall & Amy Corman

Course Coordinator Phone: +61 3 9925 2511 & NA

Course Coordinator Email: joanne.hall@rmit.edu.au & amy.corman@rmit.edu.au

Course Coordinator Availability: By appointment, by email


Pre-requisite Courses and Assumed Knowledge and Capabilities

Pre-requisites: INTE1124 Coding for Reliable Communications and INTE1125 Cryptography and Security.


Course Description

This course builds on the content presented in INTE1125 Cryptography and Security and introduces a detailed study of contemporary and emerging cryptographic and cryptanalytic techniques and their importance in implementing secure systems. You will study a selection of special topics in cryptography such as: Block ciphers and their cryptanalysis, elliptic curve cryptography, primality testing and factorization, quantum computing and quantum safe cryptography, blockchain and its applications. You will learn to 

  • apply knowledge and skills as a foundation for further study of Information Security concepts and
  • communicate and interpret ideas related to advanced cryptography in Information Security applications in the form of answers to assignments. 


Objectives/Learning Outcomes/Capability Development

Course Learning Outcomes (CLOs)

Objectives/Learning Outcomes/Capability Development

On completion of this course you should be able to: 

  1. Discuss and explain new theoretical and practical developments in cryptography and their impact on contemporary information systems.
  2. Identify and discuss the role of cryptanalysis in the design of secure systems.
  3. Describe and analyse technical details of contemporary cryptosystems.
  4. Describe and analyse technical details of potential future cryptosystems.
  5. Solve problems cryptographic problems in a range of theoretical and simulated practical scenarios.
  6. Communicate technical details using text, equations, diagrams and visualisations.
  7. Argue the place of ethics in Information Security.. 


This course contributes to the following Program Learning Outcomes for MC159 Master of Cyber Security

International Orientation and Strategic Thinking

  • Graduates will have a strategic and practical overview of the issues in information security and assurance.

Critical Analysis and Problem Solving

  • Evaluate information security risks across diverse service settings including the Internet and WWW based commerce systems, high bandwidth digital communications and funds transfer services,
  • Undertake professional careers or postgraduate research in information security or other IT related fields, acquiring the required information needed to identify real world solutions to real world information security problems.

Communication

  • Graduates will have the ability to communicate both technical and non-technical material in a range of forms (written, electronic, graphic, oral) and to tailor the style and means of communication to different audiences.

Ethical Values

  • Graduates will exhibit an ability to appreciate the ethical considerations that inform judgments and decision making in academic and professional settings.


Overview of Learning Activities

A variety of planned student learning experiences will accommodate the learning outcomes envisaged for this course. This includes individual and group activities, including theoretical, computational and sociallearning experiences. 

 
A presentation format will provide an overview of the specified study area and direct you to foundational, analytical, and evidence-based readings about cryptography and its place in Information Security. Facilitated open discussions will draw on your capacity to solve problems, to think critically and analytically and reflect on your own relevant work and life experiences. 
Individual and group activities, such as in-semester assessments, will provide you with on-going feedback on your progress. In-semester assessments may take the form of literature review, class tests and/or computer-based project work.  Presentation of project work may also form part of the assessment. The assessments will reinforce the material covered in lectures and in your personal study. Your capacity to solve problems and to think critically and analytically will also be addressed through problems presented in lectures and facilitated seminars. In-semester assessments will emphasize the role of ethics in the academic arena. You will be expected to understand the academic integrity policy of RMIT. 
The assessment tasks will test your comprehension of the subject material, your ability to apply your understanding to real world problems and communicate solutions. 


Overview of Learning Resources

You will be expected to expand on the subject matter provided as lecture notes. This will take the form of accessing various external and internal resources, such as the library and the Internet. Lists of suggested reference Materials will be provided.

The Internet will be the most important source for academic, technical and white papers and you will be required to use this as a learning resource on a regular basis. In addition your classmates and tutor/lecturer are also important learning resources as will be demonstrated in facilitated discussions. 

Canvas: This course is supported online using Canvas, which gives access to important announcements, a discussion forum, staff contact details, the teaching schedule, assessment timelines. You are advised to read your student e-mail daily for important announcements. You should also visit the course Canvas site at least once a day where you will find important announcements regarding the course and all key documents. 


Overview of Assessment

☒This course has no hurdle requirements.

Assessment Tasks

Assessment Task 1: Report

Weighting: 20% 

This assessment task supports CLOs 1-7 
 

Assessment Task 2: In-class discipline based practical assessments 

Weighting: 50% 

This assessment task supports CLOs 1-5 
 

Assessment Task 3: Discipline based practical assignments 

Weighting: 30% 

This assessment task supports CLOs 1-7