Course Title: Cryptography and Security

Part A: Course Overview

Course Title: Cryptography and Security

Credit Points: 12.00


Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

INTE1125

City Campus

Postgraduate

145H Mathematical & Geospatial Sciences

Face-to-Face

Sem 1 2006,
Sem 2 2006,
Sem 1 2007,
Sem 2 2007,
Sem 2 2008,
Sem 2 2009,
Sem 2 2010,
Sem 2 2011,
Sem 2 2012,
Sem 2 2015,
Sem 2 2016

INTE2035

City Campus

Undergraduate

145H Mathematical & Geospatial Sciences

Face-to-Face

Sem 1 2006,
Sem 2 2006,
Sem 1 2007,
Sem 2 2007,
Sem 2 2008,
Sem 2 2009,
Sem 2 2010,
Sem 2 2011,
Sem 2 2012,
Sem 2 2015,
Sem 2 2016

Course Coordinator: Dr Arathi Arakala

Course Coordinator Phone: +61 3 9925 2279

Course Coordinator Email: arathi.arakala@rmit.edu.au


Pre-requisite Courses and Assumed Knowledge and Capabilities

Pre-requisites: INTE1120 Introduction to Information Security and INTE1122 Case Studies in Information Security
Co-requisite: INTE1124 Coding for Reliable Communications
 


Course Description

This course builds on broad overviews presented in INTE1120 Introduction to Information Security, INTE1122 Case Studies in Information Security and INTE1124 Coding for Reliable Communications. It introduces a more rigorous and in-depth study of cryptography. Classical and modern cryptosystems are used to ensure the secrecy and integrity of data communicated over an insecure channel. Topics covered include perfect secrecy and one-time pads; shift registers and stream ciphers; secret key systems: block ciphers and DES; public key systems: RSA, digital signatures, hash functions and applications.


On completion of this course you should be able to:
• Apply the knowledge and skills obtained to study further concepts in Information Security; and
• Communicate and interpret ideas related to cryptography in Information Security applications in the form of answers to assignments.


Objectives/Learning Outcomes/Capability Development

This course will enable you to

1. Compare and contrast a range of different cryptosystems from an applied viewpoint.
2. List and elaborate the differences between secret key and public key cryptosystems.
3. Identify the different approaches to quantifying secrecy.
4. Recognize the different modes of operation for block ciphers and their applications.
5. Explain the role of hash functions in Information Security.
6. Discuss the place of ethics in the Information Security Area.


This course contributes to the following Program Learning Outcomes for MC159 Master of Applied Science (Information Security and Assurance)

Critical Analysis and Problem Solving

In this area graduates will possess the ability to
• Evaluate information security risks across diverse service settings including the Internet and WWW based commerce systems, high bandwidth digital communications and funds transfer services,
• Undertake professional careers or postgraduate research in information security or other IT related fields, acquiring the required information needed to identify real world solutions to real world information security problems.

Communication

• Graduates will have the ability to communicate both technical and non-technical material in a range of forms (written, electronic, graphic, oral) and to tailor the style and means of communication to different audiences.
 


Overview of Learning Activities

A variety of planned student learning experiences will accommodate the learning outcomes envisaged for this course. This includes individual and group activities and laboratory-based learning experiences.
A presentation format will provide an overview of the specified study area and direct you to foundational, analytical, and evidence-based readings about cryptography and its place in Information Security. Facilitated open discussions will draw on your capacity to solve problems, to think critically and analytically and reflect on your own relevant work and life experiences.
Individual and group activities, such as in-semester assessments, will provide you with on-going feedback on your progress. An end-of-semester examination will complement this aspect of your learning.

 

In-semester assessments may take the form of homework assignments, supervised class tests and/or computer-based project work.  Presentation of project work may also form part of the assessment. The assessments will reinforce the material covered in lectures and in your personal study. Your capacity to solve problems and to think critically and analytically will also be addressed through problems presented in lectures and facilitated seminars. In-semester assessments will emphasize the role of ethics in the academic arena. You will be expected to understand the plagiarism policy enforced at RMIT.
The final examination will test your comprehension of the subject material and your ability to apply this understanding to real world problems.

 

Face-to-face contact: 2 to 3 hours of lecture/discussion sessions, based on the online lecture material uploaded to Blackboard in the days prior to the session. There will be laboratory sessions of 1 hour duration each, in Weeks 2, 7 and 8 which involve completion of exercises illustrating lecture content. An additional one hour weekly tutorial class allows you to work individually or in groups, with personalised instruction, to master the CLOs.
Independent study: you can expect to spend between 6 to 8 hours per week on independent study and research of the material assigned for the week.


Overview of Learning Resources

You will be expected to expand on the subject matter provided as lecture notes. This will take the form of accessing various external and internal resources, such as the library and the Internet. References to books, including text and reference books will be provided in class.

The Internet will be the most important source for academic, technical and white papers and you will be required to use this as a learning resource on a regular basis. In addition your classmates and tutor/lecturer are also important learning resources as will be demonstrated in facilitated discussions.

Blackboard: This course is supported online using Blackboard, which gives access to important announcements, a discussion forum, staff contact details, the teaching schedule, assessment timelines. You are advised to read your student EMS e-mail daily for important announcements. You should also visit the course Blackboard site at least once a day where you will find important announcements regarding the course and all key documents.
 


Overview of Assessment

☒This course has no hurdle requirements.


Assessment Tasks:

Early Assessment Task (Class test)
Weighting 20%
This assessment task supports CLOs 1, 3 & 6

Assessment Task 2:  (Class test)
Weighting 15%
This assessment task supports CLOs 1, 2 & 4

Assessment Task 3: (Class test)
Weighting 15%
This assessment task supports CLO 5 & 6

Assessment 4: Final Exam
Weighting 50% 
This assessment supports CLOs 1-5

Practice questions with answers and marking criteria are provided for all assessments. Answers to Assessments 1-3 are published on Blackboard. Marked tests are returned to students as feedback as well as solutions posted on Blackboard.