Course Title: Cryptography for Cyber Security

Part A: Course Overview

Course Title: Cryptography for Cyber Security

Credit Points: 12.00

Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

INTE1125

City Campus

Postgraduate

145H Mathematical & Geospatial Sciences

Face-to-Face

Sem 1 2006,
Sem 2 2006,
Sem 1 2007,
Sem 2 2007,
Sem 2 2008,
Sem 2 2009,
Sem 2 2010,
Sem 2 2011,
Sem 2 2012,
Sem 2 2014,
Sem 2 2015,
Sem 2 2016

INTE1125

City Campus

Postgraduate

171H School of Science

Face-to-Face

Sem 2 2017,
Sem 2 2018,
Sem 2 2019,
Sem 2 2020,
Sem 2 2021

INTE2035

City Campus

Undergraduate

145H Mathematical & Geospatial Sciences

Face-to-Face

Sem 1 2006,
Sem 2 2006,
Sem 1 2007,
Sem 2 2007,
Sem 2 2008,
Sem 2 2009,
Sem 2 2010,
Sem 2 2011,
Sem 2 2012,
Sem 2 2015,
Sem 2 2016

INTE2035

City Campus

Undergraduate

171H School of Science

Face-to-Face

Sem 2 2017,
Sem 2 2018,
Sem 2 2019,
Sem 2 2020,
Sem 2 2021

Course Coordinator: Dr Arathi Arakala

Course Coordinator Phone: +61 3 9925 2279

Course Coordinator Email: arathi.arakala@rmit.edu.au


Pre-requisite Courses and Assumed Knowledge and Capabilities

The pre-requisites and co-requisites are not hurdles, but are recommended for optimal learner experience.

Pre-requisites: INTE1120 Introduction to Information Security and INTE1122 Case Studies in Information Security
Co-requisite: INTE1124 Coding for Reliable Communications
 


Course Description

This course builds on broad overviews presented in INTE1120 Introduction to Information Security, INTE1122 Case Studies in Information Security and INTE1124 Coding for Reliable Communications. It introduces a more rigorous and in-depth study of cryptography. Classical and modern cryptosystems are used to ensure the secrecy and integrity of data communicated over an insecure channel. Topics covered include perfect secrecy and one-time pads; shift registers and stream ciphers; secret key systems: block ciphers and DES; public key systems: RSA, digital signatures, hash functions and applications.


On completion of this course you should be able to:
• Apply the knowledge and skills obtained to study further concepts in Information Security; and
• Communicate and interpret ideas related to cryptography in Information Security applications in the form of answers to assignments.


Objectives/Learning Outcomes/Capability Development

Course Learning Outcome (CLOs):

This course contributes to the following Course Learning Outcomes:

CLO1: Compare and contrast a range of different traditional and modern cryptosystems from an applied viewpoint.
CLO2: Understand and apply the mathematics behind cryptosystems to achieve information security objectives.
CLO3: Use mathematical tools such as R to implement and test cryptographic algorithms.
CLO4: Explain complex cryptographic concepts in clear, professional English in a range of forms (written, oral, electronic, graphic).
CLO5: Demonstrate ability to choose the right cryptographic primitive for different real-world situations in time constrained circumstances.
CLO6: Demonstrate ability to research beyond the course material and understand current cryptographic security practices and protocols


This course contributes to the following Program Learning Outcomes for MC159 Master of Applied Science (Information Security and Assurance)

Critical Analysis and Problem Solving

In this area graduates will possess the ability to
• Evaluate information security risks across diverse service settings including the Internet and WWW based commerce systems, high bandwidth digital communications and funds transfer services,
• Undertake professional careers or postgraduate research in information security or other IT related fields, acquiring the required information needed to identify real world solutions to real world information security problems.

Communication

• Graduates will have the ability to communicate both technical and non-technical material in a range of forms (written, electronic, graphic, oral) and to tailor the style and means of communication to different audiences.
 


Overview of Learning Activities

A variety of planned student learning experiences will accommodate the learning outcomes envisaged for this course. This includes individual assessments and programming-based learning experiences.

A presentation format will provide an overview of the specified study area and direct you to foundational, analytical, and evidence-based readings about cryptography and its place in Information Security. Facilitated open discussions will draw on your capacity to solve problems, to think critically and analytically and reflect on your own relevant work and life experiences.

Regular in-semester assessments, will provide you with on-going feedback on your progress. An end-of-semester assessment will complement this aspect of your learning.

The assessments will reinforce the material covered in lectures and in your personal study. Your capacity to solve problems and to think critically and analytically will also be addressed through problems presented in lectures and facilitated seminars. You will be expected to understand the plagiarism policy enforced at RMIT.
The final assessment will test your comprehension of the subject material and your ability to apply this understanding to real world problems.

Programming -based tasks will be given to solidify the mathematical concepts learnt in the lecture. Tutorial class allows you to work individually or in groups, with personalised instruction, to master the CLOs.


Overview of Learning Resources

You will be expected to expand on the subject matter provided as pre-recorded videos and lecture notes. This will take the form of accessing various external and internal resources, such as the library and the Internet. References to books, including text and reference books will be provided in class.

You will also given resources to start using a programming language tool to deepen understanding of the mathematics learnt in this course.

The Internet will be the most important source for academic, technical and white papers and you will be required to use this as a learning resource on a regular basis. In addition your classmates and tutor/lecturer are also important learning resources as will be demonstrated in facilitated discussions.

Canvas: This course is supported online using Canvas, which gives access to important announcements, a discussion forum, staff contact details, the teaching schedule, assessment timelines. You are advised to read your student EMS e-mail daily for important announcements. You should also visit the course Canvas site at least once a day where you will find important announcements regarding the course and all key documents.


Overview of Assessment

☒This course has no hurdle requirements.


Assessment Tasks:

Assessment 1: Discipline-based practical individual assessment
Weighting – 50%
This assessment supports CLOs – 1,2,4,5

Assessment 2: R-based practical assessment
Weighting – 30%
This assessment supports CLOs – 2,3,5

Assessment 3: Oral presentation and Reflection
Weighting – 20%
This assessment supports CLOs – 4,6