Course Title: Frontiers of Applied Cryptography
Part A: Course Overview
Course Title: Frontiers of Applied Cryptography
Credit Points: 12.00
Terms
Course Code |
Campus |
Career |
School |
Learning Mode |
Teaching Period(s) |
INTE1127 |
City Campus |
Postgraduate |
145H Mathematical & Geospatial Sciences |
Face-to-Face |
Sem 1 2006, Sem 2 2006, Sem 2 2007, Sem 1 2008, Sem 1 2009, Sem 1 2010, Sem 1 2011, Sem 1 2012, Sem 1 2013, Sem 1 2014, Sem 1 2015, Sem 1 2016 |
INTE1127 |
City Campus |
Postgraduate |
171H School of Science |
Face-to-Face |
Sem 1 2017, Sem 1 2018, Sem 1 2019, Sem 1 2020, Sem 1 2021, Sem 1 2022, Sem 2 2023 |
INTE2092 |
City Campus |
Undergraduate |
145H Mathematical & Geospatial Sciences |
Face-to-Face |
Sem 1 2006, Sem 2 2006, Sem 1 2010, Sem 1 2011, Sem 1 2015 |
INTE2092 |
City Campus |
Undergraduate |
171H School of Science |
Face-to-Face |
Sem 1 2018, Sem 1 2019, Sem 1 2020 |
Course Coordinator: Arathi Arakala / Amy Corman
Course Coordinator Phone: +61 3 9925 2279 / +61 3 9925 6482
Course Coordinator Email: arathi.arakala@rmit.edu.au / amy.corman@rmit.edu.au
Course Coordinator Location: Building 15
Course Coordinator Availability: By appointment, by email
Pre-requisite Courses and Assumed Knowledge and Capabilities
Required Prior Study
You should have satisfactorily completed following course/s before you commence this course.
Alternatively, you may be able to demonstrate the required skills and knowledge before you start this course.
Contact your course coordinator if you think you may be eligible for recognition of prior learning.
Course Description
This course builds on the content presented in INTE1125 Cryptography and Security and introduces a detailed study of contemporary and emerging cryptographic and cryptanalytic techniques and their importance in implementing secure systems. You will study a selection of special topics in cryptography such as: Block ciphers and their cryptanalysis, elliptic curve cryptography, primality testing and factorization, quantum computing and quantum safe cryptography, blockchain and its applications.
Objectives/Learning Outcomes/Capability Development
This course contributes to the program learning outcomes for the following program(s):
MC159 Master of Cyber Security
International Orientation and Strategic Thinking
- Graduates will have a strategic and practical overview of the issues in information security and assurance.
Critical Analysis and Problem Solving
- Evaluate information security risks across diverse service settings including the Internet and WWW based commerce systems, high bandwidth digital communications and funds transfer services,
- Undertake professional careers or postgraduate research in information security or other IT related fields, acquiring the required information needed to identify real world solutions to real world information security problems.
Communication
- Graduates will have the ability to communicate both technical and non-technical material in a range of forms (written, electronic, graphic, oral) and to tailor the style and means of communication to different audiences.
Ethical Values
- Graduates will exhibit an ability to appreciate the ethical considerations that inform judgements and decision making in academic and professional settings.
For more information on the program learning outcomes for your program, please see the program guide.
Upon successful completion of this course, you will be able to:
- Critically review new theoretical and practical developments in cryptography and their impact on contemporary information systems.
- Recognise and justify the role of cryptanalysis in the design of secure systems.
- Critically analyse technical details of contemporary cryptosystems.
- Critically evaluate technical details of potential future cryptosystems.
- Solve cryptographic problems applying a range of theoretical and simulated practical scenarios.
- Effectively conveying complex technical details using an array of communication methods such as written text, mathematical equations, diagrams, and innovative visualizations.
- Justify the place of ethics in Information Security, critically reflecting on the moral imperatives of the field.
Overview of Learning Activities
You will be actively engaged in a range of learning activities such as lectorials, tutorials, practicals, laboratories, seminars, project work, class discussion, individual and group activities. Delivery may be face to face, online or a mix of both.
You are encouraged to be proactive and self-directed in your learning, asking questions of your lecturer and/or peers and seeking out information as required, especially from the numerous sources available through the RMIT library, and through links and material specific to this course that is available through myRMIT Studies Course.
Overview of Learning Resources
RMIT will provide you with resources and tools for learning in this course through myRMIT Studies Course.
There are services available to support your learning through the University Library. The Library provides guides on academic referencing and subject specialist help as well as a range of study support services. For further information, please visit the Library page on the RMIT University website and the myRMIT student portal.
Overview of Assessment
Assessment Tasks
Assessment Task 1:Report
Weighting 20%
This assessment task supports CLOs 1-7
Assessment Task 2:In-class discipline based practical assessments
Weighting 50%
This assessment task supports CLOs 1-5
Assessment Task 3:Discipline based practical assignments
Weighting 30%
This assessment task supports CLOs 1-7
If you have a long-term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or Equitable Learning Services if you would like to find out more.