Course Title: Frontiers of Applied Cryptography

Part A: Course Overview

Course Title: Frontiers of Applied Cryptography

Credit Points: 12.00

Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

INTE1127

City Campus

Postgraduate

145H Mathematical & Geospatial Sciences

Face-to-Face

Sem 1 2006,
Sem 2 2006,
Sem 2 2007,
Sem 1 2008,
Sem 1 2009,
Sem 1 2010,
Sem 1 2011,
Sem 1 2012,
Sem 1 2013,
Sem 1 2014,
Sem 1 2015,
Sem 1 2016

INTE1127

City Campus

Postgraduate

171H School of Science

Face-to-Face

Sem 1 2017,
Sem 1 2018,
Sem 1 2019,
Sem 1 2020,
Sem 1 2021,
Sem 1 2022,
Sem 2 2023

INTE2092

City Campus

Undergraduate

145H Mathematical & Geospatial Sciences

Face-to-Face

Sem 1 2006,
Sem 2 2006,
Sem 1 2010,
Sem 1 2011,
Sem 1 2015

INTE2092

City Campus

Undergraduate

171H School of Science

Face-to-Face

Sem 1 2018,
Sem 1 2019,
Sem 1 2020

Course Coordinator: Arathi Arakala / Amy Corman

Course Coordinator Phone: +61 3 9925 2279 / +61 3 9925 6482

Course Coordinator Email: arathi.arakala@rmit.edu.au / amy.corman@rmit.edu.au

Course Coordinator Location: Building 15

Course Coordinator Availability: By appointment, by email


Pre-requisite Courses and Assumed Knowledge and Capabilities

Required Prior Study

You should have satisfactorily completed following course/s before you commence this course.

Alternatively, you may be able to demonstrate the required skills and knowledge before you start this course.

Contact your course coordinator if you think you may be eligible for recognition of prior learning.


Course Description

This course builds on the content presented in INTE1125 Cryptography and Security and introduces a detailed study of contemporary and emerging cryptographic and cryptanalytic techniques and their importance in implementing secure systems. You will study a selection of special topics in cryptography such as: Block ciphers and their cryptanalysis, elliptic curve cryptography, primality testing and factorization, quantum computing and quantum safe cryptography, blockchain and its applications.


Objectives/Learning Outcomes/Capability Development

This course contributes to the program learning outcomes for the following program(s):  

MC159 Master of Cyber Security 

International Orientation and Strategic Thinking 

  • Graduates will have a strategic and practical overview of the issues in information security and assurance. 

Critical Analysis and Problem Solving 

  • Evaluate information security risks across diverse service settings including the Internet and WWW based commerce systems, high bandwidth digital communications and funds transfer services, 
  • Undertake professional careers or postgraduate research in information security or other IT related fields, acquiring the required information needed to identify real world solutions to real world information security problems. 

Communication 

  • Graduates will have the ability to communicate both technical and non-technical material in a range of forms (written, electronic, graphic, oral) and to tailor the style and means of communication to different audiences. 

Ethical Values 

  • Graduates will exhibit an ability to appreciate the ethical considerations that inform judgements and decision making in academic and professional settings. 

For more information on the program learning outcomes for your program, please see the program guide.  


Upon successful completion of this course, you will be able to:  

  1. Critically review new theoretical and practical developments in cryptography and their impact on contemporary information systems.
  2. Recognise and justify  the role of cryptanalysis in the design of secure systems.
  3. Critically analyse technical details of contemporary cryptosystems.
  4. Critically evaluate technical details of potential future cryptosystems.
  5. Solve cryptographic problems applying  a range of theoretical and simulated practical scenarios.
  6. Effectively conveying complex technical details using an array of communication methods such as written text, mathematical equations, diagrams, and innovative visualizations.
  7. Justify  the place of ethics in Information Security, critically reflecting on the moral imperatives of the field. 


Overview of Learning Activities

You will be actively engaged in a range of learning activities such as lectorials, tutorials, practicals, laboratories, seminars, project work, class discussion, individual and group activities. Delivery may be face to face, online or a mix of both. 

You are encouraged to be proactive and self-directed in your learning, asking questions of your lecturer and/or peers and seeking out information as required, especially from the numerous sources available through the RMIT library, and through links and material specific to this course that is available through myRMIT Studies Course


Overview of Learning Resources

RMIT will provide you with resources and tools for learning in this course through myRMIT Studies Course

There are services available to support your learning through the University Library. The Library provides guides on academic referencing and subject specialist help as well as a range of study support services. For further information, please visit the Library page on the RMIT University website and the myRMIT student portal


Overview of Assessment

Assessment Tasks 

Assessment Task 1:Report
Weighting 20%  
This assessment task supports CLOs 1-7  

Assessment Task 2:In-class discipline based practical assessments  
Weighting 50%  
This assessment task supports CLOs 1-5  

Assessment Task 3:Discipline based practical assignments  
Weighting 30%  
This assessment task supports CLOs 1-7 

If you have a long-term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or Equitable Learning Services if you would like to find out more.