Cryptography and Security

Subject COMP90043 (2013)

Note: This is an archived Handbook entry from 2013.

Credit Points: 12.50
Level: 9 (Graduate/Postgraduate)
Dates & Locations:

This subject is not offered in 2013.

Time Commitment: Contact Hours: 3 hours per week
Total Time Commitment:

120 hours

Prerequisites:

None

Corequisites:

None

Recommended Background Knowledge:

None

Non Allowed Subjects:

433-645 Software System Security
433-448 Applied Cryptography and Coding

Core Participation Requirements:

For the purposes of considering request for Reasonable Adjustments under the Disability Standards for Education (Cwth 2005), and Student Support and Engagement Policy, academic requirements for this subject are articulated in the Subject Overview, Learning Outcomes, Assessment and Generic Skills sections of this entry.

It is University policy to take all reasonable steps to minimise the impact of disability upon academic study, and reasonable adjustments will be made to enhance a student's participation in the University's programs. Students who feel their disability may impact on meeting the requirements of this subject are encouraged to discuss this matter with a Faculty Student Adviser and Student Equity and Disability Support: http://services.unimelb.edu.au/disability

Contact

Dr Udaya Parampalli

email: udaya@unimelb.edu.au

Subject Overview:

The subject will explore foundational knowledge in the area of cryptography and information security. The overall aim is to gain an understanding of fundamental cryptographic concepts like encryption and signatures and use it to build and analyze security in computers, communications and networks. This subject covers fundamental concepts in information security on the basis of methods of modern cryptography, including encryption, signatures and hash functions.

This subject is an elective subject in the Master of Engineering (Software). It can also be taken as a advanced elective in Master of Information Technology.

Objectives:

On completion of this subject students should be able to:

  • Identify security issues and objectives in computer systems and networks
  • Apply various security mechanisms derived from cryptography to computers and computer networks
  • Explain the workings of fundamental public key and symmetric key cryptographic algorithms like RSA, ElGamal, Diffie-Hellman schemes and stream ciphers
  • Explain the protocols which ensure security in contemporary networked computer systems
  • Describe the interaction between the underlying theory, including cryptography, and working computer security infrastructure
  • Analyze security of network protocols and systems

Assessment:
  • Project work: It involves two components:

Two equally weighted homework assignments done individually with a total of about 1000 words for both the assignments due around Week 4 and Week 8 (20%).

  • A 10-minute presentation given by a group working in pairs due around week 11 (8%) and a 3000-word report about a current security research topic written by a group working in pairs (32%) due in week 12.
  • A 2-hour written examination at the end of the semester (40%).


To pass the subject, students must obtain at least:

50% overall.
10/20 in the homework assignments
20/40 in the group-based work.
20/40 in the end-of-semester written examination

ILOs 1 to 4 are addressed in the examination and the two assignments. ILO 1, 5-6 and generic skills are addressed in the group project work.

Assignment 1 and 2 tests the knowledge of the core modules of the subject topic introduced in lectures. They are generally extensions of tutorial questions. The knowledge earned during the semester is finally tested in 2 hour examination The group work, done in a group of two students, tests research and presentation skills.

Prescribed Texts:

TBA

Breadth Options:

This subject is not available as a breadth subject.

Fees Information: Subject EFTSL, Level, Discipline & Census Date
Generic Skills:

On completion of this subjects students should have:

  • Ability to undertake problem identification, formulation, and solution.
  • Ability to utilise a systems approach to solving complex problems and to design for operational performance
  • Ability to manage information and documentation
  • Capacity for creativity and innovation
  • Ability to communicate effectively, with the engineering team and with the community at large

Related Course(s): Master of Engineering in Distributed Computing
Master of Information Technology
Master of Information Technology
Master of Information Technology
Master of Philosophy - Engineering
Master of Science (Computer Science)
Master of Software Systems Engineering
Ph.D.- Engineering
Related Majors/Minors/Specialisations: B-ENG Software Engineering stream
Computer Science
Master of Engineering (Software)

Download PDF version.