Cryptography and Security
Subject COMP90043 (2012)
Note: This is an archived Handbook entry from 2012.
Credit Points: | 12.50 | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Level: | 9 (Graduate/Postgraduate) | ||||||||||||
Dates & Locations: | This subject has the following teaching availabilities in 2012: Semester 2, Parkville - Taught on campus.
Timetable can be viewed here. For information about these dates, click here. | ||||||||||||
Time Commitment: | Contact Hours: 36 hours, made up of 24 one-hour lectures (two per week) and 12 one-hour workshops (one per week) Total Time Commitment: 120 hours | ||||||||||||
Prerequisites: | None | ||||||||||||
Corequisites: | None | ||||||||||||
Recommended Background Knowledge: | None | ||||||||||||
Non Allowed Subjects: | 433-645 Software System Security | ||||||||||||
Core Participation Requirements: |
For the purposes of considering request for Reasonable Adjustments under the Disability Standards for Education (Cwth 2005), and Students Experiencing Academic Disadvantage Policy, academic requirements for this subject are articulated in the Subject Description, Subject Objectives, Generic Skills and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the disability support scheme can be found at the Disability Liaison Unit website: http://www.services.unimelb.edu.au/disability/ |
Subject Overview: |
This subject covers fundamental concepts in information security on the basis of methods from modern cryptography, including encryption, signatures and hash functions. The subject will be made up of three parts: (1) cryptography, covering the essentials of public and private key cryptography, stream ciphers, digital signatures and cryptographic hash functions; (2) access control, covering essential elements of authentication and authorization; and (3) secure protocols which are obtained through cryptographic techniques. A particular emphasis will be placed on real-life protocols such as Secure Socket Layer (SSL) and Kerberos. |
---|---|
Objectives: |
On completion of this subject students should be able to:
|
Assessment: |
|
Prescribed Texts: | TBA |
Breadth Options: | This subject is not available as a breadth subject. |
Fees Information: | Subject EFTSL, Level, Discipline & Census Date |
Generic Skills: |
On completion of this subjects students should have:
|
Related Course(s): |
Bachelor of Computer Science (Honours) Master of Engineering in Distributed Computing Master of Science (Computer Science) Master of Software Systems Engineering |
Related Majors/Minors/Specialisations: |
B-ENG Software Engineering stream Computer Science Master of Engineering (Software) |
Download PDF version.