Subject Descriptions - Subject Information


Calendar: 2017 Postgraduate
Faculty: Faculty of Engineering and Information Sciences
Department: School of Computing and Information Technology


Subject Information
Subject Code MCS9361
Subject Name Cryptography and Secure Applications
Credit Points 6
Pre-Requisites (CSCI204 or CSCI213) plus 6cp of 200-level CSCI subjects
Co-Requisites None.
Restrictions None.
Equivalence None.
Assessment Final exam 60% Assignment 40%
General Subject No.
EFTSL (Non Weighted) 0.125
Non Weighted Student Contribution Amounts
Commonwealth Supported (HECS) Students Only
Pre-1997 Pre-2005 Post-2005 Post-2008 Post-2009 Post-2010
$ 1131  $ 1131  $ 1131  $ 1131  $ 1131  $ 1131 
Weighted Student Contribution Amounts  
Work Experience No
Tutorial Enrolment Information Students should use the SMP OnLine Tutorial System (via SOLS) to enrol in Tutorial/laboratory groups for this subject. Once enrolments are open a link to the subject will appear in Tutorial Enrolments in SOLS.
Availability Not Available in 2017

Subject Description
This subject develops the skills and knowledge necessary to identify and address security problems in a variety of simple communication models. Topics covered include: Classical cryptology, Modern secret key cryptography including block (DES, AES) and stream ciphers (RC4), security properties (authentication, integrity, confidentiality, availability), public key cryptography (knapsacks, RSA, Rabin, Elgamal), digital signatures (RSA, DSS, Elgamal) , hashing (birthday paradox, Merkle-Damgard construction), MACS's, Key management (PKI, certificates, key establishment/exchange/transport, Diffie-Hellman), Identification protocols, Privacy preserving (mix-nets), Secret sharing. Applications studied include some of: email security, SET, E-payment, E-voting, Fair exchange.


Subject Learning Outcomes
On successful completion of this subject, students will be able to:
1. Explain and apply fundamental cryptographic principles and terminology.
2. Classify and distinguish cryptographic algorithms in terms of their cryptographic characteristics and services provided.
3. Select and apply appropriate fundamental cryptographic building blocks, such as encryption, hashing and authentication, based on a critical analysis of an application scenario.
4. Implement cryptographic algorithms in Java or C/C++.
5. Describe and demonstrate the use of some of the mathematics underlying modern public key cryptography.
6. Assess and contrast the security of given scenarios, and justify the need for additional security as appropriate, taking into account the required cryptographic properties and such factors as efficiency.
7. Analyse implementations of cryptographic algorithms.
8. Explain the role of, and illustrate and usage of, cryptography in a range of applications.
9. Discuss the significance of cryptography in modern society.
10. Read and interpret aspects of cryptographic technical documents such as RFC’s and standard’s documents.
11. Present and rewrite material demonstrating competence in the above outcomes.
12. Apply statistical cryptanalysis.


Textbook Information
Cryptography and Network Security: Principles and Practices. 4th edition. William Stallings.
Text book information is available via the UniShop website:



Search Criteria [Click here for help]
Subject Code / Name
Level
Department
Session
Campus
Delivery Method
General Subjects