Units
Cryptology and Protocols
Unit code: INN355
Contact hours: 3 per week
Credit points: 12
Information about fees and unit costs
Cryptographic techniques are widely used to implement computer and network security. As an IT security professional you may be required either to evaluate or implement information systems using cryptographic algorithms and protocols. This elective unit covers the main cryptographic technical concepts including encryption, digital signatures and cryptographic protocols.
Availability
| Semester | Available |
|---|---|
| 2013 Semester 2 | Yes |
Sample subject outline - Semester 2 2013
Note: Subject outlines often change before the semester begins. Below is a sample outline.
Rationale
Cryptographic techniques are widely used to implement computer and network security. As an IT security professional you may be required either to evaluate or implement information systems using cryptographic algorithms and protocols. This elective unit covers the main cryptographic technical concepts including encryption, digital signatures and cryptographic protocols. We assume that you are comfortable with basic mathematical concepts but we will introduce all the specialist mathematical tools required.
Aims
This unit aims to help you:
(a) understand the fundamental algorithms and protocols of cryptology, with emphasis on the major applications of cryptology; and
(b) develop your analytical thought processes, enabling you to apply mathematical and cryptological techniques to solve real world problems in a hands-on manner.
Objectives
On completion of this unit you should be able to:
- Apply basic concepts of cryptology, including modern symmetric and asymmetric ciphers, digital signatures, mathematics related to cryptology, and basic cryptographic protocols (GC1);
- Demonstrate critical and analytical thinking in the application of cryptologic fundamentals to information and network security problems (GC2);
- Keep up-to-date in the research, skills and knowledge relevant to information security and cryptology by performing research in this area (GC4);
- Communicate effectively in an Information Technology context (GC3);
- Work independently on technical problems (GC5).
Key: Graduate Capabilities
GC1 - Knowledge and Skills
GC2 - Critical and Creative Thinking
GC3 - Communication
CG4 - Lifelong Learning
GC5 - Independence and Collaboration
GC6 - Social and Ethical Responsibility
GC7 - Leadership and Change
Content
This unit introduces you to the background and fundamental concepts of cryptology, in the areas of both cryptography and cryptanalysis. Topics include elementary number theory, classical ciphers, symmetric and asymmetric ciphers, information and complexity theory, prime numbers and factorisation, discrete logarithms, digital signatures and cryptographic protocols.
Note that this unit assumes that you satisfy the following "level of competency". If you do not satisfy this "level of competency" you may need to do extra work to achieve a satisfactory level.
Level of competency explored:
You should be familiar with the following concepts (with relevant applications) at an introductory level: discrete probability; logic, sets and functions; number theory; matrices; Boolean algebra.
Approaches to Teaching and Learning
The content of the unit is delivered through lectures, tutorials, software tools, and the QUT Blackboard site. Lectures cover theoretical aspects of the unit, and tutorial sessions provide an opportunity to solve exercises, based on the current week's lecture. Tutorial staff will be available to provide assistance.
The unit emphasises a 'hands-on' approach to learning through the illustration of new concepts through worked examples and demonstrations. You will use software tools in your completion of the tutorial sheets and assignment questions. You are encouraged to discuss the difficulties you are having with the assignment with your student peers or tutor.
Concurrent Teaching
This unit is being taught concurrently with an undergraduate offering of the same subject. University policy permits postgraduate and undergraduate students to attend the same lectures. Separate tutorial/practical sessions will be provided for postgraduates students where student numbers allow. As a postgraduate student you will be required to complete separate assessment tasks that reflect the advanced knowledge and understanding of the subject. For this unit that means your assessment will be of increased complexity but not necessarily of greater length or effort. The assessment will require you to show additional evidence of critical evaluation.
Assessment
You will submit weekly exercises and an extended assignment - details will be announced during the lectures. You are expected to work on the assignments independently, but you can ask for assistance from the teaching staff.You can obtain feedback on your progress throughout the unit through the following mechanisms:
- ask the teaching staff for advice and assistance during lectures and tutorials
- your major assignment will be returned to you before the end of semester with comments on your progress
- private consultation with teaching staff
Assessment name:
Quiz/Test
Description:
Weekly tutorial exercises related to the lecture material
Relates to objectives:
1, 2, 4, 5
Weight:
20%
Internal or external:
Internal
Group or individual:
Individual
Due date:
Weekly
Assessment name:
Problem Solving Task
Description:
Practical cryptanalysis and investigatory task involving software tools and independent research.
Relates to objectives:
1 to 5
Weight:
30%
Internal or external:
External
Group or individual:
Individual
Due date:
Week 7
Assessment name:
Examination (Theory)
Description:
Final written exam
Relates to objectives:
1, 2, 4, 5
Weight:
50%
Internal or external:
Internal
Group or individual:
Individual
Due date:
Exam Period
Academic Honesty
QUT is committed to maintaining high academic standards to protect the value of its qualifications. To assist you in assuring the academic integrity of your assessment you are encouraged to make use of the support materials and services available to help you consider and check your assessment items. Important information about the university's approach to academic integrity of assessment is on your unit Blackboard site.
A breach of academic integrity is regarded as Student Misconduct and can lead to the imposition of penalties.
Resource materials
Textbook (optional):
Smart, Nigel (2002) Cryptography, An Introduction. UK: McGraw Hill
ISBN 0077099877
Extra reading (optional):
Menezes, Alfred J., van Oorschot Paul C. and Vanstone Scott A, Handbook of Applied Cryptography
http://www.cacr.math.uwaterloo.ca/hac/
Reference(s):
Blackboard unit site
No extraordinary charges or costs are associated with the requirements for this unit.
Risk assessment statement
There is minimal health and safety risk in this unit. It is your responsibility to familiarise yourself with the Health and Safety policies and procedures applicable within campus areas.
Disclaimer - Offer of some units is subject to viability, and information in these Unit Outlines is subject to change prior to commencement of semester.
Last modified: 22-May-2012