Section: Home

Units

QUT Course Structure
Advanced Cryptology

Unit code: INN652
Contact hours:
Credit points: 12
Information about fees and unit costs

Cryptology forms a core discipline in the study of information security. This unit concentrates on the latest developments in cryptology. This is a specialised unit that prepares postgraduate students for research in cryptology. The aim of the unit is to explore and understand recent developments in the theory and practice of cryptology. The unit provides fundamental knowledge for students seeking to undertake postgraduate research or work in the area of information security, especially involving cryptology.


Availability
Semester Available
2013 Semester 1 Yes

Sample subject outline - Semester 1 2013

Note: Subject outlines often change before the semester begins. Below is a sample outline.

Rationale

Cryptology forms a core discipline in the study of information security. This unit concentrates on the latest developments in cryptology. This is a specialised unit that prepares postgraduate students for research in cryptology.

Aims

The aim of the unit is to explore and understand recent developments in the theory and practice of cryptology. The unit provides fundamental knowledge for students seeking to undertake postgraduate research or work in the area of information security, especially involving cryptology.

Objectives

On successful completion of this unit, you should:


  1. understand a variety of current topics and research issues in modern cryptology;

  2. perform a critical analysis of cryptographic algorithms and protocols;

  3. critically assess research papers in modern cryptology;

Content

The unit provides a solid basis for understanding current topics in cryptology.
The topics covered in this unit may include:


  • number-theoretic primitives, including the discrete logarithm problem and elliptic curve groups;

  • symmetric ciphers, including design of block ciphers and stream ciphers, Boolean functions and differential cryptanalysis;

  • cryptographic protocols, including key establishment protocols in various architectures and zero knowledge protocols;

  • public-key cryptography, including formal security definitions and security proofs.

Approaches to Teaching and Learning

This unit runs as a 3 hour combined lecture and disucission each week. You are expected to attend lecture sessions and read the nominated reading material each week. This may include expository and research papers in the area of the lecture. During discussion sessions you will discuss content from previous lectures and related topics. Normally discussion questions will be assigned each week for discussion in the following week's lecture.

Assessment

You will be expected to undertake a number of assessments related to the learning outcomes of this unit (see below).

  • Tutors and lecturers are available during consultation times or via email to answer questions from students.

  • Once completed and marked, students are provided with feedback to their assignments via sample solutions and individual comments on individual assignment scripts.

Assessment name: Presentation
Description: Student topic report and presentation:
Individual topic on topic chosen by student
Relates to objectives: 1-3
Weight: 35%
Internal or external: Internal
Group or individual: Individual
Due date: Week 10

Assessment name: Quiz/Test
Description: Exercises covering lectures throughout the semester
Relates to objectives: 1-3
Weight: 15%
Internal or external: Internal
Group or individual: Individual
Due date: Weekly

Assessment name: Examination (Theory)
Description: Written final theory examination
Relates to objectives: 1,2
Weight: 50%
Internal or external: Internal
Group or individual: Individual
Due date: Exam Period

Academic Honesty

QUT is committed to maintaining high academic standards to protect the value of its qualifications. To assist you in assuring the academic integrity of your assessment you are encouraged to make use of the support materials and services available to help you consider and check your assessment items. Important information about the university's approach to academic integrity of assessment is on your unit Blackboard site.

A breach of academic integrity is regarded as Student Misconduct and can lead to the imposition of penalties.

Resource materials

Recommended Textbook(s):
Reference(s):
Author: Smart, N.
Title: Cryptography: An Introduction
Publisher: McGraw Hill
Year: 2003
Note: Free on-line version available at http://www.cs.bris.ac.uk/~nigel/Crypto_Book/

Author: Menezes, A.J., Oorschot, P.C. & Vanstone, S.
Title: Handbook of Applied Cryptography
Year: 1997
Publisher: CRC Press
Note: Free on-line version available at http://www.cacr.math.uwaterloo.ca/hac/

Author: Stinson, D.R.
Title: Cryptography: Theory and Practice,
Year: 2005
Publisher: CRC Press

top
Risk assessment statement

There are no out of the ordinary risks associated with this unit.

Disclaimer - Offer of some units is subject to viability, and information in these Unit Outlines is subject to change prior to commencement of semester.

Disclaimer - Offer of some units is subject to viability, and information in these Unit Outlines is subject to change prior to commencement of semester.

Last modified: 24-Oct-2012