Course Title: Cryptography for Cyber Security

Part A: Course Overview

Course Title: Cryptography for Cyber Security

Credit Points: 12.00

Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

INTE2655

City Campus

Postgraduate

171H School of Science

Face-to-Face

Sem 1 2024

Course Coordinator: Dr Arathi Arakala

Course Coordinator Phone: +61 3 9925 2279

Course Coordinator Email: arathi.arakala@rmit.edu.au


Pre-requisite Courses and Assumed Knowledge and Capabilities

Required Prior Study

You should have satisfactorily completed following course/s before you commence this course.

Alternatively, you may be able to demonstrate the required skills and knowledge before you start this course.

Contact your course coordinator if you think you may be eligible for recognition of prior learning.

Required Concurrent Study

You should undertake following course/s at the same time as this course as it contains areas of knowledge and skills which are implemented together in practice.

Alternatively, you may be able to demonstrate the required skills and knowledge before you start this course.

Contact your course coordinator if you think you may be eligible for recognition of prior learning.


Course Description

This course builds on broad overviews presented in INTE1120 Introduction to Information Security, INTE1122 Case Studies in Information Security and INTE2656 Coding for Cyber Communication. It introduces a more rigorous and in-depth study of cryptography. Classical and modern cryptosystems are used to ensure the secrecy and integrity of data communicated over an insecure channel. Topics covered include perfect secrecy and one-time pads; shift registers and stream ciphers; secret key systems: block ciphers and DES; public key systems: RSA, digital signatures, hash functions and applications.

On completion of this course you should be able to:

  • Apply the knowledge and skills obtained to study further concepts in Information Security; and
  • Communicate and interpret ideas related to cryptography in Information Security applications in the form of answers to assignments.


Objectives/Learning Outcomes/Capability Development

This course contributes to the following Program Learning Outcomes for MC159 Master of Applied Science (Information Security and Assurance)

Critical Analysis and Problem Solving

In this area graduates will possess the ability to:

  • Evaluate information security risks across diverse service settings including the Internet and WWW based commerce systems, high bandwidth digital communications and funds transfer services,
  • Undertake professional careers or postgraduate research in information security or other IT related fields, acquiring the required information needed to identify real world solutions to real world information security problems.

Communication

  • Graduates will have the ability to communicate both technical and non-technical material in a range of forms (written, electronic, graphic, oral) and to tailor the style and means of communication to different audiences.


This course contributes to the following Course Learning Outcomes:

  1. Compare and contrast a range of different traditional and modern cryptosystems from an applied viewpoint.
  2. Understand and apply the mathematics behind cryptosystems to achieve information security objectives.
  3. Use mathematical tools such as R to implement and test cryptographic algorithms.
  4. Explain complex cryptographic concepts in clear, professional English in a range of forms (written, oral, electronic, graphic).
  5. Demonstrate ability to choose the right cryptographic primitive for different real-world situations in time constrained circumstances.
  6. Demonstrate ability to research beyond the course material and understand current cryptographic security practices and protocols


Overview of Learning Activities

You will be actively engaged in a range of learning activities such as lectorials, tutorials, practicals, laboratories, seminars, project work, class discussion, individual and group activities. Delivery may be face to face, online or a mix of both.

You are encouraged to be proactive and self-directed in your learning, asking questions of your lecturer and/or peers and seeking out information as required, especially from the numerous sources available through the RMIT library, and through links and material specific to this course that is available through myRMIT Studies Course.


Overview of Learning Resources

RMIT will provide you with resources and tools for learning in this course through myRMIT Studies Course.

There are services available to support your learning through the University Library. The Library provides guides on academic referencing and subject specialist help as well as a range of study support services. For further information, please visit the Library page on the RMIT University website and the myRMIT student portal.


Overview of Assessment

Assessment Tasks

Assessment Task 1: Discipline-based practical individual assessment
Weighting 50%
This assessment supports CLOs 1, 2, 4 & 5

Assessment Task 2: R-based practical assessment
Weighting 30%
This assessment supports CLOs 2, 3 & 5

Assessment Task 3: Oral presentation and Reflection
Weighting 20%
This assessment supports CLOs 4 & 6

If you have a long-term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or Equitable Learning Services if you would like to find out more.