Cryptography and Security (COMP90043)
Graduate courseworkPoints: 12.5On Campus (Parkville)
For information about the University’s phased return to campus and in-person activity in Winter and Semester 2, please refer to the on-campus subjects page.
About this subject
Contact information
Semester 2
Please refer to the LMS for up-to-date subject information, including assessment and participation requirements, for subjects being offered in 2020.
Overview
Availability | Semester 2 |
---|---|
Fees | Look up fees |
AIMS
The subject will explore foundational knowledge in the area of cryptography and information security. The overall aim is to gain an understanding of fundamental cryptographic concepts like encryption and signatures and use it to build and analyse security in computers, communications and networks. This subject covers fundamental concepts in information security on the basis of methods of modern cryptography, including encryption, signatures and hash functions.
This subject is an elective subject in the Master of Engineering (Software). It can also be taken as an advanced elective in Master of Information Technology.
INDICATIVE CONTENT
The subject will be made up of three parts:
- Cryptography: the essentials of public and private key cryptography, stream ciphers, digital signatures and cryptographic hash functions
- Access Control: the essential elements of authentication and authorization; and
- Secure Protocols; which are obtained through cryptographic techniques.
A particular emphasis will be placed on real-life protocols such as Secure Socket Layer (SSL) and Kerberos.
Topics drawn from:
- Symmetric key crypto systems
- Public key cryptosystems
- Hash functions
- Authentication
- Secret sharing
- Protocols
- Key Management.
Intended learning outcomes
INTENDED LEARNING OUTCOMES (ILO)
On completion of this subject the student is expected to:
- Identify security issues and objectives in computer systems and networks
- Apply various security mechanisms derived from cryptography to computers and computer networks
- Explain the workings of fundamental public key and symmetric key cryptographic algorithms including RSA, ElGamal, Diffie-Hellman schemes and stream ciphers
- Explain the protocols which ensure security in contemporary networked computer systems
- Describe the interaction between the underlying theory and working computer security infrastructure
- Analyse security of network protocols and systems
Generic skills
On completion of this subject, students should have the following skills:
- Ability to undertake problem identification, formulation, and solution.
- Ability to utilise a systems approach to solving complex problems and to design for operational performance
- Ability to manage information and documentation
- Capacity for creativity and innovation
- Ability to communicate effectively, with the engineering team and with the community at large.
Last updated: 3 November 2022
Eligibility and requirements
Prerequisites
Code | Name | Teaching period | Credit Points |
---|---|---|---|
SWEN20003 | Object Oriented Software Development |
Semester 2 (On Campus - Parkville)
Semester 1 (On Campus - Parkville)
|
12.5 |
COMP90041 | Programming and Software Development |
Semester 1 (On Campus - Parkville)
Semester 2 (On Campus - Parkville)
|
12.5 |
Or
Code | Name | Teaching period | Credit Points |
---|---|---|---|
COMP20003 | Algorithms and Data Structures | Semester 2 (On Campus - Parkville) |
12.5 |
COMP20007 | Design of Algorithms | Semester 1 (On Campus - Parkville) |
12.5 |
COMP90038 | Algorithms and Complexity |
Semester 1 (On Campus - Parkville)
Semester 2 (On Campus - Parkville)
|
12.5 |
Or
Code | Name | Teaching period | Credit Points |
---|---|---|---|
COMP30023 | Computer Systems | Semester 1 (On Campus - Parkville) |
12.5 |
COMP90007 | Internet Technologies |
Semester 2 (On Campus - Parkville)
Semester 1 (On Campus - Parkville)
|
12.5 |
Or Admission to MC-IT Master of Information Technology, 100 or 150 point program in Computing, Cyber Security, Distributed Computing or Artificial Intelligence
Or Entry to Master of Science (Computer Science) or Master of Computer Science
Corequisites
None
Non-allowed subjects
433-645 Software System Security
433-448 Applied Cryptography and Coding
Inherent requirements (core participation requirements)
The University of Melbourne is committed to providing students with reasonable adjustments to assessment and participation under the Disability Standards for Education (2005), and the Assessment and Results Policy (MPF1326). Students are expected to meet the core participation requirements for their course. These can be viewed under Entry and Participation Requirements for the course outlines in the Handbook.
Further details on how to seek academic adjustments can be found on the Student Equity and Disability Support website: http://services.unimelb.edu.au/student-equity/home
Last updated: 3 November 2022
Assessment
Due to the impact of COVID-19, assessment may differ from that published in the Handbook. Students are reminded to check the subject assessment requirements published in the subject outline on the LMS
Description | Timing | Percentage |
---|---|---|
Two equally weighted homework assignments done individually each requiring 25 - 30 hours of work. Intended learning Outcomes (ILO) 1 to 4 are addressed in this assessment, due in week 4 and week 8. The assessment tests the knowledge of the core modules of the subject topic introduced in lectures. They are generally extensions of tutorial questions
| From Week 4 to Week 8 | 15% |
One mid semester test to be held around Week 7
| Week 7 | 10% |
One research report with a in class presentation, about a current security research topic written by a group of maximum three people working in pairs, each member committing approximately 45-50 hours of work. ILOs 1, 5 and 6 and generic skills are addressed in the group project work
| Week 12 | 35% |
One written examination. ILOs 1 to 4 are addressed in the examination
| During the examination period | 40% |
Additional details
Hurdle requirement: To pass the subject, students must obtain at least:
- 50% overall.
- 50% in the homework assignments
- 50% in the group-based work
- 50% in the end-of-semester written examination.
Intended Learning Outcomes (ILOs) 1 to 4 are addressed in the examination and the two assignments. ILOs 1, 5 and 6 and generic skills are addressed in the group project work.
Assignment 1 and 2 tests the knowledge of the core modules of the subject topic introduced in lectures. They are generally extensions of tutorial questions. The knowledge earned during the semester is finally tested in 2 hour examination The group work, done in a group of two students, tests research and presentation skills.
Last updated: 3 November 2022
Dates & times
- Semester 2
Principal coordinator Udaya Parampalli Mode of delivery On Campus (Parkville) Contact hours Maximum of 48 hours per semester. Total time commitment 200 hours Teaching period 3 August 2020 to 1 November 2020 Last self-enrol date 14 August 2020 Census date 21 September 2020 Last date to withdraw without fail 16 October 2020 Assessment period ends 27 November 2020 Semester 2 contact information
Time commitment details
200 hours
Last updated: 3 November 2022
Further information
- Texts
- Subject notes
LEARNING AND TEACHING METHODS
Each week there will be student centred activities planned within two lectures and a workshop. In workshops, tutorial questions illustrating the main concepts taught in the lectures will be discussed.
INDICATIVE KEY LEARNING RESOURCES
Students will have access to lecture notes and lecture slides. The subject LMS site also contains links to recommended textbook and resources on security and cryptography.
CAREERS / INDUSTRY LINKS
The concepts of security, trust and privacy are very much essential in a range of disciplines in computing and software engineering. This knowledge and skills learned in the subject also forms a basis of many professional careers such as practicing engineers, consultants and Information Technology specialists. Guest lectures by experts from Industry on specific topics from network security and cryptography will be organized.
- Related Handbook entries
This subject contributes to the following:
Type Name Course Master of Science (Computer Science) Course Master of Data Science Course Ph.D.- Engineering Course Doctor of Philosophy - Engineering Course Master of Philosophy - Engineering Specialisation (formal) Computing Specialisation (formal) Distributed Computing Specialisation (formal) Software Major Computer Science - Available through the Community Access Program
About the Community Access Program (CAP)
This subject is available through the Community Access Program (also called Single Subject Studies) which allows you to enrol in single subjects offered by the University of Melbourne, without the commitment required to complete a whole degree.
Please note Single Subject Studies via Community Access Program is not available to student visa holders or applicants
Entry requirements including prerequisites may apply. Please refer to the CAP applications page for further information.
Additional information for this subject
Subject coordinator approval required
- Available to Study Abroad and/or Study Exchange Students
Last updated: 3 November 2022