Handbook home
Cryptography and Security (COMP90043)
Graduate courseworkPoints: 12.5Dual-Delivery (Parkville)
From 2023 most subjects will be taught on campus only with flexible options limited to a select number of postgraduate programs and individual subjects.
To learn more, visit COVID-19 course and subject delivery.
About this subject
- Overview
- Eligibility and requirements
- Assessment
- Dates and times
- Further information
- Timetable(opens in new window)
Contact information
Semester 2
Overview
Availability | Semester 2 - Dual-Delivery |
---|---|
Fees | Look up fees |
AIMS
The subject will explore foundational knowledge in the area of cryptography and information security. The overall aim is to gain an understanding of fundamental cryptographic concepts like encryption and signatures and use it to build and analyse security in computers, communications and networks. This subject covers fundamental concepts in information security on the basis of methods of modern cryptography, including encryption, signatures and hash functions.
This subject is an elective subject in the Master of Engineering (Software). It can also be taken as an advanced elective in Master of Information Technology.
INDICATIVE CONTENT
The subject will be made up of three parts:
- Cryptography: the essentials of public and private key cryptography, stream ciphers, digital signatures and cryptographic hash functions
- Access Control: the essential elements of authentication and authorization; and
- Secure Protocols; which are obtained through cryptographic techniques.
A particular emphasis will be placed on real-life protocols such as Secure Socket Layer (SSL) and Kerberos.
Topics drawn from:
- Symmetric key crypto systems
- Public key cryptosystems
- Hash functions
- Authentication
- Secret sharing
- Protocols
- Key Management.
Intended learning outcomes
INTENDED LEARNING OUTCOMES (ILO)
On completion of this subject the student is expected to:
- Identify security issues and objectives in computer systems and networks
- Apply various security mechanisms derived from cryptography to computers and computer networks
- Explain the workings of fundamental public key and symmetric key cryptographic algorithms including RSA, ElGamal, Diffie-Hellman schemes and stream ciphers
- Explain the protocols which ensure security in contemporary networked computer systems
- Describe the interaction between the underlying theory and working computer security infrastructure
- Analyse security of network protocols and systems
Generic skills
On completion of this subject, students should have the following skills:
- Ability to undertake problem identification, formulation, and solution.
- Ability to utilise a systems approach to solving complex problems and to design for operational performance
- Ability to manage information and documentation
- Capacity for creativity and innovation
- Ability to communicate effectively, with the engineering team and with the community at large.
Last updated: 31 January 2024
Eligibility and requirements
Prerequisites
Students must meet one of the following prerequisite options:
Option 1
One of
Code | Name | Teaching period | Credit Points |
---|---|---|---|
COMP90041 | Programming and Software Development |
Semester 1 (Dual-Delivery - Parkville)
Semester 2 (Dual-Delivery - Parkville)
|
12.5 |
SWEN20003 | Object Oriented Software Development |
Semester 1 (Dual-Delivery - Parkville)
Semester 2 (Dual-Delivery - Parkville)
|
12.5 |
AND
One of
Code | Name | Teaching period | Credit Points |
---|---|---|---|
COMP20003 | Algorithms and Data Structures | Semester 2 (Dual-Delivery - Parkville) |
12.5 |
COMP20007 | Design of Algorithms | Semester 1 (Dual-Delivery - Parkville) |
12.5 |
COMP90038 | Algorithms and Complexity |
Semester 1 (Dual-Delivery - Parkville)
Semester 2 (Dual-Delivery - Parkville)
|
12.5 |
AND
One of
Code | Name | Teaching period | Credit Points |
---|---|---|---|
COMP30023 | Computer Systems | Semester 1 (Dual-Delivery - Parkville) |
12.5 |
COMP90007 | Internet Technologies |
Semester 2 (Dual-Delivery - Parkville)
Semester 1 (Dual-Delivery - Parkville)
|
12.5 |
Option 2
Admission into one of the following: 100pt Program course entry point in the MC-IT Master of Information Technology, 150pt Program course entry point in the MC-IT Master of Information Technology
AND
Selection of one of the following:
- Computing specialisation (formal) in the MC-IT Master of Information Technology
- Cyber Security specialisation (formal) in the MC-IT Master of Information Technology
- Distributed Computing specialisation (formal) in the MC-IT Master of Information Technology
- Artificial Intelligence specialisation (formal) in the MC-IT Master of Information Technology
Option 3
Admission into one of the following: MC-SCICMP Master of Science (Computer Science), MC-CS Master of Computer Science
Corequisites
None
Non-allowed subjects
433-645 Software System Security 433-448 Applied Cryptography and Coding
Inherent requirements (core participation requirements)
The University of Melbourne is committed to providing students with reasonable adjustments to assessment and participation under the Disability Standards for Education (2005), and the Assessment and Results Policy (MPF1326). Students are expected to meet the core participation requirements for their course. These can be viewed under Entry and Participation Requirements for the course outlines in the Handbook.
Further details on how to seek academic adjustments can be found on the Student Equity and Disability Support website: http://services.unimelb.edu.au/student-equity/home
Last updated: 31 January 2024
Assessment
Description | Timing | Percentage |
---|---|---|
Two equally weighted homework assignments done individually each requiring 25 - 30 hours of work. Intended learning Outcomes (ILO) 1 to 4 are addressed in this assessment, due in week 4 and week 8. The assessment tests the knowledge of the core modules of the subject topic introduced in lectures. They are generally extensions of tutorial questions
| From Week 4 to Week 8 | 15% |
One mid semester test to be held around Week 7
| Week 7 | 10% |
One research report with a in class presentation, about a current security research topic written by a group of maximum three people working in pairs, each member committing approximately 45-50 hours of work. ILOs 1, 5 and 6 and generic skills are addressed in the group project work
| Week 12 | 35% |
One written examination. ILOs 1 to 4 are addressed in the examination
| During the examination period | 40% |
Additional details
Hurdle requirement: To pass the subject, students must obtain at least:
- 50% overall.
- 50% in the homework assignments
- 50% in the group-based work
- 50% in the end-of-semester written examination.
Intended Learning Outcomes (ILOs) 1 to 4 are addressed in the examination and the two assignments. ILOs 1, 5 and 6 and generic skills are addressed in the group project work.
Assignment 1 and 2 tests the knowledge of the core modules of the subject topic introduced in lectures. They are generally extensions of tutorial questions. The knowledge earned during the semester is finally tested in 2 hour examination The group work, done in a group of two students, tests research and presentation skills.
Last updated: 31 January 2024
Dates & times
- Semester 2
Principal coordinator Udaya Parampalli Mode of delivery Dual-Delivery (Parkville) Contact hours Maximum of 48 hours per semester. Total time commitment 200 hours Teaching period 25 July 2022 to 23 October 2022 Last self-enrol date 5 August 2022 Census date 31 August 2022 Last date to withdraw without fail 23 September 2022 Assessment period ends 18 November 2022 Semester 2 contact information
Time commitment details
200 hours
Last updated: 31 January 2024
Further information
- Texts
Prescribed texts
TBA
- Subject notes
LEARNING AND TEACHING METHODS
Each week there will be student centred activities planned within two lectures and a workshop. In workshops, tutorial questions illustrating the main concepts taught in the lectures will be discussed.
INDICATIVE KEY LEARNING RESOURCES
Students will have access to lecture notes and lecture slides. The subject LMS site also contains links to recommended textbook and resources on security and cryptography.
CAREERS / INDUSTRY LINKS
The concepts of security, trust and privacy are very much essential in a range of disciplines in computing and software engineering. This knowledge and skills learned in the subject also forms a basis of many professional careers such as practicing engineers, consultants and Information Technology specialists. Guest lectures by experts from Industry on specific topics from network security and cryptography will be organized.
- Related Handbook entries
This subject contributes to the following:
Type Name Course Master of Data Science Course Ph.D.- Engineering Course Doctor of Philosophy - Engineering Course Master of Science (Computer Science) Course Master of Philosophy - Engineering Specialisation (formal) Computing Specialisation (formal) Distributed Computing Specialisation (formal) Software Major Computer Science - Available through the Community Access Program
About the Community Access Program (CAP)
This subject is available through the Community Access Program (also called Single Subject Studies) which allows you to enrol in single subjects offered by the University of Melbourne, without the commitment required to complete a whole degree.
Entry requirements including prerequisites may apply. Please refer to the CAP applications page for further information.
Additional information for this subject
Subject coordinator approval required
- Available to Study Abroad and/or Study Exchange Students
This subject is available to students studying at the University from eligible overseas institutions on exchange and study abroad. Students are required to satisfy any listed requirements, such as pre- and co-requisites, for enrolment in the subject.
Last updated: 31 January 2024