41900 Cryptography
Warning: The information on this page is indicative. The subject outline for a
particular session, location and mode of offering is the authoritative source
of all information about the subject for that offering. Required texts, recommended texts and references in particular are likely to change. Students will be provided with a subject outline once they enrol in the subject.
Subject handbook information prior to 2025 is available in the Archives.
Credit points: 6 cp
Subject level:
Undergraduate
Result type: Grade and marksRequisite(s): 48730 Cybersecurity OR 65325 Digital Trace and Identity
Recommended studies: Foundation Mathematics or equivalent
Description
Cryptographic techniques have been developed to preserve data confidentiality and ensure data integrity. They are indispensable in cybersecurity and are used to ensure, for example, the security of wireless networks, online payment systems, and cryptocurrencies. This subject engages with the principles of cryptography, including symmetric/asymmetric ciphers, cryptographic hash functions, message authentication codes, and digital signatures. This subject also introduces popular applications of cryptography and cryptographic designs in blockchain. Students analyse cryptographic techniques, use popular cryptographic tools, and practice attacks on cryptography
Subject learning objectives (SLOs)
Upon successful completion of this subject students should be able to:
1. | Explain the architectural principles, mathematical theories and key designs of underlying cryptographic algorithms. (D.1) |
---|---|
2. | Implement cryptographic techniques and tools to prevent data interception and modification. (D.1) |
3. | Demonstrate system design principles and programmatic practices that lead to secure software systems. (C.1) |
4. | Work as an effective member of development teams. (E.1) |
Course intended learning outcomes (CILOs)
This subject also contributes specifically to the development of the following Course Intended Learning Outcomes (CILOs):
- Design Oriented: FEIT graduates apply problem solving, design and decision-making methodologies to develop components, systems and processes to meet specified requirements. (C.1)
- Technically Proficient: FEIT graduates apply abstraction, mathematics and discipline fundamentals, software, tools and techniques to evaluate, implement and operate systems. (D.1)
- Collaborative and Communicative: FEIT graduates work as an effective member or leader of diverse teams, communicating effectively and operating within cross-disciplinary and cross-cultural contexts in the workplace. (E.1)
Contribution to the development of graduate attributes
Engineers Australia Stage 1 Competencies
This subject contributes to the development of the following Engineers Australia Stage 1 Competencies:
- 1.2. Conceptual understanding of the mathematics, numerical analysis, statistics, and computer and information sciences which underpin the engineering discipline.
- 1.3. In-depth understanding of specialist bodies of knowledge within the engineering discipline.
- 2.2. Fluent application of engineering techniques, tools and resources.
- 3.2. Effective oral and written communication in professional and lay domains.
Teaching and learning strategies
The subject will be delivered as a one-hour review and a two-hour laboratory session every week. The learning and lab material are available in the UTS Learning Management System. Students are expected to read the required textbook and study the learning material in their own time before the class.
The timetabled lecture class will review cryptography theories and designs that students have read about and/or watched videos of prior to coming to class. Students will learn the architectural principles, mathematic theories and key designs of underlying cryptographic algorithms. Students will also learn how to securely use cryptographic algorithms. All material covered is assessable, unless explicitly stipulated otherwise.
In the labs, students will individually practice cryptographic algorithms and tools to prevent data interception and modification. The lab tasks include various encryption and decryption methods, hashing algorithms, signing messages, and cryptographic tools. In-class guidance and feedback on labs and reports will be provided by tutors.
Students should form groups for the group implementation projects. Groups should meet up regularly to collaborate, and coordinate efforts on group work in addition to attending scheduled classes. In-class feedback on the group projects will be provided by tutors.
Content (topics)
- Security Fundamentals and Classic Encryption
- Block Ciphers and Data Encryption Standard
- Number Theory and Finite Fields
- Advanced Encryption Standard
- Block Cipher Operation
- Pseudorandom Number Generation and Stream Ciphers
- Public Key Cryptography and RSA
- Cryptographic Hash Functions
- Message Authentication Codes
- Digital Signatures
- Cryptographic Applications
- Blockchain
Assessment
Assessment task 1: Labs
Intent: | To practice cryptographic algorithms and tools. |
---|---|
Objective(s): | This assessment task addresses the following subject learning objectives (SLOs): 1, 2 and 3 This assessment task contributes to the development of the following Course Intended Learning Outcomes (CILOs): C.1 and D.1 |
Type: | Laboratory/practical |
Groupwork: | Individual |
Weight: | 20% |
Length: | A lab report is about 5 pages, including screenshots or diagrams as required. |
Assessment task 2: Quizzes
Intent: | The Quizzes are designed to motivate continuous learning, analysis and the recall of the technical knowledge relevant to the subject concepts. |
---|---|
Objective(s): | This assessment task addresses the following subject learning objectives (SLOs): 1 This assessment task contributes to the development of the following Course Intended Learning Outcomes (CILOs): D.1 |
Type: | Quiz/test |
Groupwork: | Individual |
Weight: | 30% |
Length: | 30 minutes in duration each |
Assessment task 3: Implementation project
Intent: | To critically analyse cryptographic problems through hands-on implementation of cryptography concepts, and to practice cryptographic techniques in a collaborative manner. |
---|---|
Objective(s): | This assessment task addresses the following subject learning objectives (SLOs): 1, 2, 3 and 4 This assessment task contributes to the development of the following Course Intended Learning Outcomes (CILOs): C.1, D.1 and E.1 |
Type: | Project |
Groupwork: | Group, group and individually assessed |
Weight: | 50% |
Minimum requirements
In order to pass the subject, a student must achieve an overall mark of 50% or more.
Required texts
William Stalling, Cryptography and Network Security, 7th Edition, Pearson, 2017
Recommended texts
William Stalling, Network Security Essential, 6th Edition, Pearson, 2016
Chuck Easttom, Modern Cryptography: Applied Mathematics for Encryption and Information Security. McGraw Hill Professional, 2015.
Other resources
- Students must have a valid login to Canvas and be registered for 41900 on Canvas.
- Canvas will be used as the major means of communication between subject coordinator, teaching staff and students.
- Any change in the schedule will be updated in Canvas.
- It is the responsibility of the student to check Canvas regularly.
- Canvas will also be used to provide reference websites and other information.