University of Technology Sydney

42000 Cryptography

Warning: The information on this page is indicative. The subject outline for a particular session, location and mode of offering is the authoritative source of all information about the subject for that offering. Required texts, recommended texts and references in particular are likely to change. Students will be provided with a subject outline once they enrol in the subject.

Subject handbook information prior to 2025 is available in the Archives.

UTS: Engineering: Electrical and Data Engineering
Credit points: 6 cp

Subject level:

Postgraduate

Result type: Grade and marks

Requisite(s): 32548 Cybersecurity
Anti-requisite(s): 41900 Cryptography

Recommended studies:

Confident with Linux Command Line tools; basic programming skills, e.g., script and Python; foundation mathematics, e.g., abstract algebra

Description

Cryptographic techniques have been developed to preserve data confidentiality and ensure data integrity. They are indispensable in cybersecurity and are used to ensure, for example, the security of wireless networks, online payment systems, and cryptocurrencies. This subject engages with the principles of cryptography, including symmetric/asymmetric ciphers, cryptographic hash functions, message authentication codes, and digital signatures. This subject also introduces popular applications of cryptography and cryptographic designs in blockchain. Students analyse cryptographic techniques, use popular cryptographic tools, and practice attacks on cryptography.

Subject learning objectives (SLOs)

Upon successful completion of this subject students should be able to:

1. Explain the architectural principles, mathematical theories and key designs of underlying cryptographic algorithms. (D.1)
2. Implement cryptographic techniques and tools to prevent data interception and modification. (D.1)
3. Demonstrate system design principles and programmatic practices that lead to secure software systems. (C.1)
4. Discuss the potential social impact of evolving cryptographic techniques by reviewing recent literature. (B.1)

Course intended learning outcomes (CILOs)

This subject also contributes specifically to the development of the following Course Intended Learning Outcomes (CILOs):

  • Socially Responsible: FEIT graduates identify, engage, and influence stakeholders, and apply expert judgment establishing and managing constraints, conflicts and uncertainties within a hazards and risk framework to define system requirements and interactivity. (B.1)
  • Design Oriented: FEIT graduates apply problem solving, design thinking and decision-making methodologies in new contexts or to novel problems, to explore, test, analyse and synthesise complex ideas, theories or concepts. (C.1)
  • Technically Proficient: FEIT graduates apply theoretical, conceptual, software and physical tools and advanced discipline knowledge to research, evaluate and predict future performance of systems characterised by complexity. (D.1)

Contribution to the development of graduate attributes

Engineers Australia Stage 1 Competencies

This subject contributes to the development of the following Engineers Australia Stage 1 Competencies:

  • 1.2. Conceptual understanding of the mathematics, numerical analysis, statistics, and computer and information sciences which underpin the engineering discipline.
  • 1.3. In-depth understanding of specialist bodies of knowledge within the engineering discipline.
  • 1.4. Discernment of knowledge development and research directions within the engineering discipline.
  • 1.5. Knowledge of engineering design practice and contextual factors impacting the engineering discipline.
  • 2.1. Application of established engineering methods to complex engineering problem solving.
  • 2.2. Fluent application of engineering techniques, tools and resources.

Teaching and learning strategies

The subject will be delivered as a one-hour review and a two-hour laboratory session every week. The learning and lab material are available in Canvas. Students are expected to read the required textbook and study the learning material in their own time before the class.

The timetabled lecture class will review cryptography theories and designs that students have read about and/or watched videos of prior to coming to class. Students will learn the architectural principles, mathematic theories and key designs of underlying cryptographic algorithms. Students will also learn how to securely use cryptographic algorithms. All material covered is assessable, unless explicitly stipulated otherwise.

In the labs, students will individually practice cryptographic algorithms and tools to prevent data interception and modification. The lab tasks include various encryption and decryption methods, hashing algorithms, signing messages, and cryptographic tools. In-class guidance and feedback on labs and reports will be provided by tutors.

Students should form groups for the group implementation project and group research project. Groups should meet up regularly to collaborate, and coordinate efforts on group work in addition to attending scheduled classes. In-class feedback on the group projects will be provided by tutors.

Content (topics)

  1. Security Fundamentals and Classic Encryption
  1. Block Ciphers and Data Encryption Standard
  1. Number Theory and Finite Fields
  1. Advanced Encryption Standard
  1. Block Cipher Operation
  1. Pseudorandom Number Generation and Stream Ciphers
  1. Public Key Cryptography and RSA
  1. Cryptographic Hash Functions
  1. Message Authentication Codes
  1. Digital Signatures
  1. Cryptographic Applications
  1. Blockchain

Assessment

Assessment task 1: Labs

Intent:

To practice cryptographic algorithms and tools.

Objective(s):

This assessment task addresses the following subject learning objectives (SLOs):

1, 2 and 3

This assessment task contributes to the development of the following Course Intended Learning Outcomes (CILOs):

C.1 and D.1

Type: Laboratory/practical
Groupwork: Individual
Weight: 20%
Length:

A lab report is about 5 pages, including screenshots or diagrams as required.

Assessment task 2: Quizzes

Intent:

To consolidate technical knowledge and concepts in cryptography.

Objective(s):

This assessment task addresses the following subject learning objectives (SLOs):

1

This assessment task contributes to the development of the following Course Intended Learning Outcomes (CILOs):

D.1

Type: Quiz/test
Groupwork: Individual
Weight: 10%
Length:

10 Minutes per quiz

Assessment task 3: Implementation project

Intent:

To critically analyse cryptographic problems through hands-on implementation of cryptography concepts, and to practice cryptographic techniques in a collaborative manner.

Objective(s):

This assessment task addresses the following subject learning objectives (SLOs):

1, 2, 3 and 4

This assessment task contributes to the development of the following Course Intended Learning Outcomes (CILOs):

B.1, C.1 and D.1

Type: Project
Groupwork: Group, group and individually assessed
Weight: 30%
Length:

N/A, in-class assessment

Assessment task 4: Research project

Intent:

To research cryptography theories, and to communicate cryptography knowledge to specialists.

Objective(s):

This assessment task addresses the following subject learning objectives (SLOs):

1, 3 and 4

This assessment task contributes to the development of the following Course Intended Learning Outcomes (CILOs):

B.1, C.1 and D.1

Type: Literature review
Groupwork: Group, group and individually assessed
Weight: 40%
Length:

9000 words (approximately 3000 words per group member)

Minimum requirements

In order to pass the subject, a student must achieve an overall mark of 50% or more.

Required texts

William Stalling, Cryptography and Network Security, 7th Edition, Pearson, 2017

Recommended texts

William Stalling, Network Security Essential, 6th Edition, Pearson, 2016
Chuck Easttom, Modern Cryptography: Applied Mathematics for Encryption and Information Security. McGraw-Hill Professional, 2015.

Other resources

  • Students must have a valid login to Canvas and be registered for 42000 on Canvas.
  • Canvas will be used as the major means of communication between the subject coordinator, teaching staff and students.
  • Any change in the schedule will be updated in Canvas.
  • It is the responsibility of the student to check Canvas regularly.
  • Canvas will also be used to provide reference websites and other information.