成人大片

MATHS 4026 - Cryptography Honours

North Terrace Campus - Semester 2 - 2024

Cryptography is a vital aspect of cybersecurity. This course introduces modern cryptographic techniques in the context of information security in the workplace. It provides a sound understanding of the different types of cryptosystems available, the practical issues of applying cryptographic methods and key issues in the management of information security. Topics covered are introduction to cryptography: encryption, decryption, attacks; symmetric encryption: stream and block ciphers, AES, block cipher modes; hash functions; message authentication; public key cryptography; data integrity; digital signature schemes; authentication; cryptographic protocols; key management; applications: credit card transactions, wireless LAN, mobile telecommunications.

  • General Course Information
    Course Details
    Course Code MATHS 4026
    Course Cryptography Honours
    Coordinating Unit Mathematical Sciences
    Term Semester 2
    Level Undergraduate
    Location/s North Terrace Campus
    Units 3
    Contact Up to 5 hours per week
    Available for Study Abroad and Exchange Y
    Prerequisites MATHS 1004 or MATHS 1008 or MATHS 1011 or MATHS 1013
    Incompatible MATHS 3026
    Restrictions Honours students only
    Assessment On-going assessment, exam
    Course Staff

    Course Coordinator: Dr Susan Barwick

     
    Course Timetable

    The full timetable of all activities for this course can be accessed from .

  • Learning Outcomes
    Course Learning Outcomes
    1. Understand that different types of cryptosystems are needed for different security needs.
    2. Understand the practical issues associated with using cryptography..
    3. Identify key issues relating to managing security of information
    4. An awareness that cryptography is just one part of information security in the workplace.
    5. How to think about the adversary in the context of cryptography.
    6. Look at existing toolkits, understand their core functionality and know how to use them.
    7. Understand why key management is an essential process which underpins the security of any cryptographic scheme.
    8. Develop the tools to implement an application specific key management process.
    9. Understand why no cryptographic mechanism should be implemented before consulting the relevant standard.
    University Graduate Attributes

    This course will provide students with an opportunity to develop the Graduate Attribute(s) specified below:

    University Graduate Attribute Course Learning Outcome(s)

    Attribute 1: Deep discipline knowledge and intellectual breadth

    Graduates have comprehensive knowledge and understanding of their subject area, the ability to engage with different traditions of thought, and the ability to apply their knowledge in practice including in multi-disciplinary or multi-professional contexts.

    all

    Attribute 2: Creative and critical thinking, and problem solving

    Graduates are effective problems-solvers, able to apply critical, creative and evidence-based thinking to conceive innovative responses to future challenges.

    2,6,8

    Attribute 3: Teamwork and communication skills

    Graduates convey ideas and information effectively to a range of audiences for a variety of purposes and contribute in a positive and collaborative manner to achieving common goals.

    1,3,4,5,8

    Attribute 4: Professionalism and leadership readiness

    Graduates engage in professional behaviour and have the potential to be entrepreneurial and take leadership roles in their chosen occupations or careers and communities.

    3,5,7

    Attribute 7: Digital capabilities

    Graduates are well prepared for living, learning and working in a digital society.

    all

    Attribute 8: Self-awareness and emotional intelligence

    Graduates are self-aware and reflective; they are flexible and resilient and have the capacity to accept and give constructive feedback; they act with integrity and take responsibility for their actions.

    1,2,3
  • Learning Resources
    Required Resources
    Access to the internet.
    Recommended Resources
    Keith M. Martin. Everyday Cryptography, Second Edition, Oxford University Press, 2017.
    Online Learning
    This course uses MyUni exclusively for providing electronic resources,
    such as lecture notes, assignment papers, and sample solutions. 
    Students should make appropriate use of these resources.  Link to MyUni
    login page: https://myuni.adelaide.edu.au/webapps/login/
  • Learning & Teaching Activities
    Learning & Teaching Modes

    The course will be taught as a series of topics, and managed via MyUni. Each topic will involve a series of short video lectures, followed by quizzes to test understanding of the material, and provide students with immediate feedback.

    Fortnightly homework assignments help students strengthen their understanding of the theory and their skills in applying it, and allow them to gauge their progress.

    Weekly workshops provide opportunities to explore the theory in group discussions, and exercises to practice applying the theory.

    Weekly seminars run by the lecturer are an opportunity to engage further with the topic in an active face-2-face setting.

    Students are expected to engage with all material on MyUni.

    Interaction with the lecturer and discussion of any difficulties is strongly encouraged.


    Workload

    The information below is provided as a guide to assist students in engaging appropriately with the course requirements.

    Activity Quantity Workload Hours
    Lecture Topics  16 78
     Workshops 12 30
    Online Quizzes 12
    Assignments 5 30
    Total 150
    Learning Activities Summary
    Cryptography is a vital aspect of cybersecurity. This course introduces modern cryptographic techniques in the context of information security in the workplace. It provides a sound understanding of the different types of cryptosystems available, the practical issues of applying cryptographic methods and key issues in the management of information security.

    The course considers the fundamental principles of cryptography, stressing the core information that a practitioner of cryptography needs to know. It does not focus on the mathematical details of current technology used in modern cryptography. The emphasis is on why cryptography is important, how it can be used, and issues relating to its implementation. Students will gain an understanding of issues relating to data security in the real world.

    The course does not assumed any prior knowledge of cryptography, and only assumes a limited mathematical background. There is no computer programming in this course.

    The topics covered in this course are:
    1. Introduction
    2. Historical cryptosystems
    3. Binary numbers
    4. Symmetric encryption (stream ciphers and block ciphers)
    5. Number theory (modular arithmetic and prime numbers)
    6. Public key cryptography (RSA and ElGamal)
    7. Overview (hybrid encryption)
    8. Data integrity (hash functions)
    9. Data origin authentication (message authentication codes)
    10. Digital signature schemes
    11. Entity authentication
    12. Key management
    13. Public key management
    14. Cryptographic protocols
    15. Secret sharing schemes
    16. Applications (WLAN, TLS, Bitcoin)
    17. Post-quantum cryptography
  • Assessment

    The University's policy on Assessment for Coursework Programs is based on the following four principles:

    1. Assessment must encourage and reinforce learning.
    2. Assessment must enable robust and fair judgements about student performance.
    3. Assessment practices must be fair and equitable to students and give them the opportunity to demonstrate what they have learned.
    4. Assessment must maintain academic standards.

    Assessment Summary
    Assessment will consist of an exam, a midsemester test, assignments, weekly quizzes and workshop participation. The relative weightings are:


    exam 50%
    mid-semester test 15%
    weekly quizzes 15%
    assignments 15%
    workshop participation   5%



    Assessment Related Requirements
    An aggregate score of at least 50% is required to pass the course.
    Assessment Detail
    Assessment will consist of an exam, a midsemester test, assignments, weekly quizzes and workshop participation.

    Assignments are due in weeks 3, 5, 7, 9 and 11.
    Workshops are held every week starting in week 1.
    The mid semester test is in week 7 during the timetabled seminar.
    Submission
    Work must be submitted according to the policies and procedures published on the MyUni course site.
    Course Grading

    Grades for your performance in this course will be awarded in accordance with the following scheme:

    M11 (Honours Mark Scheme)
    GradeGrade reflects following criteria for allocation of gradeReported on Official Transcript
    Fail A mark between 1-49 F
    Third Class A mark between 50-59 3
    Second Class Div B A mark between 60-69 2B
    Second Class Div A A mark between 70-79 2A
    First Class A mark between 80-100 1
    Result Pending An interim result RP
    Continuing Continuing CN

    Further details of the grades/results can be obtained from Examinations.

    Grade Descriptors are available which provide a general guide to the standard of work that is expected at each grade level. More information at Assessment for Coursework Programs.

    Final results for this course will be made available through .

  • Student Feedback

    The University places a high priority on approaches to learning and teaching that enhance the student experience. Feedback is sought from students in a variety of ways including on-going engagement with staff, the use of online discussion boards and the use of Student Experience of Learning and Teaching (SELT) surveys as well as GOS surveys and Program reviews.

    SELTs are an important source of information to inform individual teaching practice, decisions about teaching duties, and course and program curriculum design. They enable the University to assess how effectively its learning environments and teaching practices facilitate student engagement and learning outcomes. Under the current SELT Policy (http://www.adelaide.edu.au/policies/101/) course SELTs are mandated and must be conducted at the conclusion of each term/semester/trimester for every course offering. Feedback on issues raised through course SELT surveys is made available to enrolled students through various resources (e.g. MyUni). In addition aggregated course SELT data is available.

  • Student Support
  • Policies & Guidelines
  • Fraud Awareness

    Students are reminded that in order to maintain the academic integrity of all programs and courses, the university has a zero-tolerance approach to students offering money or significant value goods or services to any staff member who is involved in their teaching or assessment. Students offering lecturers or tutors or professional staff anything more than a small token of appreciation is totally unacceptable, in any circumstances. Staff members are obliged to report all such incidents to their supervisor/manager, who will refer them for action under the university's student鈥檚 disciplinary procedures.

The 成人大片 is committed to regular reviews of the courses and programs it offers to students. The 成人大片 therefore reserves the right to discontinue or vary programs and courses without notice. Please read the important information contained in the disclaimer.