IFN648 Applied Cryptography
To view more information for this unit, select Unit Outline from the list below. Please note the teaching period for which the Unit Outline is relevant.
Unit code: | IFN648 |
---|---|
Prerequisite(s): | IFN635 |
Equivalent(s): | IFQ648 |
Credit points: | 12 |
Timetable | Details in HiQ, if available |
Availabilities |
|
CSP student contribution | $1,164 |
Domestic tuition unit fee | $3,816 |
International unit fee | $5,352 |
Unit Outline: Semester 1 2025, Gardens Point, Internal
Unit code: | IFN648 |
---|---|
Credit points: | 12 |
Pre-requisite: | IFN635 |
Equivalent: | IFQ648 |
Coordinator: | Xavier Boyen | xavier.boyen@qut.edu.au |
Overview
As a society, we are increasingly dependent on interconnected electronic systems for storage and transmission of information. However, there are many threats to the security of information assets, and security controls are required. Cryptographic algorithms enable practical security services such as confidentiality and integrity assurance for stored or transmitted data, and authentication of entities and data.
This unit will provide an in-depth understanding of cryptographic algorithms, and the application of modern cryptographic techniques to protect information in a range of situations. It will also provide an understanding of the limitations of these cryptographic techniques, and the need for effective key management.
This unit follows IFN583 Computers and Security, and IFN635 Cyber Security and Governance, and is a detailed examination of a set of cryptographic mechanisms using mathematical and analytical algorithms to protect information assets.
Learning Outcomes
On successful completion of this unit you will be able to:
- Discuss the components of various classes of cryptographic systems, and discuss their roles, limitations, and impact of their use in broader systems.
- Apply the transformations performed by various cryptographic algorithms to achieve specific cryptographic services within a variety of security models.
- Justify the application of common cryptographic systems to achieve stated security goals by relating to the appropriate underlying information-scientific and mathematical principles.
- Integrate a combination of cryptanalytic techniques to address specific cryptographic challenges or identified weaknesses.
- Critically evaluate a real-world scenario and recommend the most appropriate cryptographic technologies to meet the information security specifications.
Content
You will investigate the following topics:
- Basic concepts in cryptography including: encryption and decryption, entity authentication, data integrity, non-repudiation, symmetric and asymmetric cryptography.
- Knowledge of a range of cryptographic algorithms from historic symmetric ciphers (Caesar, transposition ciphers, Hill cipher, Enigma) to modern symmetric ciphers (stream and block) and modes of operation, and modern asymmetric ciphers (RSA, El Gamal, ECDH) and their applications for confidentiality and authentication.
- Security models and classes of attack (ciphertext-only, known plaintext, chosen plaintext, chosen ciphertext), information theoretic security (Shannon’s Theorem).
- Notions of key management.
Learning Approaches
Unit staff provide a learning environment designed to maximise your learning experience. In order to realise your full potential, it is strongly recommended that you actively participate in all of the learning activities offered in this unit.
In this unit, students will learn through a combination of weekly lectures and tutorials. The lectures will explain concepts of applied cryptography, including some well-known and important algorithms with their strengths and weaknesses. The tutorials will explore the actual behaviour of those algorithms – both for regular use and for cryptanalysis through hands-on practical exercises using open source e-learning software. No experience with the e-learning software prior to beginning IFN648 is required.
The practical exercises are designed to reinforce the cryptographic concepts presented in the lectures, and to help students comprehend the operations and the applications of the algorithm in real-world scenarios.
You will work on these practical exercises at home in preparation for the tutorial, and are encouraged to bring your own laptop to the tutorials. During the tutorials the unit staff will highlight the key points and help you gain practical insight into the various cryptographic operations.
You can complete and review the exercises individually outside of class time with the help of worked-through solution sheets. The free e-learning software can also be downloaded and installed on individual student machines.
The unit coordinator will use the unit's Canvas page to make announcements to the class and post various types of information throughout the semester; and you will have ample opportunity to ask questions directly to the teaching staff at the lectures and tutorials, and also via email. It is your responsibility to access your email account and the unit's Canvas page regularly.
Feedback on Learning and Assessment
You can obtain feedback on your progress in this unit via the following mechanisms:
- Formative in-class individual and whole-of-class feedback provided by unit staff during tutorial classes
- Self-assess your responses to presented material
- Ask the teaching staff for advice and assistance during workshop sessions, or by email
- Review your assessment items when the marked items and/or reference solutions are returned, noting application of the marking criteria and/or marker comments,
- Have a private consultation with teaching staff to discuss your progress (email the unit coordinator to arrange an appointment).
Assessment
Overview
The summative assessment items in this unit allow you to:
- Demonstrate your ability to solve practical problems through the application of cryptography (the problem solving task).
- Identify security problems that can be mitigated through cryptographic techniques, and justify the selection of techniques (the report).
- Confirm the knowledge you have gained about cyber security and cryptography (the exam).
Unit Grading Scheme
7- point scale
Assessment Tasks
Assessment: Problem solving task
This task will require you to solve various cryptographic problems using the techniques presented in the classical cryptography section of the unit. You will submit reports outlining the process you have followed and the solutions obtained:
- Part 1 about Cryptanalysis and Historical Ciphers is worth 15% and due at the end of week 4
- Part 2 about Symmetric-key Cryptography and Analysis is worth 15% and due at the end of week 7
- Part 3 about Public-key Cryptography is worth 20% and due at the end of week 11.
Although you may discuss the assessment topics with others, the work you submit for assessment must be your own individual effort.
This assignment is eligible for the 48-hour late submission period and assignment extensions.
Assessment: Report
This assessment item will require you to work in a group, preparing a report on the analysis of an information security issue of your choice within a prescribed theme, based on topics covered in the course and your own literature search.
The task will allow you to demonstrate the knowledge of cryptographic concepts and algorithms you have acquired in the unit and their application in a real-world information-security context.
This assignment is eligible for the 48-hour late submission period and assignment extensions.
Assessment: Examination (invigilated)
Invigilated written final examination, in person. The exam covers the entirety of the unit material and focuses on testing core knowledge and basic application of the main concepts, through a mix of multiple-choice and short-answer questions, some of which through real-world scenarios or simple calculations.
Academic Integrity
Academic integrity is a commitment to undertaking academic work and assessment in a manner that is ethical, fair, honest, respectful and accountable.
The Academic Integrity Policy sets out the range of conduct that can be a failure to maintain the standards of academic integrity. This includes, cheating in exams, plagiarism, self-plagiarism, collusion and contract cheating. It also includes providing fraudulent or altered documentation in support of an academic concession application, for example an assignment extension or a deferred exam.
You are encouraged to make use of QUT’s learning support services, resources and tools to assure the academic integrity of your assessment. This includes the use of text matching software that may be available to assist with self-assessing your academic integrity as part of the assessment submission process.
Breaching QUT’s Academic Integrity Policy or engaging in conduct that may defeat or compromise the purpose of assessment can lead to a finding of student misconduct (Code of Conduct – Student) and result in the imposition of penalties under the Management of Student Misconduct Policy, ranging from a grade reduction to exclusion from QUT.
Resources
- No specific textbook is required for this unit.
- Free open source e-learning software will be used – details provided in the Week 1 class.
Risk Assessment Statement
There are no extraordinary risks associated with the classroom/ lecture activities in this unit.
Course Learning Outcomes
This unit is designed to support your development of the following course/study area learning outcomes.IN20 Master of Information Technology
- Demonstrate advanced specialist IT knowledge in at least one information technology discipline.
Relates to: ULO1, ULO3 - Critically analyse complex IT problems and opportunities and use creativity and problem-solving skills to generate innovative and novel solutions that are convincingly justified.
Relates to: ULO4 - Communicate effectively in IT professional and scholarly contexts to specialist and non-specialist audiences using written, visual and oral formats.
Relates to: ULO2 - Create positive change through critically reflecting upon and actioning responses to the social, cultural, ethical, sustainability, legal and accessibility issues in the IT field, including how they relate to First Nations Australians and diverse populations.
Relates to: ULO5