IFQ648 Applied Cryptography


To view more information for this unit, select Unit Outline from the list below. Please note the teaching period for which the Unit Outline is relevant.


Unit Outline: Session 3 2026, QUT Online, Online

Unit code:IFQ648
Credit points:12
Pre-requisite:IFQ635 or IFN635
Equivalent:IFN648
Anti-requisite:CAB340
Disclaimer - Offer of some units is subject to viability, and information in these Unit Outlines is subject to change prior to commencement of the teaching period.

Overview

As a society, we are increasingly dependent on interconnected electronic systems for storage and transmission of information. However, there are many threats to the security of information assets, and security controls are required. Cryptographic algorithms enable practical security services such as confidentiality and integrity assurance for stored or transmitted data, and authentication of entities and data.

This unit will provide an in-depth understanding of cryptographic algorithms, and the application of modern cryptographic techniques to protect information in a range of situations. It will also provide an understanding of the limitations of these cryptographic techniques, and the need for effective key management.

This unit follows IFQ583 Computers and Security, and IFQ635 Cyber Security and Governance, and is a detailed examination of a set of cryptographic mechanisms using mathematical and analytical algorithms to protect information assets.

Learning Outcomes

On successful completion of this unit you will be able to:

  1. Discuss the components of various classes of cryptographic systems, and discuss their roles, limitations, and impact of their use in broader systems.
  2. Apply the transformations performed by various cryptographic algorithms to achieve specific cryptographic services within a variety of security models.
  3. Justify the application of common cryptographic systems to achieve stated security goals by relating to the appropriate underlying information-scientific and mathematical principles.
  4. Integrate a combination of cryptanalytic techniques to address specific cryptographic challenges or identified weaknesses.
  5. Critically evaluate a real-world scenario and recommend the most appropriate cryptographic technologies to meet the information security specifications.

Content

You will investigate the following topics:

  • Basic concepts in cryptography including: encryption and decryption, entity authentication, data integrity, non-repudiation, symmetric and asymmetric cryptography.
  • Knowledge of a range of cryptographic algorithms from historic symmetric ciphers (Caesar, transposition ciphers, Hill cipher, Enigma) to modern symmetric ciphers (stream and block) and modes of operation, and modern asymmetric ciphers (RSA, El Gamal, ECDH) and their applications for confidentiality and authentication.
  • Security models and classes of attack (ciphertext-only, known plaintext, chosen plaintext, chosen ciphertext), information theoretic security (Shannon’s Theorem).
  • Notions of key management.

Learning Approaches

This unit is designed for asynchronous online study. The unit makes use of numerous short videos and podcasts that will explain cryptographic concepts and algorithms.

Practical exercises and activities have been carefully chosen to reinforce the cryptographic concepts presented in the videos and podcasts, to help the you comprehend the operations and the applications of the algorithm in real world scenarios.Using freely available educational software, practical exercises involve the exploration of cryptographic algorithms: both how to apply them and how to exploit their weaknesses cryptanalytically. Additionally, you will have the opportunity to participate in online discussions with peers and teaching staff. 

The teaching team will use email and the unit's Canvas page to make announcements and post various types of information throughout the semester. It is your responsibility to access your email account and the unit's Canvas page regularly.

Feedback on Learning and Assessment

You can obtain feedback on your progress in this unit via the following mechanisms:

  • Self-assess your responses to presented material;
  • Ask the teaching staff for advice and assistance by email or discussion forum;
  • Review your assessment items when the marked items are returned, noting application of the rubric and the marker comments.

Taking note of the marker’s feedback on the problem solving tasks will enable you to review the concepts covered to ensure that you understand the material prior to the final examination.

Assessment

Overview

The summative assessment items in this unit allow you to:

  • Demonstrate your ability to solve practical problems through the application of cryptography (the problem solving task).
  • Identify security problems that can be mitigated through cryptographic techniques, and justify the selection of techniques (the report).
  • Confirm the knowledge you have gained about cyber security and cryptography (the exam).

Unit Grading Scheme

7- point scale

Assessment Tasks

Assessment: Problem Solving Task

This task will require you to solve various cryptographic problems using the techniques presented in the classical and modern cryptography sections of the unit. You will submit reports outlining the process you have followed, and the solutions obtained:

  • Part 1 about Historical Ciphers and Symmetric-Key Cryptography is worth 30% and due at the end of the Consolidation Week.
  • Part 2 about Public-key Cryptography is worth 20% and is due at the end of week 7.

Although you may discuss the assessment topics with others, the work you submit for assessment must be your own individual effort.

The use of generative artificial intelligence (GenAI) tools is prohibited during this assessment.

This assignment is eligible for the 48-hour late submission period and assignment extensions.

Weight: 50
Individual/Group: Individual
Due (indicative): Consolidation Week
Related Unit learning outcomes: 2, 4

Assessment: Report

This assessment item will require you to prepare a report on the analysis of an information security issue of your choice within a prescribed theme, based on topics covered in the course and your own literature search.

The task will allow you to demonstrate the knowledge of cryptographic concepts and algorithms you have acquired in the unit and their application in a real-world information-security context.

The use of generative artificial intelligence (GenAI) tools is prohibited during this assessment.

This assignment is eligible for the 48-hour late submission period and assignment extensions.

Weight: 20
Length: 5 to 10 pages excluding appendices
Individual/Group: Either group or individual
Due (indicative): End of last week of instruction (Week 8)
Related Unit learning outcomes: 1, 3, 5

Assessment: Examination (invigilated)

Invigilated written final examination.  The exam covers the entirety of the unit material and focuses on testing core knowledge and basic application of the main concepts, through a mix of multiple-choice and short-answer questions, some of which through real-world scenarios or simple calculations.

The use of generative artificial intelligence (GenAI) tools is prohibited during this assessment.

Weight: 30
Individual/Group: Individual
Due (indicative):
Central exam duration: 2:10 - No perusal
During the Assignment/Exam Week.
Related Unit learning outcomes: 1, 2, 3

Academic Integrity

Academic integrity is a commitment to undertaking academic work and assessment in a manner that is ethical, fair, honest, respectful and accountable.

The Academic Integrity Policy sets out the range of conduct that can be a failure to maintain the standards of academic integrity. This includes, cheating in exams, plagiarism, self-plagiarism, collusion and contract cheating. It also includes providing fraudulent or altered documentation in support of an academic concession application, for example an assignment extension or a deferred exam.

You are encouraged to make use of QUT’s learning support services, resources and tools to assure the academic integrity of your assessment. This includes the use of text matching software that may be available to assist with self-assessing your academic integrity as part of the assessment submission process.

Breaching QUT’s Academic Integrity Policy or engaging in conduct that may defeat or compromise the purpose of assessment can lead to a finding of student misconduct (Code of Conduct – Student) and result in the imposition of penalties under the Management of Student Misconduct Policy, ranging from a grade reduction to exclusion from QUT.

Resources

  • No specific textbook is required for this unit.
  • Free open source e-learning software will be used – details provided in the Week 1 class

Risk Assessment Statement

There are no unusual health or safety risks associated with this unit.