CAB340 Cryptography
To view more information for this unit, select Unit Outline from the list below. Please note the teaching period for which the Unit Outline is relevant.
| Unit code: | CAB340 |
|---|---|
| Prerequisite(s): | IFB240 |
| Assumed Knowledge: | Prerequisites for this unit include general knowledge of computer science concepts including familiarity with programming language of your choice (in order to be able to develop software prototypes) and general ease with mathematical subjects. |
| Credit points: | 12 |
| Timetable | Details in HiQ, if available |
| Availabilities |
|
| CSP student contribution | $1,192 |
| Domestic tuition unit fee | $4,704 |
| International unit fee | $5,640 |
Unit Outline: Semester 2 2026, Gardens Point, Internal
| Unit code: | CAB340 |
|---|---|
| Credit points: | 12 |
| Pre-requisite: | IFB240 |
| Assumed Knowledge: | Prerequisites for this unit include general knowledge of computer science concepts including familiarity with programming language of your choice (in order to be able to develop software prototypes) and general ease with mathematical subjects. |
| Coordinator: | Xavier Boyen | xavier.boyen@qut.edu.au |
Overview
The dependence of modern society on remote electronic data transmission and storage makes it an essential requirement that this data be secured, both against unwanted disclosure and malicious alterations. This unit provides a self-contained introduction to the field of cryptography, from historical roots and attacks, to the mathematical principles that underpin the workings of the modern ciphers most commonly in use for securing internet communications. The focus of this unit is on a grounded understanding of cryptographic designs and their limitations, which in turn inform how they are used in practice.
Learning Outcomes
On successful completion of this unit you will be able to:
- Discuss and apply the principles of various classes of cryptographic algorithms with a focus on core concepts, mathematical foundations, operating components, strengths and limitations.
- Model the cryptographic properties of various classes of algorithms, in order to analyse and evaluate their ability to meet practical security requirements.
- Analyse and assemble applied cryptographic systems, with an emphasis on identifying and fitting purpose and making recommendations to avoid misuse.
- Select, design and apply security technologies effectively in order to achieve specific cryptographic goals such as integrity, confidentiality and authentication.
- Explain the societal benefits of cryptography and its importance as a defensive shield for protecting personal privacy, enabling financial autonomy and freedom of expression.
Content
Cryptography versus cryptanalysis; the roles of cryptography; individual and societal benefits of cryptography; modelling cryptographic security; historical ciphers and how to break them; information theory; perfect secrecy from true randomness; stream ciphers and pseudorandomness; block ciphers and their modes of operation; some applications of symmetric cryptography; the mathematics of public-key cryptography; Diffie-Hellman; ElGamal; RSA; digital signatures; certificates and public-key infrastructure; elements of elliptic-curve cryptography; cryptocurrencies. Sustainability will be addressed in relevant contexts, from the benefits of pervasive encryption to the downsides of digital restrictions management, whilst also examining decentralised finance for the unbanked and the vulnerable.
Learning Approaches
This unit is available for you to study in either on-campus or online mode, but be aware that even in online mode you will be required to attend two (2) written examinations in person: once during Week 7 and once during the Central Examination period.
Learning in this unit primarily includes a weekly lecture (to be either recorded or pre-recorded) and a weekly tutorial (in-person only, or online for online-mode students). The unit will provide a communication channel designed to facilitate communication with the teaching staff outside of scheduled classes. You can expect to spend an average of 10 to 15 hours per week preparing for and attending all scheduled learning activities, completing assessment tasks, and undertaking your own independent study to consolidate your learning.
During the weekly lectures, theory on various topics in cryptography will be presented, and examples showing how this theory can be applied will also be given. During the weekly tutorials, the focus will be on promoting your understanding of the core material through hands-on problem-solving worksheets, involving a mixture of learning software and pen-and-paper exercises. Questions related to the presented material will be provided; your answers to these questions will direct your focus and aid your preparation for unit assessment items. Your participation in the learning activities provides opportunities for you to self-assess and to obtain feedback from unit staff and your peers, further developing your interpersonal and oral communication skills.
If you require extra help with respect to the mathematics in this unit, you will be able to get supplementary support from the Student Success Team in the form of both drop-in peer support for STEM (Stimulate) and foundational mathematics online resources or workshops.
You must be able to manage your time and prioritise activities in order to complete the required unit activities: both learning and assessment. You should be able to work both independently and as a productive and cooperative member of a team in which you will focus on an in-depth industry-relevant topic connected to cryptography and information security. Independent work (primarily in the form of mathematical practice) will be required to solidify your understanding from the learning activities in order to do well in the assessment items.
The unit coordinator will use email and the unit's QUT Canvas site to make announcements and post various types of information throughout the semester. It is your responsibility to access your email account and the unit's QUT Canvas site regularly.
Feedback on Learning and Assessment
You can obtain feedback on your progress throughout the unit through the following mechanisms:
• self-assess your responses to provided question sets and presented material
• ask the teaching staff for advice and assistance during tutorial sessions
• review your assessment items during scheduled review sessions
• have a private consultation with teaching staff
Assessment
Overview
This unit introduces foundational concepts and principles, and its assessment will be based both around the knowledge and skills acquired throughout the semester, in the form of an early problem-solving assignment and a theoretical final exam, and in the ability to apply all of that critically in an authentic situation, in the form of a substantial group project involving either investigation or implementation.
Unit Grading Scheme
7- point scale
Assessment Tasks
Assessment: Problem-solving assignment
In this applied problem-solving task, you will explore classical techniques of encryption and their vulnerability to cryptanalysis.
This assignment is eligible for the 48-hour late submission period and assignment extensions.
Assessment: Group project
This authentic assessment item requires you to, either, study and investigate from the literature, or, model and implement in software, a specific security item (artefact, protocol, product, system, etc.) within a specified theme, and write a comprehensive report detailing your process and your findings. You will be working in a small group, and will have some freedom to choose the topic of your project within a prescribed theme. You may be required to undertake a self and peer evaluation relating to teamwork as part of this assessment.
This assignment is eligible for the 48-hour late submission period and assignment extensions.
Assessment: Written final examination
This in-person invigilated written final examination will have a two-hour duration (excluding preparations and perusal) and consist of a mix of multiple-choice and short-answer questions.
Academic Integrity
Academic integrity is a commitment to undertaking academic work and assessment in a manner that is ethical, fair, honest, respectful and accountable.
The Academic Integrity Policy sets out the range of conduct that can be a failure to maintain the standards of academic integrity. This includes, cheating in exams, plagiarism, self-plagiarism, collusion and contract cheating. It also includes providing fraudulent or altered documentation in support of an academic concession application, for example an assignment extension or a deferred exam.
You are encouraged to make use of QUT’s learning support services, resources and tools to assure the academic integrity of your assessment. This includes the use of text matching software that may be available to assist with self-assessing your academic integrity as part of the assessment submission process.
Breaching QUT’s Academic Integrity Policy or engaging in conduct that may defeat or compromise the purpose of assessment can lead to a finding of student misconduct (Code of Conduct – Student) and result in the imposition of penalties under the Management of Student Misconduct Policy, ranging from a grade reduction to exclusion from QUT.
Requirements to Study
Costs
There are no extraordinary charges or costs are associated with the requirements for this unit.
Resources
There is no required text for this unit. There are many reference books. The following are useful:
Resource Materials
Reference book(s)
J. Menezes, P. C. van Oorrschot and S. A. Vanstone, Handbook of applied cryptography (HAC), CRC Press, Boca Raton, FL, 1996. Sample chapters available online at http://cacr.uwaterloo.ca/hac/
N. Smart, Cryptography: An introduction, McGraw-Hill. The 3rd edition is available online at
http://www.cs.bris.ac.uk/~nigel/Crypto_Book/ http://www.cs.bris.ac.uk/%7Enigel/Crypto_Book/
Risk Assessment Statement
There are no unusual health or safety risks associated with this unit.
Course Learning Outcomes
This unit is designed to support your development of the following course/study area learning outcomes.IN01 Bachelor of Information Technology
- Demonstrate a broad theoretical and technical knowledge of well-established and emerging IT disciplines, with in-depth knowledge in at least one specialist area aligned to multiple ICT professional roles.
Relates to: ULO1, Problem-solving assignment, Group project, Written final examination - Critically analyse and conceptualise complex IT challenges and opportunities using modelling, abstraction, ideation and problem-solving to generate, evaluate and justify recommended solutions.
Relates to: ULO2, ULO3, Group project - Integrate and apply technical knowledge and skills to analyse, design, build, operate and maintain sustainable, secure IT systems using industry-standard tools, technologies, platforms, and processes.
Relates to: ULO1, ULO3, ULO4, Written final examination - Communicate professionally and effectively in written, verbal and visual formats to a diverse range of stakeholders, considering the audience and explaining complex ideas in a simple and understandable manner in a range of IT-related contexts.
Relates to: ULO3, Group project - Critically reflect, using a human-centric approach, on the social, cultural, ethical, privacy, legal, sustainability, and accessibility issues shaping the development and use of IT, including respecting the perspectives and knowledge systems of Aboriginal and Torres Strait Islander peoples, ensuring IT solutions empower and support people with disabilities, and fostering inclusive and equitable digital technologies that serve diverse communities.
Relates to: ULO5, Written final examination
Unit Outline: Semester 2 2026, Online
| Unit code: | CAB340 |
|---|---|
| Credit points: | 12 |
| Pre-requisite: | IFB240 |
| Assumed Knowledge: | Prerequisites for this unit include general knowledge of computer science concepts including familiarity with programming language of your choice (in order to be able to develop software prototypes) and general ease with mathematical subjects. |
Overview
The dependence of modern society on remote electronic data transmission and storage makes it an essential requirement that this data be secured, both against unwanted disclosure and malicious alterations. This unit provides a self-contained introduction to the field of cryptography, from historical roots and attacks, to the mathematical principles that underpin the workings of the modern ciphers most commonly in use for securing internet communications. The focus of this unit is on a grounded understanding of cryptographic designs and their limitations, which in turn inform how they are used in practice.
Learning Outcomes
On successful completion of this unit you will be able to:
- Discuss and apply the principles of various classes of cryptographic algorithms with a focus on core concepts, mathematical foundations, operating components, strengths and limitations.
- Model the cryptographic properties of various classes of algorithms, in order to analyse and evaluate their ability to meet practical security requirements.
- Analyse and assemble applied cryptographic systems, with an emphasis on identifying and fitting purpose and making recommendations to avoid misuse.
- Select, design and apply security technologies effectively in order to achieve specific cryptographic goals such as integrity, confidentiality and authentication.
- Explain the societal benefits of cryptography and its importance as a defensive shield for protecting personal privacy, enabling financial autonomy and freedom of expression.
Content
Cryptography versus cryptanalysis; the roles of cryptography; individual and societal benefits of cryptography; modelling cryptographic security; historical ciphers and how to break them; information theory; perfect secrecy from true randomness; stream ciphers and pseudorandomness; block ciphers and their modes of operation; some applications of symmetric cryptography; the mathematics of public-key cryptography; Diffie-Hellman; ElGamal; RSA; digital signatures; certificates and public-key infrastructure; elements of elliptic-curve cryptography; cryptocurrencies. Sustainability will be addressed in relevant contexts, from the benefits of pervasive encryption to the downsides of digital restrictions management, whilst also examining decentralised finance for the unbanked and the vulnerable.
Learning Approaches
This unit is available for you to study in either on-campus or online mode, but be aware that even in online mode you will be required to attend two (2) written examinations in person: once during Week 7 and once during the Central Examination period.
Learning in this unit primarily includes a weekly lecture (to be either recorded or pre-recorded) and a weekly tutorial (in-person only, or online for online-mode students). The unit will provide a communication channel designed to facilitate communication with the teaching staff outside of scheduled classes. You can expect to spend an average of 10 to 15 hours per week preparing for and attending all scheduled learning activities, completing assessment tasks, and undertaking your own independent study to consolidate your learning.
During the weekly lectures, theory on various topics in cryptography will be presented, and examples showing how this theory can be applied will also be given. During the weekly tutorials, the focus will be on promoting your understanding of the core material through hands-on problem-solving worksheets, involving a mixture of learning software and pen-and-paper exercises. Questions related to the presented material will be provided; your answers to these questions will direct your focus and aid your preparation for unit assessment items. Your participation in the learning activities provides opportunities for you to self-assess and to obtain feedback from unit staff and your peers, further developing your interpersonal and oral communication skills.
If you require extra help with respect to the mathematics in this unit, you will be able to get supplementary support from the Student Success Team in the form of both drop-in peer support for STEM (Stimulate) and foundational mathematics online resources or workshops.
You must be able to manage your time and prioritise activities in order to complete the required unit activities: both learning and assessment. You should be able to work both independently and as a productive and cooperative member of a team in which you will focus on an in-depth industry-relevant topic connected to cryptography and information security. Independent work (primarily in the form of mathematical practice) will be required to solidify your understanding from the learning activities in order to do well in the assessment items.
The unit coordinator will use email and the unit's QUT Canvas site to make announcements and post various types of information throughout the semester. It is your responsibility to access your email account and the unit's QUT Canvas site regularly.
Feedback on Learning and Assessment
You can obtain feedback on your progress throughout the unit through the following mechanisms:
• self-assess your responses to provided question sets and presented material
• ask the teaching staff for advice and assistance during tutorial sessions
• review your assessment items during scheduled review sessions
• have a private consultation with teaching staff
Assessment
Overview
This unit introduces foundational concepts and principles, and its assessment will be based both around the knowledge and skills acquired throughout the semester, in the form of an early problem-solving assignment and a theoretical final exam, and in the ability to apply all of that critically in an authentic situation, in the form of a substantial group project involving either investigation or implementation.
Unit Grading Scheme
7- point scale
Assessment Tasks
Assessment: Problem-solving assignment
In this applied problem-solving task, you will explore classical techniques of encryption and their vulnerability to cryptanalysis.
This assignment is eligible for the 48-hour late submission period and assignment extensions.
Assessment: Group project
This authentic assessment item requires you to, either, study and investigate from the literature, or, model and implement in software, a specific security item (artefact, protocol, product, system, etc.) within a specified theme, and write a comprehensive report detailing your process and your findings. You will be working in a small group, and will have some freedom to choose the topic of your project within a prescribed theme. You may be required to undertake a self and peer evaluation relating to teamwork as part of this assessment.
This assignment is eligible for the 48-hour late submission period and assignment extensions.
Assessment: Written final examination
This in-person invigilated written final examination will have a two-hour duration (excluding preparations and perusal) and consist of a mix of multiple-choice and short-answer questions.
Academic Integrity
Academic integrity is a commitment to undertaking academic work and assessment in a manner that is ethical, fair, honest, respectful and accountable.
The Academic Integrity Policy sets out the range of conduct that can be a failure to maintain the standards of academic integrity. This includes, cheating in exams, plagiarism, self-plagiarism, collusion and contract cheating. It also includes providing fraudulent or altered documentation in support of an academic concession application, for example an assignment extension or a deferred exam.
You are encouraged to make use of QUT’s learning support services, resources and tools to assure the academic integrity of your assessment. This includes the use of text matching software that may be available to assist with self-assessing your academic integrity as part of the assessment submission process.
Breaching QUT’s Academic Integrity Policy or engaging in conduct that may defeat or compromise the purpose of assessment can lead to a finding of student misconduct (Code of Conduct – Student) and result in the imposition of penalties under the Management of Student Misconduct Policy, ranging from a grade reduction to exclusion from QUT.
Requirements to Study
Costs
There are no extraordinary charges or costs are associated with the requirements for this unit.
Resources
There is no required text for this unit. There are many reference books. The following are useful:
Resource Materials
Reference book(s)
J. Menezes, P. C. van Oorrschot and S. A. Vanstone, Handbook of applied cryptography (HAC), CRC Press, Boca Raton, FL, 1996. Sample chapters available online at http://cacr.uwaterloo.ca/hac/
N. Smart, Cryptography: An introduction, McGraw-Hill. The 3rd edition is available online at
http://www.cs.bris.ac.uk/~nigel/Crypto_Book/ http://www.cs.bris.ac.uk/%7Enigel/Crypto_Book/
Risk Assessment Statement
There are no unusual health or safety risks associated with this unit.
Course Learning Outcomes
This unit is designed to support your development of the following course/study area learning outcomes.IN01 Bachelor of Information Technology
- Demonstrate a broad theoretical and technical knowledge of well-established and emerging IT disciplines, with in-depth knowledge in at least one specialist area aligned to multiple ICT professional roles.
Relates to: ULO1, Problem-solving assignment, Group project, Written final examination - Critically analyse and conceptualise complex IT challenges and opportunities using modelling, abstraction, ideation and problem-solving to generate, evaluate and justify recommended solutions.
Relates to: ULO2, ULO3, Group project - Integrate and apply technical knowledge and skills to analyse, design, build, operate and maintain sustainable, secure IT systems using industry-standard tools, technologies, platforms, and processes.
Relates to: ULO1, ULO3, ULO4, Written final examination - Communicate professionally and effectively in written, verbal and visual formats to a diverse range of stakeholders, considering the audience and explaining complex ideas in a simple and understandable manner in a range of IT-related contexts.
Relates to: ULO3, Group project - Critically reflect, using a human-centric approach, on the social, cultural, ethical, privacy, legal, sustainability, and accessibility issues shaping the development and use of IT, including respecting the perspectives and knowledge systems of Aboriginal and Torres Strait Islander peoples, ensuring IT solutions empower and support people with disabilities, and fostering inclusive and equitable digital technologies that serve diverse communities.
Relates to: ULO5, Written final examination