IFQ648 Applied Cryptography


To view more information for this unit, select Unit Outline from the list below. Please note the teaching period for which the Unit Outline is relevant.


Unit Outline: Session 1 2024, QUT Online, Online

Unit code:IFQ648
Credit points:12
Pre-requisite:IFQ541
Anti-requisite:IFN648
Anti-requisite:CAB340
Disclaimer - Offer of some units is subject to viability, and information in these Unit Outlines is subject to change prior to commencement of the teaching period.

Overview

This advanced unit will provide an in-depth understanding of cryptographic algorithms and their applications. Cryptographic algorithms enable practical security services such as confidentiality and integrity assurance for stored or transmitted data, and authentication of entities. As a society, we are increasingly dependent on electronic systems, often interconnected, for storage and transmission of information. However, there are many threats to the security of information. This unit will explore the application of modern cryptographic techniques to protect information in a range of situations, and also provide an understanding of their limitations. Cryptography is a mathematical subject so a certain level of mathematical maturity will be assumed, but the unit will be self-contained and refreshers on all necessary notions will be provided as needed.

Learning Outcomes

On successful completion of this unit you will be able to:

  1. Describe the various aspects of cryptographic security, the components needed to achieve them, and how they relate to information security goals such as confidentiality, integrity assurance and authentication in a given context. (CLO1)
  2. Explain the data transformation principles used in cryptographic algorithms. (CLO5)
  3. Describe the operation of a range of cryptographic algorithms, from simple historical ciphers to modern symmetric and asymmetric ciphers. (CLO1)
  4. Identify the strengths and limitations associated with particular cryptographic systems. (CLO2)
  5. Determine appropriate cryptographic technologies to achieve specific information security goals. (CLO7)

Content

Basic concepts in cryptography including: encryption and decryption, entity authentication, data integrity, non-repudiation, symmetric and asymmetric cryptography, and how to define cryptographic security. Principles behind a range of  symmetric cryptographic algorithms from historic ciphers (Caesar, transposition ciphers, Hill cipher, Enigma) to modern symmetric ciphers (stream and block) and their modes of operation. Mathematical principles behind modern asymmetric ciphers (RSA, El Gamal, Elliptic Curves) and their applications for confidentiality and digital signatures. Classes of attack (ciphertext-only, known plaintext, chosen plaintext, chosen ciphertext), information theoretic security. Selected applications of cryptography (the SSL/TLS protocol, TOR onion routing, cryptocurrencies).

Learning Approaches

In this unit you will learn through weekly two-hour theoretical lectures (recorded) and two-hour practical workshops (interactive) using freely available educational software. The lectures will explain cryptographic concepts and algorithms, and the practical exercises involve the exploration of cryptographic algorithms: both how to apply them and how to exploit their weaknesses cryptanalytically. No experience with the e-learning software prior to beginning IFQ648 is required. 

The practical exercises are designed to reinforce the cryptographic concepts presented in the lectures, and to help the student comprehend the operations and the applications of the algorithm in real world scenarios. You will work on these practical exercises online using freely available educational software, with the assistance of unit staff it required. You can complete and review the exercises individually outside of class time – the free e-learning software can be downloaded and installed on individual student machines. 

The unit coordinator will use email and the unit's Canvas page to make announcements and post various types of information throughout the semester. It is your responsibility to access your email account and the unit's Canvas page regularly.

Feedback on Learning and Assessment

You can obtain feedback on your progress in this unit via the following mechanisms:

  • Self-assess your responses to presented material;
  • Ask the teaching staff for advice and assistance during online workshop sessions, or by email;
  • Review your assessment items when the marked items are returned, noting application of the rubric and the marker comments.

Taking note of the marker’s feedback on the problem solving tasks will enable you to review the concepts covered to ensure that you understand the material prior to the final examination.

Assessment

Overview

The summative assessment items in this unit will allow you to demonstrate your ability to solve practical problems through the application of cryptography (the problem solving task), investigate real-world systems, eason about their security problems and critique their uses of cryptography to address them (the report, done in group), and confirm the knowledge you have gained about cyber security and cryptography (the exam).

Unit Grading Scheme

7- point scale

Assessment Tasks

Assessment: Problem Solving Task

This task will require you to solve individual cryptographic problems and challenges using the techniques presented in the lectures and practised at the online workshops.

This is an assignment for the purposes of an extension.

Weight: 40
Individual/Group: Individual
Due (indicative): Mid-Session
Related Unit learning outcomes: 1, 2, 3, 4

Assessment: Report

This assessment item will require you to work in a group, preparing a report on the analysis of an information security issue, based on topics covered in the course. The task will allow you to demonstrate the knowledge of cryptographic algorithms you have acquired in the unit and their application in the context of a network security.

This is an assignment for the purposes of an extension.

Weight: 20
Individual/Group: Group
Due (indicative): End Session
Related Unit learning outcomes: 1, 2, 3, 4

Assessment: Final Exam

Final written examination

Weight: 40
Individual/Group: Individual
Due (indicative): Central Examination Period
Related Unit learning outcomes: 1, 2, 3, 4, 5

Academic Integrity

Students are expected to engage in learning and assessment at QUT with honesty, transparency and fairness. Maintaining academic integrity means upholding these principles and demonstrating valuable professional capabilities based on ethical foundations.

Failure to maintain academic integrity can take many forms. It includes cheating in examinations, plagiarism, self-plagiarism, collusion, and submitting an assessment item completed by another person (e.g. contract cheating). It can also include providing your assessment to another entity, such as to a person or website.

You are encouraged to make use of QUT’s learning support services, resources and tools to assure the academic integrity of your assessment. This includes the use of text matching software that may be available to assist with self-assessing your academic integrity as part of the assessment submission process.

Further details of QUT’s approach to academic integrity are outlined in the Academic integrity policy and the Student Code of Conduct. Breaching QUT’s Academic integrity policy is regarded as student misconduct and can lead to the imposition of penalties ranging from a grade reduction to exclusion from QUT.

Resources

  • No specific textbook is required for this unit.
  • Free open source e-learning software will be used – details provided in the Week 1 class

Risk Assessment Statement

There are no unusual health or safety risks associated with this unit.