School: Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Cryptographic Concepts
  • Unit Code

    CSI2108
  • Year

    2016
  • Enrolment Period

    1
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

Cryptography is a field of science that explores the means by which data can be securely transmitted through insecure mediums. A fundamental understanding of cryptographic concepts is an essential part of any cyber security specialists arsenal of knowledge. This unit is a primer on cryptographic concepts as they are applicable to the cyber security specialist. The core cryptographic primitives will be explored in terms of function, implementation and implications of their use within the security landscape. Extending from the basic understanding of primitives the unit delves into relevant ciphers both historical and current, for a deeper understanding of the failures and successes of cryptographic theory and implementation. Please note that this unit aims to primarily focus on conceptual rather than mathematical components of cryptography.

Prerequisite Rule

Must have passed CSI1101. Must have passed ENS1161.

Learning Outcomes

On completion of this unit students should be able to:

  1. Interpret fundamental cryptographic principles.
  2. Examine the fundamental operation of cryptosystems.
  3. Compare and contrast the strengths and weaknesses of cryptographic implementations.
  4. Critique cryptographic algorithms within a security context.
  5. Propose customised cryptosystems for diverse application domains.

Unit Content

  1. Cryptographic theory and history of cryptosystems.
  2. Stream ciphers.
  3. Block ciphers.
  4. Symmetric encryption.
  5. Asymmetric encryption.
  6. Digital signatures and hash functions.
  7. Key management.
  8. Cryptosystems.
  9. Cryptanalysis.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
AssignmentReview of Cryptographic Implementations15%
Case StudyCryptographic Analysis Project35%
Examination ^End of Semester Examination50%
ONLINE
TypeDescriptionValue
AssignmentReview of Cryptographic Implementations15%
Case StudyCryptographic Analysis Project35%
Examination ^End of Semester Examination50%

^ Mandatory to Pass

Text References

  • ^ Preneel, B., Paar, C., & Pelzl, J. (2010). Understanding cryptography: a textbook for students and practitioners. Berlin, Germany: Springer-Verlag.
  • Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (2010). Handbook of applied cryptography (Discrete Mathematics and Its Applications). Boca Raton, FL: CRC press.
  • Singh, S. (2000). The code book: the secret history of codes and codebreaking. London, England: Fourth Estate.
  • Ferguson, N., & Schneier, B. (2003). Practical cryptography. New York, NY: Wiley.
  • Ferguson, N. (2010). Cryptography engineering : design principles and practical applications. Indianapolis, IN: Wiley. Note: Seminal Reference.

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

CSI2108|1|1

School: Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Cryptographic Concepts
  • Unit Code

    CSI2108
  • Year

    2016
  • Enrolment Period

    2
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

Cryptography is a field of science that explores the means by which data can be securely transmitted through insecure mediums. A fundamental understanding of cryptographic concepts is an essential part of any cyber security specialists arsenal of knowledge. This unit is a primer on cryptographic concepts as they are applicable to the cyber security specialist. The core cryptographic primitives will be explored in terms of function, implementation and implications of their use within the security landscape. Extending from the basic understanding of primitives the unit delves into relevant ciphers both historical and current, for a deeper understanding of the failures and successes of cryptographic theory and implementation. Please note that this unit aims to primarily focus on conceptual rather than mathematical components of cryptography.

Prerequisite Rule

Must have passed CSI1101. Must have passed ENS1161.

Learning Outcomes

On completion of this unit students should be able to:

  1. Interpret fundamental cryptographic principles.
  2. Examine the fundamental operation of cryptosystems.
  3. Compare and contrast the strengths and weaknesses of cryptographic implementations.
  4. Critique cryptographic algorithms within a security context.
  5. Propose customised cryptosystems for diverse application domains.

Unit Content

  1. Cryptographic theory and history of cryptosystems.
  2. Stream ciphers.
  3. Block ciphers.
  4. Symmetric encryption.
  5. Asymmetric encryption.
  6. Digital signatures and hash functions.
  7. Key management.
  8. Cryptosystems.
  9. Cryptanalysis.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
AssignmentReview of Cryptographic Implementations15%
Case StudyCryptographic Analysis Project35%
Examination ^End of Semester Examination50%
ONLINE
TypeDescriptionValue
AssignmentReview of Cryptographic Implementations15%
Case StudyCryptographic Analysis Project35%
Examination ^End of Semester Examination50%

^ Mandatory to Pass

Text References

  • ^ Preneel, B., Paar, C., & Pelzl, J. (2010). Understanding cryptography: a textbook for students and practitioners. Berlin, Germany: Springer-Verlag.
  • Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (2010). Handbook of applied cryptography (Discrete Mathematics and Its Applications). Boca Raton, FL: CRC press.
  • Singh, S. (2000). The code book: the secret history of codes and codebreaking. London, England: Fourth Estate.
  • Ferguson, N., & Schneier, B. (2003). Practical cryptography. New York, NY: Wiley.
  • Ferguson, N. (2010). Cryptography engineering : design principles and practical applications. Indianapolis, IN: Wiley. Note: Seminal Reference.

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

CSI2108|1|2