
COMP343 Cryptography and Information Security S1 Day 2016 Dept of Computing Contents Disclaimer General Information 2 Macquarie University has taken all reasonable measures to ensure the information in this Learning Outcomes 3 publication is accurate and up-to-date. However, the information may change or become out-dated as a result of change in University policies, Assessment Tasks 3 procedures or rules. The University reserves the right to make changes to any information in this Delivery and Resources 5 publication without notice. Users of this publication are advised to check the website Unit Schedule 7 version of this publication [or the relevant faculty or department] before acting on any information in Learning and Teaching Activities 8 this publication. Policies and Procedures 8 Graduate Capabilities 10 Changes from Previous Offering 17 Grading Standards 17 https://unitguides.mq.edu.au/unit_offerings/58102/unit_guide/print 1 Unit guide COMP343 Cryptography and Information Security General Information Unit convenor and teaching staff Convenor, lecturer Les Bell [email protected] Contact via By email Available for the hour after Thursday lectures; other times by appointment. Workshops Supervisor Xinyu Fan [email protected] Contact via X.6347 E6A 347 TBA Workshops Supervisor Byungho Min [email protected] Contact via X. 6342 E6A 346 TBA Credit points 3 Prerequisites 39cp including(COMP125 and (DMTH137 or DMTH237)) Corequisites Co-badged status COMP343 / ITEC643 Unit description This unit provides an introduction to modern cryptography and information security. First, some cryptographic primitives, such as private key and public key ciphers, hash functions and digital signatures, are introduced. Then, some security technologies are discussed to illustrate how basic cryptographic primitives are concretely used in real life applications. Various attacks on the cryptographic schemes and protocols are also discussed. https://unitguides.mq.edu.au/unit_offerings/58102/unit_guide/print 2 Unit guide COMP343 Cryptography and Information Security Important Academic Dates Information about important academic dates including deadlines for withdrawing from units are available at https://students.mq.edu.au/important-dates Learning Outcomes On successful completion of this unit, you will be able to: Demonstrate an understanding of the principles and concepts of cryptography and information security Apply existing security technologies to preserve security properties of information Apply security principles in the development of applications and systems Relate information security to enterprise requirements and activities Assessment Tasks Name Weighting Due Tutorial Tasks 10% Weekly Assignment 1 15% Week 7 Assignment 2 15% Week 12 Mid Semester Test 15% Week 6 Final Examination 45% TBA Tutorial Tasks Due: Weekly Weighting: 10% Each week, a set of exercises will be available online. Some require written submissions, while some are multiple choice. Your solutions should be submitted electronically via iLearn before the deadline specified in the text. On successful completion you will be able to: • Demonstrate an understanding of the principles and concepts of cryptography and information security • Apply existing security technologies to preserve security properties of information • Apply security principles in the development of applications and systems • Relate information security to enterprise requirements and activities https://unitguides.mq.edu.au/unit_offerings/58102/unit_guide/print 3 Unit guide COMP343 Cryptography and Information Security Assignment 1 Due: Week 7 Weighting: 15% Implementation of a cryptoprimitive and test program. The assignment is to be submitted via iLearn. Late submissions attract no marks. On successful completion you will be able to: • Demonstrate an understanding of the principles and concepts of cryptography and information security • Apply security principles in the development of applications and systems Assignment 2 Due: Week 12 Weighting: 15% Security Evaluation of a System or Product. The assignment is to be submitted via iLearn. Late submissions attract no marks. On successful completion you will be able to: • Apply existing security technologies to preserve security properties of information • Relate information security to enterprise requirements and activities Mid Semester Test Due: Week 6 Weighting: 15% A 50 minutes long written examination worth 15% that will be held in week 6 during class time. This will test your understanding of material covered in weeks 1 to 6. The mid-semester test has the same structure as the final examination. The feedback received will allow you to be better prepared for the final examination. On successful completion you will be able to: • Demonstrate an understanding of the principles and concepts of cryptography and information security • Apply security principles in the development of applications and systems Final Examination Due: TBA Weighting: 45% https://unitguides.mq.edu.au/unit_offerings/58102/unit_guide/print 4 Unit guide COMP343 Cryptography and Information Security The final examination is designed to test your understanding of basic concepts of modern Cryptography and Information Security. Regarding the examination process, note that: • you must attend all required classes and submit all required assessments, otherwise the Executive Dean of the Faculty or delegated authority has the power to refuse permission to attend the final examination • the University Examination period for Mid-Year 2015 is from Tuesday 9th June to Friday 26th June 2015 • you are expected to present yourself for examination at the time and place designated in the University Examination Timetable • the timetable will be available in Draft form approximately eight weeks before the commencement of the examinations and in Final form approximately four weeks before the commencement of examinations • no early examinations for individuals or groups of students will be set. All students are expected to ensure that they are available until the end of the teaching semester, that is the final day of the official examination period • the only exception to not sitting an examination at the designated time is because of documented illness or unavoidable disruption. In these circumstances you may wish to notify the university of your circumstances, as detailed in the Disruption to Studies Policy. On successful completion you will be able to: • Demonstrate an understanding of the principles and concepts of cryptography and information security • Apply existing security technologies to preserve security properties of information • Apply security principles in the development of applications and systems • Relate information security to enterprise requirements and activities Delivery and Resources COMPUTING FACILITIES Important! Please note that COMP343 will be a BYOD (Bring Your Own Device) unit in 2016. You will be expected to bring your own laptop computer (Windows, Mac or Linux) to the Tutorial/ Practicals, install and configure the required software, and incorporate secure practices into your daily work (and play!) routines. CLASSES Each week you should complete any assigned readings and review the lecture slides in order to prepare for the lecture. There are two hours of lectures on Monday afternoons, and a third hour https://unitguides.mq.edu.au/unit_offerings/58102/unit_guide/print 5 Unit guide COMP343 Cryptography and Information Security on Thursdays at lunch time. There are two practical workshops, on Mondays and Thursdays, which use hands-on exercises to introduce and reinforce concepts related to the lecture content; you should have chosen a practical on enrollment. You will find it helpful to read the workshop instructions before attending - that way, you can get to work quickly! For details of days, times and rooms consult the timetables webpage. Note that Practicals commence in week 1. You should have selected a practical at enrollment. Please note that you will be required to submit work every week. Failure to do so may result in you failing the unit or being excluded from the exam. DISCUSSION BOARDS This unit makes use of discussion boards hosted within iLearn . Please post questions there; they are monitored by the staff on the unit. REQUIRED AND RECOMMENDED TEXTS AND/OR MATERIALS Required readings for this unit: • A. J. Menezes, P. C. van Oorrschot and S. A. Vanstone, Handbook of applied cryptogr aphy (HAC), CRC Press, Boca Raton, FL, 1996. All required chapters are available online at http://cacr.uwaterloo.ca/hac/ • R. Anderson, Security Engineering (SE) Wiley Publishing, Inc. 2008. The complete second edition is now available online at http://www.cl.cam.ac.uk/~rja14/book.html Recommended readings for this unit: • NIST SP 800 documents available from http://csrc.nist.gov/publications/PubsSPs.html • IETF RFC's available from http://www.rfc-editor.org • Bauer, Craig P., Secret History: The Story of Cryptology, CRC Press (2013) • N. Smart, Cryptography: An introduction, McGraw-Hill. The 3rd edition is available online at http://www.cs.bris.ac.uk/~nigel/Crypto_Book/ TECHNOLOGY USED AND REQUIRED iLearn iLearn is a Learning Management System that gives you access to lecture slides, lecture recordings, forums, assessment tasks, instructions for practicals, discussion forums and other resources. Echo 360 (formerly known as iLecture) https://unitguides.mq.edu.au/unit_offerings/58102/unit_guide/print 6 Unit guide COMP343 Cryptography and Information Security Digital recordings
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages19 Page
-
File Size-