Skip to main content
Unit outline_

OCSE5619: Applied Cryptography

Semester 2b, 2023 [Online] - Online Program

Applied cryptography has been a fundamental part of cybersecurity. On one hand, in many scenarios, specific cryptographic tools or protocols need to be designed for different security purposes; on the other hand, misuse or ad hoc crypto designs have led to vulnerabilities in large scale secure systems. This unit provides theoretical, design, and practical skills that are required to design, deploy, and evaluate basic cryptographic modules in cybersecurity products.

Unit details and rules

Academic unit Computer Science
Credit points 6
Prerequisites
? 
None
Corequisites
? 
None
Prohibitions
? 
CSEC5619
Assumed knowledge
? 

OCSE5616 or CSEC5616 or ELEC5616 or INFO3616 or INFO2222 or MATH2088 or MATH2988

Available to study abroad and exchange students

No

Teaching staff

Coordinator Ali Anaissi, ali.anaissi@sydney.edu.au
Type Description Weight Due Length
Assignment Homework 1
Short essay questions
6% Week 02
Due date: 08 Oct 2023 at 23:59
2 weeks
Outcomes assessed: LO1 LO2 LO3 LO4 LO5 LO6 LO9
Assignment Term Project Proposal
Simple proposal: 1/2 page for initial feedback
0% Week 02 2 weeks
Outcomes assessed: LO1 LO2 LO3 LO4 LO5 LO6 LO7 LO8 LO9
Assignment Homework 2
Short essay questions
7% Week 04
Due date: 22 Oct 2023 at 23:59
2 weeks
Outcomes assessed: LO1 LO2 LO3 LO4 LO5 LO6 LO9
Assignment Homework 3
Short essay questions
7% Week 06
Due date: 05 Nov 2023 at 23:59
2 weeks
Outcomes assessed: LO1 LO2 LO3 LO4 LO5 LO6 LO9
Assignment Term Project Report
Exact format will depend on what project/focus students select.
30% Week 07
Due date: 12 Nov 2023 at 23:59
5 weeks
Outcomes assessed: LO1 LO2 LO3 LO4 LO5 LO6 LO7 LO8 LO9
Supervised exam
? 
hurdle task
Final Exam
Short essay questions similar to homework. Timed
50% Week 08 2 hours
Outcomes assessed: LO1 LO2 LO3 LO4 LO5 LO6 LO9
hurdle task = hurdle task ?

Assessment summary

  • Homework 1: You will answer a few short essay questions where you need to demonstrate an understanding of and apply cryptography concepts that you have studied so far.
  • Term Project Proposal: You will present a written proposal in which you will describe the motivation, objectives and methodology for your proposed project.
  • Homework 2: You will answer a few short essay questions where you need to demonstrate an understanding of and apply cryptography concepts that you have studied so far.
  • Homework 3: You will answer a few short essay questions where you need to demonstrate an understanding of and apply cryptography concepts that you have studied so far.
  • Term Project Report: You will present a written report where you will discuss the motivation, objectives, methodology, results, and conclusions of your term project.
  • Final Exam: You will answer a series of short essay questions that test your understanding of cryptography concepts that you have studied in this unit under examination conditions.

The final exam is a hurdle task. You must score at least 40% in the final exam in order to pass this unit.

Detailed information for each assessment can be found on Canvas. Assessment rubrics and submission instructions are published on Canvas.

Assessment criteria

Result name Mark range Description
High Distinction 85 - 100 Excellent course work
Distinction 75 - 84 Very good course work
Credit 65 - 74 Good course work
Pass 50 - 64 Fair course work
Fail 0 - 49 When you don’t meet the learning outcomes of the unit to a satisfactory standard.

 

It is a policy of the School of Computer Science that in order to pass this unit, a student must achieve at least 40% in the written examination. For subjects without a final exam, the 40% minimum requirement applies to the corresponding major assessment component specified by the lecturer. A student must also achieve an overall final mark of 50 or more. Any student not meeting these requirements may be given a maximum final mark of no more than 45 regardless of their average.

For more information see guide to grades.

Late submission

In accordance with University policy, these penalties apply when written work is submitted after 11:59pm on the due date:

  • Deduction of 5% of the maximum mark for each calendar day after the due date.
  • After ten calendar days late, a mark of zero will be awarded.

Academic integrity

The Current Student website provides information on academic integrity and the resources available to all students. The University expects students and staff to act ethically and honestly and will treat all allegations of academic integrity breaches seriously.

We use similarity detection software to detect potential instances of plagiarism or other forms of academic integrity breach. If such matches indicate evidence of plagiarism or other forms of academic integrity breaches, your teacher is required to report your work for further investigation.

Use of generative artificial intelligence (AI) and automated writing tools

You may only use generative AI and automated writing tools in assessment tasks if you are permitted to by your unit coordinator. If you do use these tools, you must acknowledge this in your work, either in a footnote or an acknowledgement section. The assessment instructions or unit outline will give guidance of the types of tools that are permitted and how the tools should be used.

Your final submitted work must be your own, original work. You must acknowledge any use of generative AI tools that have been used in the assessment, and any material that forms part of your submission must be appropriately referenced. For guidance on how to acknowledge the use of AI, please refer to the AI in Education Canvas site.

The unapproved use of these tools or unacknowledged use will be considered a breach of the Academic Integrity Policy and penalties may apply.

Studiosity is permitted unless otherwise indicated by the unit coordinator. The use of this service must be acknowledged in your submission as detailed on the Learning Hub’s Canvas page.

Outside assessment tasks, generative AI tools may be used to support your learning. The AI in Education Canvas site contains a number of productive ways that students are using AI to improve their learning.

Simple extensions

If you encounter a problem submitting your work on time, you may be able to apply for an extension of five calendar days through a simple extension.  The application process will be different depending on the type of assessment and extensions cannot be granted for some assessment types like exams.

Special consideration

If exceptional circumstances mean you can’t complete an assessment, you need consideration for a longer period of time, or if you have essential commitments which impact your performance in an assessment, you may be eligible for special consideration or special arrangements.

Special consideration applications will not be affected by a simple extension application.

Using AI responsibly

Co-created with students, AI in Education includes lots of helpful examples of how students use generative AI tools to support their learning. It explains how generative AI works, the different tools available and how to use them responsibly and productively.

WK Topic Learning activity Learning outcomes
Week 01 Introduction & Overview; One-Time Pad and Computational Security Lecture (3.5 hr) LO1 LO2 LO3 LO4 LO5 LO6 LO9
Introduction & Overview; One-Time Pad and Computational Security Workshop (1.5 hr) LO1 LO2 LO3 LO4 LO5 LO6 LO9
Introduction & Overview; One-Time Pad and Computational Security Independent study (2 hr) LO1 LO2 LO3 LO4 LO5 LO6 LO9
Week 02 Streamciphers & Pseudorandom Generator; Pseudorandom Function Lecture (3.5 hr) LO1 LO2 LO3 LO4 LO5 LO6 LO9
Streamciphers & Pseudorandom Generator; Pseudorandom Function Workshop (1.5 hr) LO1 LO2 LO3 LO4 LO5 LO6 LO9
Streamciphers & Pseudorandom Generator; Pseudorandom Function Independent study (2 hr) LO1 LO2 LO3 LO4 LO5 LO6 LO9
Week 03 Symmetric Key Encryption; Blockcipher & Pseudorandom Permutation Lecture (3.5 hr) LO1 LO2 LO3 LO4 LO5 LO6 LO9
Symmetric Key Encryption; Blockcipher & Pseudorandom Permutation Workshop (1.5 hr) LO1 LO2 LO3 LO4 LO5 LO6 LO9
Symmetric Key Encryption; Blockcipher & Pseudorandom Permutation Independent study (2 hr) LO1 LO2 LO3 LO4 LO5 LO6 LO9
Week 04 Message Authentication Code; Authenticated Encryption Lecture (3.5 hr) LO1 LO2 LO3 LO4 LO5 LO6 LO9
Message Authentication Code; Authenticated Encryption Workshop (1.5 hr) LO1 LO2 LO3 LO4 LO5 LO6 LO9
Message Authentication Code; Authenticated Encryption Independent study (2 hr) LO1 LO2 LO3 LO4 LO5 LO6 LO7 LO8 LO9
Week 05 Key Exchange; Public Key Encryption Lecture (3.5 hr) LO1 LO2 LO3 LO4 LO5 LO6 LO9
Key Exchange; Public Key Encryption Workshop (1.5 hr) LO1 LO2 LO3 LO4 LO5 LO6 LO9
Key Exchange; Public Key Encryption Independent study (2 hr) LO1 LO2 LO3 LO4 LO5 LO6 LO9
Week 06 Digital Signatures; Public Key Infrastructure Lecture (3.5 hr) LO1 LO2 LO3 LO4 LO5 LO6 LO9
Digital Signatures; Public Key Infrastructure Workshop (1.5 hr) LO1 LO2 LO3 LO4 LO5 LO6 LO9
Digital Signatures; Public Key Infrastructure Independent study (2 hr) LO1 LO2 LO3 LO4 LO5 LO6 LO7 LO8 LO9

Study commitment

Typically, there is a minimum expectation of 1.5-2 hours of student effort per week per credit point for units of study offered over a full semester. For a 6 credit point unit, this equates to roughly 120-150 hours of student effort in total.

Learning outcomes are what students know, understand and are able to do on completion of a unit of study. They are aligned with the University's graduate qualities and are assessed as part of the curriculum.

At the completion of this unit, you should be able to:

  • LO1. Understand common cryptography terminology in the literature
  • LO2. Understand the different capabilities and goals of attackers and threats, and how to formally reflect them in security modeling and analysis
  • LO3. Understand major primitives in modern cryptography
  • LO4. Differentiate different cryptographic concepts, and use them properly for corresponding purposes
  • LO5. Demonstrate a high-level knowledge of common approaches to achieve security goals
  • LO6. Understand pitfalls of deploying cryptographic systems in the real world
  • LO7. Produce written reports that evaluate a system's security
  • LO8. Research information on security issues from the literature, and analyse a security incident use case
  • LO9. Design and analyze secure systems using proper cryptographic tools

Graduate qualities

The graduate qualities are the qualities and skills that all University of Sydney graduates must demonstrate on successful completion of an award course. As a future Sydney graduate, the set of qualities have been designed to equip you for the contemporary world.

GQ1 Depth of disciplinary expertise

Deep disciplinary expertise is the ability to integrate and rigorously apply knowledge, understanding and skills of a recognised discipline defined by scholarly activity, as well as familiarity with evolving practice of the discipline.

GQ2 Critical thinking and problem solving

Critical thinking and problem solving are the questioning of ideas, evidence and assumptions in order to propose and evaluate hypotheses or alternative arguments before formulating a conclusion or a solution to an identified problem.

GQ3 Oral and written communication

Effective communication, in both oral and written form, is the clear exchange of meaning in a manner that is appropriate to audience and context.

GQ4 Information and digital literacy

Information and digital literacy is the ability to locate, interpret, evaluate, manage, adapt, integrate, create and convey information using appropriate resources, tools and strategies.

GQ5 Inventiveness

Generating novel ideas and solutions.

GQ6 Cultural competence

Cultural Competence is the ability to actively, ethically, respectfully, and successfully engage across and between cultures. In the Australian context, this includes and celebrates Aboriginal and Torres Strait Islander cultures, knowledge systems, and a mature understanding of contemporary issues.

GQ7 Interdisciplinary effectiveness

Interdisciplinary effectiveness is the integration and synthesis of multiple viewpoints and practices, working effectively across disciplinary boundaries.

GQ8 Integrated professional, ethical, and personal identity

An integrated professional, ethical and personal identity is understanding the interaction between one’s personal and professional selves in an ethical context.

GQ9 Influence

Engaging others in a process, idea or vision.

Outcome map

Learning outcomes Graduate qualities
GQ1 GQ2 GQ3 GQ4 GQ5 GQ6 GQ7 GQ8 GQ9

This section outlines changes made to this unit following staff and student reviews.

This is the first time this unit has been offered.

Disclaimer

The University reserves the right to amend units of study or no longer offer certain units, including where there are low enrolment numbers.

To help you understand common terms that we use at the University, we offer an online glossary.