Data security and cryptography
C Avram
6 points * 4 hours per week * First semester * Caulfield * Prerequisites: COT4230 and COT4350
The security requirements of parties to a transaction: privacy, proof of identity, ownership, licence, signature, notarisation, date of action, certification of origination and/or receipt. Cryptography: types of cryptoanalytic attacks on a cryptosystem, cryptographic systems, protocols. Secret key systems: information theory, one-time pads, DES, pseudorandom number generators and other current developments. Public key systems: one-way functions, public-key distribution, RSA cryptosystems and other current developments. Applications: open-channel key exchange, digital signature, user identification, electronic funds transfer, the electronic wallet, traceable versus untraceable EFT, contract negotiation and signature, smartcard applications.
Assessment
Written (3000 words): 50% * Practical work: 50%
Prescribed texts
Salomaa A Public-key cryptography Springer-Verlag, 1990