Monash University Computing & Information Technology handbook 1995

Copyright © Monash University 1995
Enquiries to publishing@udev.monash.edu.au

COT5210

Data security and cryptography

C Avram

6 points * 4 hours per week * First semester * Caulfield * Prerequisites: COT4230 and COT4350

The security requirements of parties to a transaction: privacy, proof of identity, ownership, licence, signature, notarisation, date of action, certification of origination and/or receipt. Cryptography: types of cryptoanalytic attacks on a cryptosystem, cryptographic systems, protocols. Secret key systems: information theory, one-time pads, DES, pseudorandom number generators and other current developments. Public key systems: one-way functions, public-key distribution, RSA cryptosystems and other current developments. Applications: open-channel key exchange, digital signature, user identification, electronic funds transfer, the electronic wallet, traceable versus untraceable EFT, contract negotiation and signature, smartcard applications.

Assessment

Written (3000 words): 50% * Practical work: 50%

Prescribed texts

Salomaa A Public-key cryptography Springer-Verlag, 1990


Return to subject list Return to computing handbook contents Return to the list of Monash handbooks