COT5210

Advances in information security

C Avram

6 points
* 4 hours per week
* First semester
* Caulfield
* Prerequisites: COT4230 and COT4350

Objectives At the completion of this subjects students should understand the factors influencing the security of data in distributed systems, especially transaction processing.

Synopsis The security requirements of parties to a transaction: privacy, proof of identity, ownership, licence, signature, notarisation, date of action, certification of origination and/or receipt. Cryptography: types of cryptoanalytic attacks on a cryptosystem, cryptographic systems, protocols. Secret key systems: information theory, one-time pads, DES, pseudorandom number generators and other current developments. Public key systems: one-way functions, public-key distribution, RSA cryptosystems and other current developments. Applications: open-channel key exchange, digital signature, user identification, electronic funds transfer, the electronic wallet, traceable versus untraceable EFT, contract negotiation and signature, smartcard applications.

Assessment Written (3000 words): 50%
* Practical work: 50%

Prescribed texts

Schneies B Applied cryptography 2nd edn, 1995

Back to the Information Technology Handbook, 1998
Handbook Contents | University Handbooks | Monash University


Published by Monash University, Australia
Maintained by wwwdev@monash.edu.au
Approved by M Rambert, Faculty of Information Technology
Copyright © Monash University 1997 - All Rights Reserved - Caution