Credit points: 15

Subject outline

This subject begins with an overview of security attacks onsystem and network services, and a discussion of different existing securitymechanisms. The main focus includes cryptography and its application insystems, networks and web security. The students learn: (1) cryptographicalgorithms and protocols, underlying network security applications includingsingle-key and public-key encryption methods, hash functions, digitalsignatures and key exchange; (2) intrusion detection systems and firewalls thatcan be used to protect a computer system from security threats, such as intruders,viruses, and worm; (3) the use of cryptographic algorithms and securityprotocols for providing network and internet security in terms of userauthentication/identification, IP security and Web security. Students will alsolearn advanced information security through research papers, includingmathematical cryptanalysis on single-key and public-key encryptionalgorithms.

SchoolSchool Engineering&Mathematical Sciences

Credit points15

Subject Co-ordinatorSomnath Ghosh

Available to Study Abroad StudentsYes

Subject year levelYear Level 5 - Masters

Exchange StudentsYes

Subject particulars

Subject rules

Prerequisites CSE5NEF OR admission in one of the following courses: SMIT, SMITCN, SMICT, SMCSC, SGCS, SGIT or SMTNE.


Incompatible subjects CSE3NSW AND Students in the following courses are not permitted to enrol: SBCS, SBIT, SBCSGT, SVCSE, SZCSC, SBITP and SBBIY.

Equivalent subjectsN/A

Special conditionsN/A

Graduate capabilities & intended learning outcomes

01. Analyse system/network security and identify security flaws in a system/network.

Two (1-hour) lectures covering a general introduction to computer system and network security, and a broad overview of the area.

02. Analyse cryptographic algorithms (encryption, hash functions, digital signature, key exchange etc.) and the underlying mathematical structures.

Five lectures on conventional (secret-key) encryption. Two lectures on message confidentiality. Four lectures on public-key cryptography. Two lectures on message authentication. Two associated workshop sessions for each of the topics: Single-key Encryption, Hash Functions, Digital Signatures, and Key Exchange. In each topic students will be given short and application problem statements for discussions. In addition students are required to complete cryptanalysis exercises.

03. Review and test important security tools and applications such as Kerberos, PGP, IPSec and SSL/TLS.

Two lectures and associated workshop exercises.

04. Identify and investigate ethical and social considerations relevant to information privacy and security issues.

One lecture and an associated workshop activity.

05. Review and analyse the functions and operation of firewalls and intrusion detection systems.

Two lectures and one workshop exercise.

06. Analyse system/network vulnerability and design access control mechanisms

Two lectures and one workshop exercise.

Subject options

Select to view your study options…

Start date between: and    Key dates

Melbourne, 2016, Semester 2, Day


Online enrolmentYes

Maximum enrolment sizeN/A

Enrolment information

Subject Instance Co-ordinatorSomnath Ghosh

Class requirements

Lecture Week: 31 - 43
Two 1.0 hours lecture per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.

Practical Week: 31 - 43
One 2.0 hours practical per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.


Assessment elementComments% ILO*
Weekly problem solving/discussion tasks (Approx 500 words)Weekly assessment.10 01, 02, 03, 04, 05, 06
Mid-semester test (approx 1000 words)Conducted in a lecture class in around week 720 01, 02, 03
Exam (2.5 hours - equivalent to approx 2500 words)60 01, 02, 03, 04
Two small programming assignments (together equivalent to approx. 500 words)Hurdle requirement: In order to pass the subject, students must obtain an overall pass grade in the first insatnce, and obtain at least 50% in both the examination and the aggregated non-exam components.10 02, 03