Note: This unit version is currently being edited and is subject to change!
ELEC5616: Computer and Network Security (2014 - Semester 1)
|Unit:||ELEC5616: Computer and Network Security (6 CP)|
|Faculty/School:||School of Electrical and Information Engineering|
A/Prof Leong, Philip
|Session options:||Semester 1|
|Versions for this Unit:|
|Site(s) for this Unit:||
|Brief Handbook Description:||This unit examines the basic cryptographic building blocks of security, working through to their applications in authentication, key exchange, secret and public key encryption, digital signatures, protocols and systems. It then considers these applications in the real world, including models for integrity, authentication, electronic cash, viruses, firewalls, electronic voting, risk assessment, secure web browsers and electronic warfare. Practical cryptosystems are analysed with regard to the assumptions with which they were designed, their limitations, failure modes and ultimately why most end up broken.|
|Assumed Knowledge:||A programming language, basic maths.|
Mr Barrie, Matt
|T&L Activities:||Laboratory: One 2-hour lab working on a project.
Project Work - own time: Students will work in groups of 2 to design and build a software security system/
Independent Study: Self study and independent learning is a key to success in this UoS.
Attributes listed here represent the key course goals (see Course Map tab) designated for this unit. The list below describes how these attributes are developed through practice in the unit. See Learning Outcomes and Assessment tabs for details of how these attributes are assessed.
|Attribute Development Method||Attribute Developed|
|Application of knowledge by analysis of current systems, their limitations and failure modes. Different design criteria for security systems are presented and analysed. Students are required to design their own security system in the project work.||Design (Level 4)|
|Gain an understanding of the cryptographic building blocks of security.
Various security systems widely used in real applications are introduced and analysed.
|Engineering/IT Specialisation (Level 5)|
|Master the mathematical and computer science fundamentals of cryptography and security||Maths/Science Methods and Tools (Level 3)|
|Intensive research will be included in the project work and the assignment. Students need to collect comprehensive information from various sources in order to perform well.||Information Seeking (Level 2)|
|Project reports are one of the main assessment elements for the project work. Students need to write concisely, accurately and convincingly. Each team is also required to give a presentation about their project at the end of the semester.||Communication (Level 2)|
|The project work requires students to form groups and manage their progress through the entire project, including conceiving, design, building, testing and demonstrating the project.||Project Management and Team Skills (Level 2)|
For explanation of attributes and levels see Engineering & IT Graduate Outcomes Table.
Learning outcomes are the key abilities and knowledge that will be assessed in this unit. They are listed according to the course goal supported by each. See Assessment Tab for details how each outcome is assessed.Design (Level 4)
Projects: Three project reports plus demo
Assignments: Two assignments
Quizzes: Two quizzes
|Policies & Procedures:||See the policies page of the faculty website at http://sydney.edu.au/engineering/student-policies/ for information regarding university policies and local provisions and procedures within the Faculty of Engineering and Information Technologies.|
Note: Students are expected to have a personal copy of all books listed.
|Online Course Content:||http://www.cryptologic.org/|
|Note on Resources:||
Security Engineering (Wiley), Ross Anderson, 2001.
Applied Cryptography, 2nd Edition (Wiley), Bruce Schneier, 1996
Firewalls and Internet Security: Repelling the Wily Hacker (Addison-Wesley Professional Computing), W R. Cheswick, S M. Bellovin, 1994
Decrypted Secrets (Springer), F. L. Bauer, 1997
Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design (O’Reilly), Electronic Frontier Foundation, 1998
The Code Breakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet (Schribner), David Kahn, 1996
Practical Unix and Internet Security, S Garfinkel and G Spafford, 2 ed. (O'Reilly), 1996
Professional Java Security, J. Garms, D. Somerfield (Wrox), ISBN: 1-861004-25-7.
TCP/IP Illustrated, Volume 1: The Protocols, W. Richard Stevens 1994
Note that the "Weeks" referred to in this Schedule are those of the official university semester calendar https://web.timetable.usyd.edu.au/calendar.jsp
|Week 1||Hash Functions|
|Week 2||Symmetric Cyphers, DES|
|Week 3||Attacks on DES|
|Week 4||Introduction to Number Theory|
|Week 6||Crypto Protocols I|
|Crypto Protocols II|
|Week 8||E-Commerce Protocols|
|Week 9||Overview of Network Security|
|Network Protocols II|
|Network Protocols I|
|Week 10||Hardware Security|
|Week 11||Guest Lecture: Paul "The Duck" Ducklin (Head of Technology, Sophos)|
|The Politics of Crypto|
|Week 12||Live Demo!|
|Modern Multi-stage Malware -- how it works and how to stop it?|
|Exam Period||Assessment Due: Final Exam|
The following is a list of courses which have added this Unit to their structure.
This unit contributes to the achievement of the following course goals:
|Design (Level 4)||Yes||31.66%|
|Engineering/IT Specialisation (Level 5)||Yes||25.41%|
|Maths/Science Methods and Tools (Level 3)||Yes||24.16%|
|Information Seeking (Level 2)||Yes||6.25%|
|Communication (Level 2)||Yes||6.25%|
|Professional Conduct (Level 2)||No||0%|
|Project Management and Team Skills (Level 2)||Yes||6.25%|
These goals are selected from Engineering & IT Graduate Outcomes Table which defines overall goals for courses where this unit is primarily offered. See Engineering & IT Graduate Outcomes Table for details of the attributes and levels to be developed in the course as a whole. Percentage figures alongside each course goal provide a rough indication of their relative weighting in assessment for this unit. Note that not all goals are necessarily part of assessment. Some may be more about practice activity. See Learning outcomes for details of what is assessed in relation to each goal and Assessment for details of how the outcome is assessed. See Attributes for details of practice provided for each goal.