Está en la página 1de 7

TAC3121 Applied Cryptography

Trimester 1, 2017/2018

Overview
TM

Programme Outcomes:
BIT (Hons) ST / DCN
No. Definition
PO1 Apply soft skills in work and career related activities
PO2 Demonstrate knowledge and understanding of fundamental concepts,
principles and best practices
PO3 Analyse the requirements to address problems or opportunities in
relevant domains or organisations
PO4 Recognise and pursue continued life-long learning throughout their
career
PO5 Blend innovative mind and entrepreneurial skills
PO6 Relate moral and ethical values to the practice of a professional
PO7 Demonstrate knowledge and understanding of essential facts, concepts,
principles, and theories relating to security technology
PO8 Apply principles and knowledge of security technology in relevant areas
PO9 Design, integrate, implement and manage information technology
solutions and resources, and recognise the impact of technology on
individuals, organisations and society
2
TM

Subject Learning Outcomes

LO SUBJECT LEARNING OUTCOMES Domain Level


LO1 Recall the definitions of all the concepts and technical Cognitive 1
terms related to fundamental concepts of cryptography.
LO2 Apply fundamental of cryptanalysis concepts in Cognitive 3
cryptographic applications.
LO3 Appraise different security level of various cryptosystems Cognitive 6
between the various cryptographic schemes.
LO4 Analyse and assess the various cryptosystems and Affective 4
applications.
LO5 Implement some simple cryptographic schemes. Cognitive 3

3
TM

Assessment Methods
Assessment Percentage
Test 20%
Quiz 5%
Assignment 15%
Final Exam 60%

Mapping of Assessment to LO
Assessment % LO1 LO2 LO3 LO4 LO5
Components
Test 20 23.53 23.53 23.53
Quiz 5 5.88 5.88 5.88
Assignment 15 100 100
Final Exam 60 70.59 70.59 70.59
Total 100 100 100 100 100 100
4
TM

Consultation
Lecturer & Tutor: Heng Swee Huay (Prof. Dr.)
Office: MNAR 1001/ ITAR 1001
Email: shheng@mmu.edu.my
Lecture
AC1: Tue 10 am-12 noon MSMX0004
Tutorial
AC1A: Wed 8-9 am MSMR3005
AC1B: Tue 9-10 am MSMR3006
AC1C: Wed 2-3 pm MSMR3005
AC1D: Mon 3-4 pm MSMR3005
Consultation Hours
Tue 2-4 pm, Wed 10 am-12 noon
Please email me for appointment other than the above time 5
TM

Lesson Plan
WEEK DATE TOPICS Activities (Hours) REMARKS
E-Learning Lecture Tutorial (Class Replacement/ Public
Holiday)
1. 3 Jul - 9 Jul Introduction Lec (2 hours) Intro (1 hour)
2. Finite Fields and Computational Number
10 Jul - 16 Jul Lec (2 hours) Tut (1 hour)
Theory
3. Finite Fields and Computational Number Quiz BL
17 Jul - 23 Jul Lec (2 hours) Tut (1 hour)
Theory
4. Assignment Released:
24 Jul - 30 Jul Classical Ciphers Lec (2 hours) Tut (1 hour)
24 Jul (Mon)
5. 31 Jul - 6 Aug Asymmetric (Public-Key) Encryption Lec BL Lec (2 hours) Tut (1 hour)
6. 7 Aug - 13 Aug Asymmetric (Public-Key) Encryption Lec (2 hours) Tut (1 hour)
7. 14 Aug - 20 Aug Asymmetric (Public-Key) Encryption Quiz BL Lec (2 hours) Tut (1 hour)
8. Midterm Test (tentative):
21 Aug - 27 Aug Symmetric Encryption Lec (2 hours) Tut (1 hour)
22 Aug (Tue)
9. Lec BL 31 Aug (Thu)-National Day;
28 Aug - 3 Sept Symmetric Encryption Lec (2 hours) Tut (1 hour)
1 Sep (Fri)-Aidil Adha
10. Symmetric Encryption /
4 Sep -10 Sep Lec (2 hours) Tut (1 hour)
Message Authentication and Hash Functions
11. 11 Sep - 17 Sep Message Authentication and Hash Functions Lec (2 hours) Tut (1 hour)
12. 18 Sep - 24 Sep Digital Signature Quiz BL Lec (2 hours) Tut (1 hour) 22 Sep (Fri)-Awal Muharram
13. Assignment Due:
25 Sep 1 Oct Digital Signature Lec (2 hours) Tut (1 hour)
25 Sep (Mon)
14. 2 Oct - 8 Oct Key Establishment and Key Management Lec (2 hours) Tut (1 hour)
15. 9 Oct - 15 Oct Study Break/Exam week - -
16. 16 Oct 22 Oct Exam week - -
17. 23 Oct 29 Oct Exam week - -

6
TM

Textbooks and Reference Books


Textbook 1. William Stallings, (2013). Cryptography and Network Security
- Principles and Practices, 6th Edition, Prentice Hall.

2. Wenbo Mao, (2003). Modern Cryptography:


Theory and Practice, Wiley 2003.

Reference Book 1. D. Stinson, (2002). Cryptography: Theory and Practice, CRC Press Inc., 2nd Edition.
ISBN 1-58488-206-9.
2. Bruce Schneier. Applied Cryptography, 2nd Edition - Protocols, Algorithms and
Source Code in C, John Wiley & Sons. ISBN:0-471-12845-7
3. Alfred J. Menezes, Paul C. van Oorshot and Scott A. Vanstone, (2001). Handbook of
Applied Cryptography, CRC Press.
4. WadeTrappe, Lawrence Washington. Introduction to Cryptography with Coding
Theory, Second Edition, Prentice Hall. ISBN : 0-13-186239-1.
5. M. G. Luby, (1996). Pseudorandomness and Cryptographic Applications, Princeton
University Press.
6. R. E. Smith, (1997). Internet Cryptography, Addison-Wesley.
7

También podría gustarte