INFO 3006 Information Security

Credit Points 10

Legacy Code 300128

Coordinator Yun Bai Opens in new window

Description Information Security is concerned with the protection and privacy of information in computer systems. The focus is primarily on introducing cryptography concepts, algorithms and protocols in information security and applying such knowledge in the design and implementation of secure computer and network systems. The subject also addresses conventional and public key encryption, number theory and algebra and their application in public key encryption and signatures. Students will learn the application of cryptography algorithms in current computer systems and information security management. This subject also provides students with the practical experience around security programming.

School Computer, Data & Math Sciences

Discipline Security Science

Student Contribution Band HECS Band 2 10cp

Check your fees via the Fees page.

Level Undergraduate Level 3 subject

Pre-requisite(s) MATH 1006 AND
COMP 2009 OR
COMP 2015 OR
COMP 2016

Assumed Knowledge

Basic understanding of data structures and discrete mathematics Basic programming skills in C, C++, java, etc.

Learning Outcomes

On successful completion of this subject, students should be able to:

  1. Describe fundamentals in computer security and basic knowledge in cryptography
  2. Analyse conventional encryption/decryption methods and the concepts of symmetric keys
  3. Design and implement block ciphers and stream ciphers
  4. Evaluate principles of public key cryptosystems and public key algorithms
  5. Master the number theory used in the RSA algorithm, Diffie-Hellman key exchange and digital signatures
  6. Develop authentication functions and hash functions in message authentication
  7. Construct security protocols for complex scenarios, based on theories and principles of information security.

Subject Content

Security, cyberattack and countermeasure, cryptography and steganography
Conventional encryption and DES system
Number Theory and algebra, Modular arithmetic and Euclid's algorithm
Public key encryption and RSA algorithm
Digital signature and authentication protocols
Key distribution and management
Security protocols and various applications in current computer systems
Information Security management


The following table summarises the standard assessment tasks for this subject. Please note this is a guide only. Assessment tasks are regularly updated, where there is a difference your Learning Guide takes precedence.

Type Length Percent Threshold Individual/Group Task
Practical up to 5 pages 25 N Individual
Applied Project 500+ report plus 800+ lines of program code 25 N Individual
Final Exam 2 hours 50 Y Individual

Prescribed Texts

  • Stallings, W. (2017). Cryptography and network security : principles and practice (7th ed.). Boston: Pearson.

Teaching Periods

Spring (2024)

Penrith (Kingswood)


Subject Contact Yun Bai Opens in new window

View timetable Opens in new window

Parramatta - Victoria Rd


Subject Contact Yun Bai Opens in new window

View timetable Opens in new window