ITC593 Network Security and Cryptography (8)

ITC593 provides the practical knowledge and skills needed to analyse and work with network security protocols and standards, along with an in-depth introduction to the field of cryptography. The subject explores how contemporary encryption algorithms, digital signatures and cryptographic hash functions are used to implement various security goals, such as authentication, confidentiality and integrity. It also includes a comprehensive coverage of emerging security trends in modern IT infrastructure.


Session 2 (60)
Wagga Wagga Campus
Session 3 (90)
Wagga Wagga Campus

Continuing students should consult the SAL for current offering details: ITC593. Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Subject Information

Grading System



One session


School of Computing, Mathematics and Engineering

Enrolment Restrictions

 Only available to postgraduate students.

Learning Outcomes

Upon successful completion of this subject, students should:
  • be able to identify and explain the various digital threats to IT networks and computing devices;
  • be able to analyse cryptographic algorithms, both symmetrical and asymmetrical, and explain how they are used to improve network security;
  • be able to compare and contrast the features of various authentication protocols;
  • be able to design security solutions using existing authentication protocols;
  • be able to effectively communicate and justify why a Public Key Infrastructure (PKI) is an important component in a network security architecture;
  • be able to investigate and evaluate the current and emerging trends in cryptography and network security; and
  • be able to propose mitigating techniques against cryptographic and network security threats.


This subject will cover the following topics:
  • Introduction to computer and network security
  • Cryptography and its applications in network security
  • Secret key (symmetric) algorithms
  • Public key (asymmetric) algorithms
  • Modes of operation
  • RSA algorithm
  • Authentication systems
  • TLS and IP security
  • User authentication & Kerberos
  • Key Management & Public key infrastructure (PKI)
  • Emerging trends and challenges of network security

Indicative Assessment

The following table summarises the assessment tasks for the online offering of ITC593 in Session 3 2021. Please note this is a guide only. Assessment tasks are regularly updated and can also differ to suit the mode of study (online or on campus).

Item Number
Value %
Online quizzes
Short report and decryption task
Research project
Final exam

The information contained in the CSU Handbook was accurate at the date of publication: May 2022. The University reserves the right to vary the information at any time without notice.