Unit rationale, description and aim
With the development of modern electronic cryptographic methods, Number Theory has evolved from a purely abstract subject into one of crucial economic importance securing the vast majority of funds transfers across the world every day. Essentially all secure electronic communication now relies upon elementary number theory results. The unit also considers the ethics surrounding the use of strong cryptography and the tension between the needs of vulnerable and sometimes oppressed peoples and the need to restrict criminal behaviour. The widespread use and application of cryptocurrencies to support vulnerable and oppressed peoples will be contrasted to the current restricted use as a simple commodity.
This unit uses the mathematical knowledge and understanding developed in earlier units to introduce some of the ideas and applications of Cryptography. The study of cryptographic algorithms such as RSA is supported by consideration of topics from number theory including congruences, primality and factorisation. Digital signature schemes will be introduced, including the need for such schemes. The ethics surrounding the use of cryptographic systems will be considered, as well as the counter-intuitive idea that a study of cryptanalysis strengthens cryptography.
The aim of this unit is to provide students with an understanding of the central role number theory has in modern cryptography and knowledge of a wide variety of number theoretic ideas and techniques. Students will also have an appreciation of the risks and benefits of and some of the requirements needed to support secure cryptography. The applications of cryptography will support a consideration of how careful use of these tools can promote social good, but also how careless use can result in significant harm.
Learning outcomes
To successfully complete this unit you will be able to demonstrate you have achieved the learning outcomes (LO) detailed in the below table.
Each outcome is informed by a number of graduate capabilities (GC) to ensure your work in this, and every unit, is part of a larger goal of graduating from ACU with the attributes of insight, empathy, imagination and impact.
Explore the graduate capabilities.
Use arithmetic modulo an integer to solve simple p...
Learning Outcome 01
Successfully factorise relatively small integers a...
Learning Outcome 02
Solve simple Diophantine equations
Learning Outcome 03
Apply the Chinese Remainder Theorem to relevant pr...
Learning Outcome 04
Explain the basic problems involved with cryptogra...
Learning Outcome 05
Demonstrate understanding of the RSA scheme or a s...
Learning Outcome 06
Demonstrate some understanding of the ethical and ...
Learning Outcome 07
Content
Topics will include:
- Type of numbers from counting to complex numbers, including motivations for extending the idea of number
- Divisibility results, primes
- Greatest common divisor, Euclid’s algorithm
- Introduction to Congruences – definitions and arithmetic
- Euler’s -function, powers, logs and squares modulo m, Fermat’s little Theorem
- Diophantine equations.
- The Chinese Remainder Theorem
- Introduction to cryptography the problems and solutions
- RSA
- Digital signatures and key exchange problems, including the Diffie-Hellman algorithm for publicly exchanging a private key
Assessment strategy and rationale
To successfully complete an undergraduate Mathematics sequence, students need an understanding of a variety of basic Mathematical topics and an ability to apply that understanding to a variety of problems. To succeed at problem solving in Mathematics, students must have these skills at their fingertips and be able to recall them and choose an appropriate approach under some pressure. The assessment strategy chosen, while traditional, tests and supports student learning by providing opportunities to develop and test their problem-solving skills through the unit.
Any detailed discussion of cryptography is obliged to address the ethical and social aspects of using and of not using those techniques. Virtually all applications of cryptography involve striking a balance between supporting the individual’s (or group’s or company’s or country’s) right to privacy and the risk of concealing criminal (or despotic) activity. The assessment schedule includes a group project that will require students to develop arguments for or against the use of cryptography in a recent historical event and to critically analyse another such argument. These reports will be submitted via Turnitin.
The examination components ensure that students have fully integrated the learning and can bring a variety of strategies to bear under pressure.
Typing of Mathematical notation either requires a significant investment of time, or knowledge of advanced Mathematical typesetting software. Neither of those skills are suitable for an undergraduate course in Mathematics. Consequently, assignments, tests and examinations are typically handwritten and either submitted as hardcopy or scanned and submitted to a dropbox, rather than through Turnitin. Students may choose to type their responses and submit them electronically, but this is not a requirement of the unit.
Overview of assessments
Group project addressing ethical aspects of crypt...
Group project addressing ethical aspects of cryptography
30%
In-class test in 1 or 2 parts
In-class test in 1 or 2 parts
30%
Examination
Examination
40%
Learning and teaching strategy and rationale
As is common in Mathematics a variety of Active Learning approaches promote the best acquisition of skills and understanding. Lectures will typically be structured to provide explanations of the material to be covered, along with examples of the applications of that material, as well as formal and informal tasks for students that will reinforce that learning. Splitting the taught content of the lectures into short topics will ensure increased student engagement with the material, as well as providing opportunities for students to consolidate their learning before new material is covered. This allows students to learn the skills and then build understanding, competence and confidence via (ideally, face-to-face) tutorials involving cooperative groups, peer review and other relevant strategies. In all cases this should be supported using available online technology.
This unit will normally include the equivalent of 24 hours of lectures (typically 2 hours per week for 12 weeks) together with 24 hours attendance mode tutorials. Lectures will also be recorded and, where possible or required, students may have access to an online tutorial.
150 hours in total with a normal expectation of 48 hours of directed study and the total contact hours should not exceed 48 hours. The balance of the hours becoming private study.