COSC437-25S2 (C) Semester Two 2025

Special Topic

15 points

Details:
Start Date: Monday, 14 July 2025
End Date: Sunday, 9 November 2025
Withdrawal Dates
Last Day to withdraw from this course:
  • Without financial penalty (full fee refund): Sunday, 27 July 2025
  • Without academic penalty (including no fee refund): Sunday, 28 September 2025

Description

Special Topic

SPECIAL TOPIC: SECURITY PROTOCOL VERIFICATION

Security protocols, or cryptographic protocols, ensure the reliable communication and data exchange between different entities or systems over the Internet. These protocols are commonly used to protect against unauthorized access, data tampering, and other security threats, which often involve cryptographic techniques to secure the transmission of sensitive information. However, over the years, there have been numerous flaws and exploits found in the design and implementation of cryptographic protocols, such as Heartbleed (2014, Buffer overflow attack on OpenSSL) and KRACK (2017, Key installation attack on WPA2).

COSC437 systematically introduces methodologies that help to exploit flaws in protocol design and to prove that a system is indeed correct. We will study the philosophy underlying security protocol design, analyse attack patterns, and get familiar with formal verification tools. Overall, the course will cover topics in formal methods, applied cryptography, key management, provable security, web3 and blockchain technologies.


PREREQUISITES
COSC362 Data and Network Security or Approval from HOD

Learning Outcomes

  • Become familiar with the cryptographic building blocks and understand how they are used in the design of security protocols;
  • Critically analyse security protocols by using formal analysis;
  • Write code for formal models and prove a claim with formal verification tools;
  • Develop a good understanding that security is always conditional, and a proof of security is only valid under certain assumptions.

Prerequisites

Subject to approval by Head of Department.

Timetable 2025

Students must attend one activity from each section.

Lecture A
Activity Day Time Location Weeks
01 Monday 16:00 - 18:00 Jack Erskine 240
14 Jul - 24 Aug
8 Sep - 19 Oct

Timetable Note

Time Commitment: 150 hours

24hr Lecture (2hr/week – 12 weeks)

126hr Self-directed learning (reading notes, books, and writing code)

Course Coordinator

Chenyi Zhang

Assessment

Assessment Due Date Percentage  Description
Internal assessment 60% Internal assessment
Final Exam 40% Final Exam

Textbooks / Resources

Recommended Reading

Bruce Schneier: Applied Cryptography Protocols, Algorithms, and Source Code in C, John Wiley & Sons 1996, 784 Pages

Leslie Lamport: Specifying systems: the TLA+ language and tools for hardware and software engineers, Addison-Wesley Longman Publishing Co. 2002, 364 pages (available on the internet with video classes)

Arvind Narayanan: Bitcoin and cryptocurrency technologies: a comprehensive introduction, Princeton University Press, 2016.

Additional Course Outline Information

Special Consideration Applications for the Final Exam

Please click HERE for the CSSE Department's policy for the academic remedy of applications for a special consideration for final exams.

Indicative Fees

Domestic fee $1,176.00

International fee $5,475.00

* All fees are inclusive of NZ GST or any equivalent overseas tax, and do not include any programme level discount or additional course-related expenses.

For further information see Computer Science and Software Engineering .

All COSC437 Occurrences

  • COSC437-25S2 (C) Semester Two 2025