THE DESIGN AND IMPLEMENTATION OF A CRYPTOGRAPHIC EDUCATION TOOL

Abdrah Abuzaid, Xiaohong Yuan, Bill Chu, Huiming Yu

Abstract

A Cryptographic Education Tool (CET) has been designed and implemented to aid teaching ciphers. This tool exhibits how change case, simple cipher, RSA and SDES work, and guides students step by step to generate encryption keys and uses generated keys to encrypt and decrypt messages. The design principles of the CET are user friendly, visualization-based, and easy to install and use. This tool has been successfully used in the Web Security class for spring 2010 in the Department of Computer Science at North Carolina A&T State University. Our experience exhibits that using this tool in the Web Security course helped students not only better understand the concepts of cryptography, but also gain significant knowledge of various algorithms and processes of key generation, encryption and decryption. Students’ survey and feedback reflected that this tool is very valuable for their educational experience. This tool could also be used in senior cryptography, networking and first year graduate level courses.

References

  1. Bellare, M. and Rogaway, P., 1994, Optimal Asymmetric Encryption - How to Encrypt with RSA, Proceeding of Eurocrypt.
  2. Bishop, M., 2005, Introduction to Computer Security, Addison-Wesley Pearson Education.
  3. Cocks, C., November 1973, A Note on Non-Secret Encryption, CESG report.
  4. Khambari, M., Othman, M., Motsida, M. and Abdollah, M., 2009, A Novel Approach on Teaching Network Security for ICT Courses, Proceedings of IEEE Int. Conf. on Engineering Education.
  5. Perry, R., SDES, Available at: <http://homepage.smc.edu/ morgan_david/vpn/website-perry-sdes/all-sdes.html> (Accessed 1 October 2010).
  6. Schweitzer, D. and Baird, L., 2006, The Design and Use of Interactive Visualization Applets for Teaching Ciphers, Proceedings of the 2006 IEEE Workshop on Information Assurance.
  7. Stallings, W., 2006, Cryptography and Network Security Principles and practices, Fourth edition, Publishing House of Electronics Industry.
  8. Yang, F., Zhong, C., Yin, M. and Huang, Y., 2009, Teaching Cryptology Course Based-on TheoryAlgorithm-Practice-Application Mode, Proceedings of IEEE First Workshop on Education Technology and Computer Science.
Download


Paper Citation


in Harvard Style

Abuzaid A., Yuan X., Yu H. and Chu B. (2011). THE DESIGN AND IMPLEMENTATION OF A CRYPTOGRAPHIC EDUCATION TOOL . In Proceedings of the 3rd International Conference on Computer Supported Education - Volume 1: CSEDU, ISBN 978-989-8425-49-2, pages 193-198. DOI: 10.5220/0003301301930198


in Bibtex Style

@conference{csedu11,
author={Abdrah Abuzaid and Xiaohong Yuan and Huiming Yu and Bill Chu},
title={THE DESIGN AND IMPLEMENTATION OF A CRYPTOGRAPHIC EDUCATION TOOL},
booktitle={Proceedings of the 3rd International Conference on Computer Supported Education - Volume 1: CSEDU,},
year={2011},
pages={193-198},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003301301930198},
isbn={978-989-8425-49-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 3rd International Conference on Computer Supported Education - Volume 1: CSEDU,
TI - THE DESIGN AND IMPLEMENTATION OF A CRYPTOGRAPHIC EDUCATION TOOL
SN - 978-989-8425-49-2
AU - Abuzaid A.
AU - Yuan X.
AU - Yu H.
AU - Chu B.
PY - 2011
SP - 193
EP - 198
DO - 10.5220/0003301301930198