The Importance of the Using Software Tools for Learning Modern Cryptography

Total Page:16

File Type:pdf, Size:1020Kb

The Importance of the Using Software Tools for Learning Modern Cryptography See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/322578255 The Importance of the Using Software Tools for Learning Modern Cryptography Article in International Journal of Engineering Education · January 2018 CITATIONS READS 2 2,151 4 authors: Saša Ž Adamović Marko Šarac Singidunum University Singidunum University 96 PUBLICATIONS 86 CITATIONS 50 PUBLICATIONS 99 CITATIONS SEE PROFILE SEE PROFILE Dušan Stamenković Dalibor Radovanovic Singidunum University Singidunum University 12 PUBLICATIONS 7 CITATIONS 28 PUBLICATIONS 48 CITATIONS SEE PROFILE SEE PROFILE Some of the authors of this publication are also working on these related projects: Sinteza - International Scientific Conference on ICT and Data Related Research View project SITCON 2020 - Singidunum International Tourism Conference View project All content following this page was uploaded by Saša Ž Adamović on 06 March 2018. The user has requested enhancement of the downloaded file. International Journal of Engineering Education Vol. 34, No. 1, pp. 256±262, 2018 0949-149X/91 $3.00+0.00 Printed in Great Britain # 2018 TEMPUS Publications. The Importance of the Using Software Tools for Learning Modern Cryptography* SASA ADAMOVIC, MARKO SARAC, DUSAN STAMENKOVIC and DALIBOR RADOVANOVIC Department of Computer Science, Singidunum University, Belgrade, Serbia. E-mail: [email protected], [email protected], [email protected], [email protected] Because of the wide application of cryptographic mechanisms in private and business environments, a cryptography course at many universities has the great importance today. An undergraduate cryptography course is mathematically demanding, and it is quite difficult for students with poor background to follow the course syllabus. This paper presents the use of interactive software in demonstrating basic cryptology principles in modern cryptography. The teaching methodology applied fosters students experimental work and engages students in discussions to resolve problems. The data are taken in three consecutive school years (around 150 participants), when we used to apply ordinary teaching practices, and when we switched to the interactive teaching approach. The assessment method was the attendance of students in the classroom, which has increased signi®cantly during the semester. At the grade level of the student we noticed better grade distribution, with higher average grade. Keywords: cryptography; educational software; interactive teaching 1. Introduction come in 48 hours, which is the typical duration of one-semester cryptography course. As information security becomes more and more important, cryptographic mechanisms have become 1.2 Students poor mathematical background an indispensable component of every information To be able to study the cryptographic systems, system. Data and information stored in warehouses students are expected to have strong mathematical and passing through communication channels must knowledge, especially in disciplines such as number be protected. The use of cryptographic mechanisms theory, abstract algebra, probability and statistics. and protocols can solve many security problems Also, understanding the basics of computer net- (integrity, con®dentiality, authenticity and non- works is a necessary prerequisite. For example, a repudiation of information). Although cryptogra- student not taking a course in discrete mathematics phy initially originated in the military, nowadays its will not understand Euler's theorem, which will use has widely expanded to different civil areas, such subsequently cause problems with understanding as Internet banking, electronic commerce, and the RSA algorithm and Advanced Encryption Stan- social networks. Development of cryptographic dard (AES). technologies has a direct impact on economic, sociological and political aspects of the society in 1.3 Lack of student's experimental work general. On the one hand, the ubiquitous crypto- graphy usage today raises importance of a crypto- Although almost all universities have modern elec- graphy course at the university. On the other hand, tronic laboratories with networked computers and cryptography instructors are faced with some of the Internet access, teaching practices in a cryptogra- following challenges in implementing the course phy course at many universities do not include syllabus. experimentation. This lack of practical application of cryptography is the main reason for students lack of interest in doing the course work. This paper 1.1 Insufficient number of class hours describes one possible approach to increase students Cryptography is closely related to other sciences; it interest in a cryptography course and presents is an intersection of mathematics, communications, methods which are completely ¯exible and allow computer science, and data processing. Thus, the for different approaches to teaching. fundamentals of cryptography lie deep in applied number theory and abstract algebra. The main 2. Related work application of cryptography is protection of com- puter networks. Besides different mathematical Cryptography is a discipline with strong mathema- background, students have different academic inter- tical basis because the security of a cryptosystem is ests. These circumstances are quite difficult to over- often based on the inability to efficiently solve a 256 * Accepted 26 August 2017. The Importance of the Using Software Tools for Learning Modern Cryptography 257 problem in algebra, number theory, or combinato- as well as certain cryptographic techniques. Fig. 1 rics. Since many students have found cryptography shows the building blocks of the course. to be a hard-to-master topic, many instructors have Students enrolled in the course come with differ- made attempts to adapt their teaching methods to ent background and face a severe learning difficulty be ¯exible enough. For example, one such approach which directly lowers their interest for the course. to get students interested in the topic is described by For that reason, the main idea was to increase authors [1, 2] analyze 20 selected academic courses students interest for cryptography by using inter- in cryptology with respect to their aim, scope, active software that is easy to understand. An content, organization, and literature recommended additional goal was also to try to create an atmo- to students, ®nally proposing the curricula tailored sphere in which students better understand theory for different categories of students. In closely related and at the same time improve their ability to analyze paper authors [3, 4] propose a ``theory-algorithm- and solve problems. In summary, the new imple- practice-application'' teaching mode, which has mentation of the course syllabus was to emphasize proved to be efficient in achieving better teaching understanding of the principles of information results and in helping students to solve practical security, cryptographic algorithms, and security cryptography problems encountered in the engi- services (authentication, authorization, con®denti- neering. Authors [5±7] used different concepts for ality, non-repudiation and availability), as well as to learning cryptography and algorithms with the help provide practical examples which integrate theory of interactive animations. In this way, signi®cantly with practice. better results were achieved in understanding the There are not many simulation environments for concept of cryptographic algorithms. Authors [8] learning cryptography that allows students to various concepts in the cryptographic domain and develop complex scenarios. For example, the imple- the relations among them as the ontology, and mentation of various security protocols in a real propose a way of utilizing it in the learning process. network environment, in which more student com- Should be remembered that learning domain is puters can participate in the same simulation. Such cryptography in network security. functionality is provided to network components specially developed in a development environment 3. Interactive cryptography that allow the exchange of different types of data and network synchronization. Most environments Students evaluations of our beginning cryptogra- only demonstrate the use of certain cryptographic phy course have clearly shown that the plain algorithms. For example, users select the encryption textbook-theoretical approach to teaching crypto- algorithm, then select the key and enter the message graphy that we used to apply simply was not they want to encrypt, and after that they get an satisfactory. That's why we subsequently decided encrypted message as a result. Such tools are not to shift to interactive approach by introducing the useful enough if students want to understand com- open-source cryptography software CrypTool 2.0. plex cryptographic scenarios or scenarios for cryp- The course makeover required substantial instruc- tanalysis more deeply. The most well-known tor and teaching assistant efforts, especially when cryptographic environments that besides the devel- choosing the right examples to illustrate the most opment of more complex scenarios allow for visua- commonly used cryptography algorithms and pro- lization are GRASP tool [9] and Cryptool 2 [1], and tocols. This section describes our teaching experi- besides them there is Grace tool [10], Kerberos tool ence and analyzes students results which con®rm [11] (visualizing Kerberos protocol) and Game tool that teaching cryptography interactively,
Recommended publications
  • An Advance Visual Model for Animating Behavior of Cryptographic Protocols
    An Advance Visual Model for Animating Behavior of Cryptographic Protocols Mabroka Ali Mayouf Maeref1*, Fatma Alghali2, Khadija Abied2 1 Sebha University, Faculty of Science, Department of Computer Science, P. O. Box 18758 Sebha, Libya, Libyan. 2 Sebha University of Libya, Sebha, Libya. * Corresponding author. Tel.: 00218-925132935; email: [email protected] Manuscript submitted February 13, 2015; accepted July 5, 2015. doi: 10.17706/jcp.10.5.336-346 Abstract: Visual form description benefits from the ability of visualization to provide precise and clear description of object behavior especially if the visual form is extracted from the real world. It provides clear definition of object and the behavior of that object. Although the current descriptions of cryptographic protocol components and operations use a different visual representation, the cryptographic protocols behaviors are not actually reflected. This characteristic is required and included within our proposed visual model. The model uses visual form and scenario-based approach for describing cryptographic protocol behavior and thus increasing the ability to describe more complicated protocol in a simple and easy way. Key words: Animation, cryptographic protocols, interactive tool, visualization. 1. Introduction Cryptographic protocols (CPs) mostly combine both theory and practice [1], [2]. These cause protocol complexity describing and understanding. Therefore, separating the mathematical part from the protocol behavior should provide feeling of how the protocol works, thus increasing the ability to describe and to gain confidence in reflecting more complicated information about CPs, as well as to generate interest to know about other more complex protocol concepts. Several researchers realized the use of visual model and animation techniques to reflect the explanation of the learning objectives and their benefits [3]-[11].
    [Show full text]
  • Implementation and Didactical Visualization of the Chacha Cipher Family in Cryptool 2
    Implementation and Didactical Visualization of the ChaCha Cipher Family in CrypTool 2 Bachelor’s Thesis Ramdip Gill Supervisor Priv.-Doz. Dr. Wolfgang Merkle Second Supervisor Prof. Dr. Frederik Armknecht Heidelberg, December 11, 2020 Faculty of Mathematics and Computer Science Heidelberg University ABSTRACT This thesis is about the implementation of the ChaCha plug-in in CrypTool 2. The thesis introduces the ChaCha cipher family, explains what the plug-in is capa- ble of, and gives insight into the development process of the plug-in. ChaCha is used in the Transport Layer Security protocol (TLS) since 2014 and so very relevant for applied modern cryptography. Because of the importance of ChaCha its internal design should be made more accessible to the broader public. This is the actual goal of the plug-in. The goal is achieved by focusing on an in-depth but easy to understand visualiza- tion of the encryption process. CrypTool 2 is the most popular e-learning platform in the field of cryptology, used in schools, universities, and companies. Incorporat- ing this plug-in into CrypTool 2 helps to reach a broad audience. iii ZUSAMMENFASSUNG Diese Bachelorarbeit befasst sich mit der Implementierung des ChaCha Plugins für CrypTool 2. Die Arbeit stellt die Familie der ChaCha-Chiffren vor; erklärt, wozu das Plugin in der Lage ist; und gibt Einblick in den Entwicklungsprozess des Plugins. ChaCha wird seit 2014 im Transport Layer Security-Protokoll (TLS) verwendet und ist daher für die angewandte moderne Kryptographie sehr relevant. Aufgrund der Bedeutung von ChaCha sollte sein internes Design der breiten Öffentlichkeit zu- gänglicher gemacht werden.
    [Show full text]
  • Cryptology with Jcryptool V1.0
    www.cryptool.org Cryptology with JCrypTool (JCT) A Practical Introduction to Cryptography and Cryptanalysis Prof Bernhard Esslinger and the CrypTool team Nov 24th, 2020 JCrypTool 1.0 Cryptology with JCrypTool Agenda Introduction to the e-learning software JCrypTool 2 Applications within JCT – a selection 22 How to participate 87 JCrypTool 1.0 Page 2 / 92 Introduction to the software JCrypTool (JCT) Overview JCrypTool – A cryptographic e-learning platform Page 4 What is cryptology? Page 5 The Default Perspective of JCT Page 6 Typical usage of JCT in the Default Perspective Page 7 The Algorithm Perspective of JCT Page 9 The Crypto Explorer Page 10 Algorithms in the Crypto Explorer view Page 11 The Analysis tools Page 13 Visuals & Games Page 14 General operation instructions Page 15 User settings Page 20 Command line parameters Page 21 JCrypTool 1.0 Page 3 / 92 JCrypTool – A cryptographic e-learning platform The project Overview . JCrypTool – abbreviated as JCT – is a free e-learning software for classical and modern cryptology. JCT is platform independent, i.e. it is executable on Windows, MacOS and Linux. It has a modern pure-plugin architecture. JCT is developed within the open-source project CrypTool (www.cryptool.org). The CrypTool project aims to explain and visualize cryptography and cryptanalysis in an easy and understandable way while still being correct from a scientific point of view. The target audience of JCT are mainly: ‐ Pupils and students ‐ Teachers and lecturers/professors ‐ Employees in awareness campaigns ‐ People interested in cryptology. As JCT is open-source software, everyone is capable of implementing his own plugins.
    [Show full text]
  • Higher Education in Serbia - Numbers and Figures
    13.6.2018. Study Visit with Coordination Meetings University of Twente, Enschede , Netherlands 10th - 14th June 2018 Higher education in Serbia - numbers and figures - Zorana Lužanin University of Novi Sad [email protected] 2017 New Law on Higher Education: external quality control every seven years Action Plan for Implementation of the Strategy ( 90/157 ) 2012 Strategy for Education Development in Serbia 2020 (4/9 ) 2007 Accreditation –” 1st round ” National Council for Higher Education (NCHE) 2006 Commission for Accreditation and Quality Assurance (CAQA) 2005 Law on Higher Education: external quality control every five years ; self- evaluation every three years 2003 Serbia joined the Bologna process 1 13.6.2018. Commission for Accreditation and Quality Assurance: ACCREDITATION EXTERNAL QUALITY CONTROL RULES AND REGULATIONS ON ACCREDITATION RULES AND REGULATIONS ON STANDARD STANDARDS AND PROCEDURES FOR HIGHER PROCEDURES OF EXTERNAL QUALITY CONTROL EDUCATION INSTITUTIONS AND THEIR (2006) STUDY PROGRAMMES (2006) the process resulting in a formal decision resulting in recommendations instead of decisions evaluation of minimum requirements evaluation of work of a HEI, not in view of (quality threshold): yes/no minimum requirement Higher education institutions (Article 43): 1) universities; 19 2) faculties or academies of arts within universities; 125 3) academies of professional career studies; 0 4) four-year colleges; 3 5) four-year colleges of professional career studies (colleges of applied studies) 55 0 3 19 55 125 2 13.6.2018. HEIs students universities 19 218231 colleges of applied sciences 55 43877 Number of HEIs Number of students on HEIs universities 26% colleges of applied sciences 27% universities colleges of 73% applied sciences 74% HEIs Students 2016/17.
    [Show full text]
  • Visualization of the Avalanche Effect in CT2
    University of Mannheim Faculty for Business Informatics & Business Mathematics Theoretical Computer Science and IT Security Group Bachelor's Thesis Visualization of the Avalanche Effect in CT2 as part of the degree program Bachelor of Science Wirtschaftsinformatik submitted by Camilo Echeverri [email protected] on October 31, 2016 (2nd revised public version, Apr 18, 2017) Supervisors: Prof. Dr. Frederik Armknecht Prof. Bernhard Esslinger Visualization of the Avalanche Effect in CT2 Abstract Cryptographic algorithms must fulfill certain properties concerning their security. This thesis aims at providing insights into the importance of the avalanche effect property by introducing a new plugin for the cryptography and cryptanalysis platform CrypTool 2. The thesis addresses some of the desired properties, discusses the implementation of the plugin for modern and classic ciphers, guides the reader on how to use it, applies the proposed tool in order to test the avalanche effect of different cryptographic ciphers and hash functions, and interprets the results obtained. 2 Contents Abstract .......................................... 2 Contents .......................................... 3 List of Abbreviations .................................. 5 List of Figures ...................................... 6 List of Tables ....................................... 7 1 Introduction ..................................... 8 1.1 CrypTool 2 . 8 1.2 Outline of the Thesis . 9 2 Properties of Secure Block Ciphers ....................... 10 2.1 Avalanche Effect . 10 2.2 Completeness . 10 3 Related Work ..................................... 11 4 Plugin Design and Implementation ....................... 12 4.1 General Description of the Plugin . 12 4.2 Prepared Methods . 14 4.2.1 AES and DES . 14 4.3 Unprepared Methods . 20 4.3.1 Classic Ciphers, Modern Ciphers, and Hash Functions . 20 4.4 Architecture of the Code . 22 4.5 Limitations and Future Work .
    [Show full text]
  • CEH: Certified Ethical Hacker Course Content
    CEH: Certified Ethical Hacker Course ID #: 1275-100-ZZ-W Hours: 35 Course Content Course Description: The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in. The CEH, is the first part of a 3 part EC-Council Information Security Track which helps you master hacking technologies. You will become a hacker, but an ethical one! As the security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment. This course was designed to provide you with the tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. It puts you in the driver’s seat of a hands-on environment with a systematic ethical hacking process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be thought the Five Phases of Ethical Hacking and thought how you can approach your target and succeed at breaking in every time! The ve phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks. The tools and techniques in each of these five phases are provided in detail in an encyclopedic approach to help you identify when an attack has been used against your own targets.
    [Show full text]
  • Ww.Univerzitetps.Com Dear Sir Or Madam
    ww.univerzitetps.com Dear Sir or Madam, We are pleased to inform you that The Fifth International Academic Conference “Science and Practice of Business Studies” will be held on 15th September, 2017 at The University of Business Studies in Banja Luka. Topics: 01 ECONOMIC STUDIES 1. New economy, the challenges and the state of the domestic market 2. Strategies of management as the drivers of competitiveness 3. Economic relations in the process of globalization 4. Forensic Accounting and Auditing 5. Management control system 02 ENVIRONMENTAL STUDIES 1. Ecology and Sustainable Development 2. Biodiversity and Biodiversity Protection 3. Solving health and environmental problems 4. Organic Agriculture 03 LEGAL STUDIES 1. Local self-government in the function of society development 2. Regulations in BiH paving the way to the European Union 3. Judicial authorities and crime prevention 4. Law and legal security in business operations 04 TOURISM AND HOSPITALITY STUDIES 1. The importance of cultural and historical heritage of the Republic of Srpska in tourism development 2. Tourism as a driver of the regional development 3. The integration of Bosnia and Herzegovina in the European and global tourism trends 05 INFORMATION AND DESIGN STUDIES 1. Internet of Things (IoT) 2. Big Data 3. Education and design 4. Design as culture 5. Design and space 06 FOREIGN LANGUAGES IN BUSINESS STUDIES ACADEMIC COMMITTEE: 1. Prof. dr Marko Rajčević, The Faculty of Law, University of Banja Luka 2. Prof. dr Boris Tihi, Academy of Science B&H (full member), The Faculty of Economics, University of Sarajevo 3. Prof. dr Valery Zusman, National Research University, Higher School of Economics, Novgorod, Russia 4.
    [Show full text]
  • A Matter of Security, Privacy and Trust
    A matter of security, privacy and trust: A study of the principles and values of encryption in New Zealand Michael Dizon Ryan Ko Wayne Rumbles Patricia Gonzalez Philip McHugh Anthony Meehan Acknowledgements This study was funded by grants from the New Zealand Law Foundation and the University of Waikato. We would like to express our gratitude to our project collaborators and members of the Advisory Board – Prof Bert-Jaap Koops (Tilburg University), Prof Lyria Bennett Moses (UNSW Sydney), Prof Alana Maurushat (Western Sydney University), and Associate Professor Alex Sims (University of Auckland) – for their support as well as feedback on specific parts of this report. We would also like to thank Patricia Gonzalez, Joseph Graddy, Philip McHugh, Anthony Meehan, Jean Murray and Peter Upson for their valuable research assistance and other contributions to this study. Michael Dizon, Ryan Ko and Wayne Rumbles Principal investigators December 2019 Executive summary Cybersecurity is crucial for ensuring the safety and well-being of the general public, businesses, government, and the country as a whole. New Zealand has a reasonably comprehensive and well-grounded legal regime and strategy for dealing with cybersecurity matters. However, there is one area that deserves further attention and discussion – encryption. Encryption is at the heart of and underpins many of the technologies and technical processes used for computer and network security, but current laws and policies do not expressly cover this significant technology. The principal objective of this study is to identify the principles and values of encryption in New Zealand with a view to informing future developments of encryption- related laws and policies.
    [Show full text]
  • [email protected], [email protected] Www
    PERSONAL INFORMATION Name MARKO STOJANOVIĆ Address Telephone Mobil Fax E-mail [email protected], [email protected] Web www.worldmime.org and www.curling.rs Nationality Serbian Date of birth 2ND of January 1971. WORK EXPERIENCE • Dates (from – to) From 2013 to date • Name and address of employer BELGRADE YOUTH CENTRE “DOM OMLADINE BEOGRADA”, Makedonska 22, 11000 Belgrade, Telephone: + 381 (0) 11 322 01 27, www.domomladine.org; [email protected] • Type of business or sector Belgrade Youth Centre is a cultural institution of the City of Belgrade • Occupation or position held Acting GENERAL MANAGER and Director of the Belgrade Jazz Festival • Main activities and responsibilities Organising work process and managing employees as well as artists and finances. Development and improvement of programs, work processes and financial situation. Developing relationships with Belgrade, Serbian and international youth as primary audience, but with city and state governments, core diplomatique, ngo's, youth, educational and artistic institutions, formal and informal groups and individuals. Produceing the Belgrade Jazz Festival since 1971. • Dates (from – to) From 2013 and 2014 • Name and address of employer SINGIDUNUM UNIVERSITY, Danijelova 32, 11000 Belgrade, Telephone: + 381 (0) 11 3093 220, www.singidunum.ac.rs ; [email protected] • Type of business or sector Management and Communication • Occupation or position held LECTURER AND PR CONSULTANT • Main activities and responsibilities Teaching Communication Skills and Public
    [Show full text]
  • Akademik Bilişim Konferansları Kurs Öneri Formu, V2.1 (Formun Sonundaki Notlar Bölümünü Lütfen Okuyunuz) B
    Akademik Bilişim Konferansları www.ab.org.tr Kurs Öneri Formu, v2.1 (Formun Sonundaki Notlar Bölümünü Lütfen Okuyunuz) Bölüm 1: Öneri Sahibi Eğitmene Ait Bilgiler 1. Adı, Soyadı Pınar Çomak Varsa, diğer eğitmenlerin ad ve soyadları 2. Ünvanı/Görevi Araştırma Görevlisi 3. Kurum/Kuruluş Orta Doğu Teknik Üniversitesi 4. E-posta [email protected] 5. Telefonları, iş ve/veya cep 0312 210 2987 6. Varsa, web sayfası URL 7. Eğitmenin Kısa Biyografisi Lisans eğitimini 2009 yılında ODTÜ Matematik bölümünde, yüksek lisans eğitimini 2012 yılında ODTÜ Uygulamalı Matematik Enstütüsü Kriptografi programında tamamladı. 2012 yılından bu yana Kriptografi programında doktora eğitimini sürdürmekte. 2011 yılından bu yana ODTÜ Matematik Bölümde araştırma görevilisi olarak çalışmakta. Çalışma alanı açık anahtarlı kriptografik sistemler ve kriptografik fonksiyonlardır. 8. Eğitmenin Banka Hesap Numarası (tercihan IBAN olarak) 9. Tarih 11.11.2016 Bölüm 1: Öneri Sahibi Eğitmene Ait Bilgiler 10. Adı, Soyadı Halil Kemal Taşkın Varsa, diğer eğitmenlerin ad ve soyadları 11. Ünvanı/Görevi 12. Kurum/Kuruluş Orta Doğu Teknik Üniversitesi 13. E-posta [email protected] 14. Telefonları, iş ve/veya cep 05057941029 15. Varsa, web sayfası URL 16. Eğitmenin Kısa Biyografisi 2011 yılında ODTÜ UME Kriptografi Yüksek Lisans programından mezun oldu. Halen aynı bölümde doktora eğitimine devam etmektedir. 2013 yılından beri Bilgi Güvenliği Uzmanı olarak Oran Teknoloji bünyesinde çalışmalarını sürdürmektedir. Çalışma alanları arasında eliptik eğri kriptografi, kriptografik protocol tasarımı bulunmaktadır. 17. Eğitmenin Banka Hesap Numarası (tercihan IBAN: TR690006400000142291106513 IBAN olarak) 18. Tarih 11.11.2016 Bölüm 1: Öneri Sahibi Eğitmene Ait Bilgiler 19. Adı, Soyadı Oğuz Yayla AB-Kurs-Vermek-Icin-Talep-Formu-2015-11-18-v2.1.docx Sayfa 1/ 2 Varsa, diğer eğitmenlerin ad ve soyadları 20.
    [Show full text]
  • Cryptool 2 in Teaching Cryptography
    Journal of Computations & Modelling, vol.4, no.1, 2014, 349-358 ISSN: 1792-7625 (print), 1792-8850 (online) Scienpress Ltd, 2014 Cryptool 2 in Teaching Cryptography Major Konstantinos Loussios1 Abstract. Considering the value it had in the past, has continued to the present and will continue to have, perhaps to an even greater extent in the future concealing information during transmission or transport, leads automatically to attempt to discover the importance and the value of the means, methods and techniques used to implement the concealment. Cryptography is a branch of computer science attracts the attention with its great utility that has nowadays. Given therefore deemed necessary to standardize, analyze and present the encryption algorithms to learning and training on the operation with as efficiently and easily as possible. Having in mind that the theory must be accompanied by practice and examples that help to consolidate the syllabi material, we felt that the analytical presentation of an educational tool on learning algorithms of cryptography is a way of learning while embedding. The learning tool cryptool 2 is an implementation of all the above, and through this we will try to show, those essential functions, which help the user with visual and practical way, to see in detail all the properties and functional details of the algorithms contained, will present representative examples of functioning algorithms, we proceed to create digital signatures and will implement the cryptanalysis algorithms. The above is an object of study and teaching in the professional area of land, in the field of communications and transmissions-service systems. Knowing, however, that historically since the antiquity, first we Greeks, we use encryption in a simple form, for military purposes, but later down through the years and fighting wars around the world, the art encryption and decryption evolved and became object of all armies and weapons.
    [Show full text]
  • Analysis and Implementation of the Messaging Layer Security Protocol
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by AMS Tesi di Laurea Alma Mater Studiorum · Universita` di Bologna CAMPUS DI CESENA Dipartimento di Informatica - Scienza e Ingegneria Corso di Laurea Magistrale in Ingegneria e Scienze Informatiche Analysis and Implementation of the Messaging Layer Security Protocol Tesi in Sicurezza delle Reti Relatore: Presentata da: Gabriele D'Angelo Nicola Giancecchi Anno Accademico 2018/2019 Parole chiave Network Security Messaging MLS Protocol Ratchet Trees \Oh me, oh vita! Domande come queste mi perseguitano. Infiniti cortei d'infedeli, citt`agremite di stolti, che v'`edi nuovo in tutto questo, oh me, oh vita! Risposta: Che tu sei qui, che la vita esiste e l’identit`a. Che il potente spettacolo continua, e che tu puoi contribuire con un verso." - Walt Whitman Alla mia famiglia. Introduzione L'utilizzo di servizi di messaggistica su smartphone `eincrementato in maniera considerevole negli ultimi anni, complice la sempre maggiore disponi- bilit`adi dispositivi mobile e l'evoluzione delle tecnologie di comunicazione via Internet, fattori che hanno di fatto soppiantato l'uso dei classici SMS. Tale incremento ha riguardato anche l'utilizzo in ambito business, un contesto dove `epi`ufrequente lo scambio di informazioni confidenziali e quindi la necessit`adi proteggere la comunicazione tra due o pi`upersone. Ci`onon solo per un punto di vista di sicurezza, ma anche di privacy personale. I maggiori player mondiali hanno risposto implementando misure di sicurezza all'interno dei propri servizi, quali ad esempio la crittografia end-to-end e regole sempre pi`ustringenti sul trattamento dei dati personali.
    [Show full text]