Kharkiv National Pedagogical University

Slides:



Advertisements
Similar presentations
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Advertisements

Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
 8 groups of 2  5 rounds  Basic Definitions  Substitution Cryptosystems  Math  Tricky Questions  Comparing Cryptosystems  10 questions per round.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.
Introduction to Public Key Cryptography
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Cryptography Week-6.
Computer encryption is… Based on the science of cryptography.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Cryptography, Authentication and Digital Signatures
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Midterm Review Cryptography & Network Security
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Darci Miyashiro Math 480 April 29, 2013
Encryption.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.
Public Key Encryption.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
19 December 1998EMGnet meeting INRIA Rhône-Alpes1 An Overview of Security Issues in the Web José KAHAN OBLATT W3C/INRIA 19 December 1998.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
CHAOS CRYPTOGRAPHY Nathaniel Speiser Physics
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Secure communication Informatics for economists II Jan Přichystal
Web Security.
Basics of Cryptography
Cracking Encrypted Systems
Asymmetric-Key Cryptography
Symmetric and Asymmetric Encryption
Cryptography Dr. X.
Lesson 7: Public Key Cryptography Lesson 8: Rapid Research - Cybercrime Day 37.
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Cryptography Why Cryptography Symmetric Encryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Identity Theft uses of Cryptography
Public-Key Cryptography and RSA
Vernam Cipher Group Members: Muhammad Awais Muhammad Hasnain khan
Chapter 3:Cryptography (16M)
PART VII Security.
Security in Network Communications
Chapter 6 Cryptography CISSP Study Guide BIS 4113/6113.
Security.
Cryptography and Network Security
Chapter 4 Cryptography / Encryption
Appendix 5: Cryptography p
Section 2: Cryptography
Confusion and Diffusion
Key Distribution Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, /18/2019 Ref: Pfleeger96, Ch.4.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Asymmetric Cryptographic Algorithms
Computer Security Chapter Two
Symmetric Encryption or conventional / private-key / single-key
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Kharkiv National Pedagogical University UKRAINE The Department of Computer Science Visual models of cipher algorithms for students’ learning information security Liudmyla Gryzunα, Denys Stolbovβ lgr2007@ukr.netα, denystolbov@gmail.comβ

Outline 1.Introduction. 2. Difficulties of students’ learning information security. 3. Examples of own visual models. 4. Conclusions.

General idea to arouse students’ interest to study math, physics, computer science etc.

Cryptography as a chapter of information security course is not easy to learn for students The students have problems with understanding some encryption algorithms, especially their complicated mathematical tools. It is quite difficult for a teacher to explain for students main features of structure and functionality such algorithms.

Difficulties of explain students a sense of encryption and decryption keys; a mechanism of sharing and distribution those keys between sender and receiver.

Goal of using our virtual models to explain students complex math models and algorithms of cipher algorithms in plain language. In particular, give them (the students) intuitive understanding of encryption and decryption keys: generation of the keys sharing the keys security of keys

Two types of cipher algorithms Asymmetric algorithms use a pair of keys for encrypt/decrypt messages. Symmetric algorithms use one key for encrypt/decrypt messages.

Examples of own visual models (Color_model.ggb, Discrete_Logarithm.ggb)

Conclusion Our virtual models are useful for students’ learning the basics of cryptography in both curricular and extracurricular activities. The models give the students an opportunity to active study of cipher algorithms.

Denys Stolbovβ denystolbov@gmail.comβ Q & A Denys Stolbovβ denystolbov@gmail.comβ