skip to main content
10.1145/3410352.3410742acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicemisConference Proceedingsconference-collections
research-article

Teaching Cryptography Using CYPHER (InteraCtive CrYPtograpHic Protocol TEaching and LeaRning)

Authors Info & Claims
Published:14 September 2020Publication History

Editorial Notes

NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the ICEMIS 2020Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.

ABSTRACT

The lack of cryptographic knowledge is one factor contributing to the cybersecurity skills gap. Cryptography is the core of the research in data security and a fundamental component in information assurance yet complex topic, with its purpose to conceal and authenticate information. Hence, teaching cryptography-based security protocols in an effective and engaging manner is a challenging problem throughout international HE sectors. With explanations usually based around mathematical notations, it can be a daunting and difficult subject for many students. This point is emphasized by the consistently lower marks achieved, in comparison to other course modules. To combat this, we propose the CYPHER platform, which delivers a motivating and engaging practical element to teaching and learning popular cryptographic protocols. It customizes a real-world scenarios that are illustrated by animation videos to depict and simplify a number of well-known cryptographic protocols. CYPHER provides an interactive learning experience, allowing the breakdown of complex topics to a level understood by each student. By providing assessment gamification, the delivered knowledge will be assessed in a fun way by playing a game to pass a number of stages and measure the level of understanding. The analysis of the evaluations' results showed that over 88% of the students surveyed had found the CYPHER platform increased the overall speed of understanding.

References

  1. E. Schaefer, "Devising a Better Way to Teach and Learn the Advanced Encryption Standard." [Online]. Available: math.scu.edu/~eschaefe/getfile.pdf%0D.Google ScholarGoogle Scholar
  2. C. Easttom, "Cryptography -- How does it impact cyber security and why you need to know more?," 2015. [Online]. Available: https://www.brighttalk.com/webcast/10573/144651.Google ScholarGoogle Scholar
  3. GCHQ, "Cryptoy - explore the fascinating world of cryptography."Google ScholarGoogle Scholar
  4. W. Yurcik and D. Doss, "Different approaches in the teaching of information systems security," in Proceedings of the Information Systems Education Conference, 2001.Google ScholarGoogle Scholar
  5. CrypTool, "CrypTool 2 -- CrypTool Portal." [Online]. Available: https://www.cryptool.org/en/cryptool2.Google ScholarGoogle Scholar
  6. Derryberry, "Serious games: online games for learning.".Google ScholarGoogle Scholar
  7. T. Susi, M. Johannesson, and P. Backlund, "Serious Games - An Overview," 2017 IEEE 8th Annu. Ubiquitous Comput. Electron. Mob. Commun. Conf. UEMCON 2017, pp. 1--24, 2007.Google ScholarGoogle Scholar
  8. D. R. Michael and S. Chen, "Serious games [electronic resource]: games that educate, train, and inform." p. 287, 2006.Google ScholarGoogle Scholar
  9. Simon Egenfeldt - Nielsen, "Overview of research on the edducational use of video games," Digit. Kompet., vol. 1, no. 3, pp. 184--213, 2006.Google ScholarGoogle Scholar
  10. K. Corti, "Games-based Learning; a serious business application," Inf. PixelLearning, pp. 1--20, 2006.Google ScholarGoogle Scholar
  11. C. Jordan, M. Knapp, D. Mitchell, M. Claypool, and K. Fisler, "CounterMeasures: A game for teaching computer security," in Annual Workshop on Network and Systems Support for Games, p. 6, 2011.Google ScholarGoogle Scholar
  12. C. Irvine, M. Thompson, and K. Allen, "Active Learning with the CyberCIEGE Video Game," Fed. Inf. Syst. Secur. Educ. Assoc. Conf., pp. 1--10, 2005.Google ScholarGoogle Scholar
  13. E. Adams and A. Rollings, Fundamentals of Game Design. Prentice Hall, 2006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. W. A. Labuschagne, I. Burke, N. Veerasamy, and M. M. Eloff, "Design of cyber security awareness game utilizing a social media framework," in 2011 Information Security for South Africa - Proceedings of the ISSA 2011 Conference, 2011.Google ScholarGoogle Scholar
  15. D. Schweitzer and L. Baird, "The design and use of interactive visualization applets for teaching ciphers," in Proceedings of the 2006 IEEE Workshop on Information Assurance, 2006, vol., no. June, pp. 69--75, 2006.Google ScholarGoogle Scholar
  16. A. McAndrew, "Teaching cryptography with open-source software," ACM SIGCSE Bull., vol. 40, no. 1, p. 325, 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. T. Yi and Z. Quan, "Teaching cryptography-based software developing with open-source software," in Proceedings of 2009 4th International Conference on Computer Science and Education, ICCSE 2009, pp. 1604--1608, 2009.Google ScholarGoogle Scholar
  18. S. Adamović, I. Branović, D. Živković, V. Tomašević, and M. Milosavljević, "Teaching interactive cryptography: the case for CrypTool," IEEE Conf. ICEST, vol. 1, no. 44006, pp. 3--5, 2011.Google ScholarGoogle Scholar
  19. J. Tao, J. Ma, J. Mayo, and C.-K. Shene, "DESvisual: A VISUALIZATION TOOL FOR THE DES CIPHER," J. Comput. Sci. Coll., vol. 27, no. 1, pp. 81--89, 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. Tao, J. Ma, and M. Keranen, "ECvisual: a visualization tool for elliptic curve based ciphers," in Proceedings of the 43rd ACM technical symposium on Computer Science Education, pp. 571--576, 2012.Google ScholarGoogle Scholar
  21. S. M. Gaffer and D. M. Alghazzawi, "Using Virtual Security Lab in Teaching Cryptography," Int. J. Mod. Educ. Comput. Sci., vol. 4, no. 1, pp. 26--32, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  22. "SWEET." [Online]. Available: http://csis.pace.edu/~lchen/sweet/.Google ScholarGoogle Scholar
  23. Shadi Aljawarneh, Muneer Bani Yassein, and We'am Adel Talafha. 2018. A multithreaded programming approach for multimedia big data: encryption system. Multimedia Tools Appl. 77, 9 (May 2018), 10997--11016. DOI:https://doi.org/10.1007/s11042-017-4873-9Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Vangipuram Radhakrishna, Shadi A. Aljawarneh, Puligadda Veereswara Kumar, and Kim-Kwang Raymond Choo. 2018. A novel fuzzy gaussian-based dissimilarity measure for discovering similarity temporal association patterns. Soft Comput. 22, 6 (March 2018), 1903--1919. DOI:https://doi.org/10.1007/s00500-016-2445-yGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  25. Shadi Aljawarneh, Shadi Aljawarneh, and Manisha Malhotra. 2017. Critical Research on Scalability and Security Issues in Virtual Cloud Environments (1st. ed.). IGI Global, USA.Google ScholarGoogle Scholar
  26. Shadi Aljawarneh, Muneer Bani Yassein, and We'am Adel Talafha. 2017. A resource-efficient encryption algorithm for multimedia big data. Multimedia Tools Appl. 76, 21 (November 2017), 22703--22724. DOI:https://doi.org/10.1007/s11042-016-4333-yGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  27. Shadi A. Aljawarneh, Raja A. Moftah, and Abdelsalam M. Maatuk. 2016. Investigations of automatic methods for detecting the polymorphic worms signatures. Future Gener. Comput. Syst. 60, C (July 2016), 67--77. DOI:https://doi.org/10.1016/j.future.2016.01.020Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Raja A. Moftah, Abdelsalam M. Maatuk, Peter Plasmann, and Shadi Aljawarneh. 2015. An Overview about the Polymorphic Worms Signatures. In Proceedings of the The International Conference on Engineering & MIS 2015 (ICEMIS '15). Association for Computing Machinery, New York, NY, USA, Article 29, 1--4. DOI:https://doi.org/10.1145/2832987.2833031Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Lizcano, D., Lara, J.A., White, B. and Aljawarneh, S., 2020. Blockchain-based approach to create a model of trust in open and ubiquitous higher education. Journal of Computing in Higher Education, 32(1), pp. 109--134.Google ScholarGoogle Scholar
  30. Sohil F. Alshareef, Abdelsalam M. Maatuk and Tawfig M. Abdelaziz. 2018. Aspect-Oriented Requirements Engineering: Approaches and Techniques. In DATA '18, October 1-2, 2018, Spain. ACM. https://doi.org/10.1145/3279996.3280009Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICEMIS'20: Proceedings of the 6th International Conference on Engineering & MIS 2020
    September 2020
    727 pages
    ISBN:9781450377362
    DOI:10.1145/3410352

    Copyright © 2020 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 14 September 2020

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    ICEMIS'20 Paper Acceptance Rate105of300submissions,35%Overall Acceptance Rate215of605submissions,36%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader