Visualization of cryptographic protocols with GRACE

被引:19
|
作者
Cattaneo, G. [2 ]
De Santis, A. [2 ]
Petrillo, U. Ferraro [1 ]
机构
[1] Univ Roma La Sapienza, Dipartimento Stat Probabil & Stat Applicat, Rome, Italy
[2] Univ Salerno, Dipartimento Informat & Applicaz, I-84100 Salerno, Italy
来源
关键词
educational tool; cryptographic protocols; protocol visualization;
D O I
10.1016/j.jvlc.2007.05.001
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper we present GRACE (graphical representation and animation for cryptography education), a Java-based educational tool that can be used to help in teaching and understanding of cryptographic protocols. The tool adopts an active learning model that engages the learner by asking him to describe, in an exemplification of a real-world scenario, cryptographic protocols using simple primitives whose effects are visualized by means of animated sequences. To this end, the GRACE interface offers the learner the choice of several cryptographic and non-cryptographic related operations with their respective visualizations. By executing a series of these operations in the proper order, a teacher is able to provide a visual introductory description of several protocols. Moreover, since some of the cryptographic operations are not just simulated but concretely implemented, it can be used by students to see which elaborations are performed by each operation of a cryptographic protocol, and their effects on the represented scenario. GRACE comes equipped with the implementation of several cryptographic primitives and cryptosystems. Additional primitives and cryptosystems can easily be plugged in the system. Visualizations prepared with GRACE can be edited, navigated and saved in a file for playback. We also present the results of an experimental lesson taught in the Security on Communication Networks undergraduate course at the University of Salerno during the fall 2004 semester using GRACE.
引用
收藏
页码:258 / 290
页数:33
相关论文
共 50 条
  • [1] Cooperative Visualization of Cryptographic Protocols Using Concept Keyboards
    Baloian, Nelson
    Luther, Wolfram
    [J]. INTERNATIONAL JOURNAL OF ENGINEERING EDUCATION, 2009, 25 (04) : 745 - 754
  • [2] Stateless Cryptographic Protocols
    Goyal, Vipul
    Maji, Hemanta K.
    [J]. 2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, : 678 - 687
  • [3] Cryptography and cryptographic protocols
    Goldreich, O
    [J]. DISTRIBUTED COMPUTING, 2003, 16 (2-3) : 177 - 199
  • [4] Programming cryptographic protocols
    Guttman, JD
    Herzog, JC
    Ramsdell, JD
    Sniffen, BT
    [J]. TRUSTWORTHY GLOBAL COMPUTING, 2005, 3705 : 116 - 145
  • [5] Cryptography and cryptographic protocols
    Oded Goldreich
    [J]. Distributed Computing, 2003, 16 : 177 - 199
  • [6] Secure Composition of Cryptographic Protocols
    Goyal, Vipul
    [J]. PROVABLE SECURITY, 2011, 6980 : 2 - 2
  • [7] Sequential rationality in cryptographic protocols
    Gradwohl, Ronen
    Livne, Noam
    Rosen, Alon
    [J]. ACM Transactions on Economics and Computation, 2013, 1 (01)
  • [8] A bisimulation method for cryptographic protocols
    Abadi, M
    Gordon, AD
    [J]. PROGRAMMING LANGUAGES AND SYSTEMS, 1998, 1381 : 12 - 26
  • [9] Special Issue on Cryptographic Protocols
    Vogt, Andreas
    [J]. CRYPTOGRAPHY, 2018, 2 (03)
  • [10] Collusion analysis of cryptographic protocols
    Low, SH
    Maxemchuk, NF
    [J]. IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1 - 5