Teaching Public-Key Cryptography in School

被引:0
|
作者
Keller, Lucia [1 ]
Komm, Dennis [1 ]
Serafini, Giovanni [1 ]
Sprock, Andreas [1 ]
Steffen, Bjoern [1 ]
机构
[1] ETH, Dept Comp Sci, Zurich, Switzerland
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
These clays, public-key cryptography is indispensable to ensure both confidentiality and authenticity in numerous applications which comprise securely communicating via mobile phone or email or digitally signing documents. For all public-key systems, such as RSA, mathematically challenging and technically involved methods are employed which are often above the level of secondary school students as they employ deep results from algebra. Following an approach suggested in 2003 by Tim Bell et al. in Computers and Education, volume 40, number 3, we deal with the question of how to teach young students the main concepts, issues, and solutions of public-key systems without being forced to also teach rather complicated theorems of number theory beforehand.
引用
收藏
页码:112 / 123
页数:12
相关论文
共 50 条
  • [21] Reconfigurable processor for public-key cryptography
    Smyth, N
    McLoone, M
    McCanny, JV
    2005 IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS - DESIGN AND IMPLEMENTATION (SIPS), 2005, : 110 - 115
  • [22] SUBSETS OF GROUPS IN PUBLIC-KEY CRYPTOGRAPHY
    Carvalho, Andre
    Malheiro, Antonio
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2025, 19 (03) : 980 - 995
  • [23] Public-key cryptography and invariant theory
    Grigoriev D.
    Journal of Mathematical Sciences, 2005, 126 (3) : 1152 - 1157
  • [24] Probability theory and public-key cryptography
    Bessonov, Mariya
    Grigoriev, Dima
    Shpilrain, Vladimir
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS- COMPUTER SYSTEMS THEORY, 2021, 6 (04) : 285 - 290
  • [25] Public-key cryptography on smart cards
    Fuchsberger, A
    Gollmann, D
    Lothian, P
    Paterson, KG
    Sidiropoulos, A
    CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 250 - 269
  • [26] Hierarchical key assignment without public-key cryptography
    Lin, CH
    COMPUTERS & SECURITY, 2001, 20 (07) : 612 - 619
  • [27] Efficient Public-Key Cryptography in the Presence of Key Leakage
    Dodis, Yevgeniy
    Haralambiev, Kristiyan
    Lopez-Alt, Adriana
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 613 - 631
  • [28] Generalized public-key cryptography with tight security
    Wu, Ge
    Guo, Fuchun
    Susilo, Willy
    INFORMATION SCIENCES, 2019, 504 : 561 - 577
  • [29] A novel unified architecture for public-key cryptography
    Cilardo, A
    Mazzeo, A
    Mazzocca, N
    Romano, L
    DESIGNERS' FORUM: DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, 2005, : 52 - 57
  • [30] Public-Key Cryptography from Different Assumptions
    Applebaum, Benny
    Barak, Boaz
    Wigderson, Avi
    STOC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2010, : 171 - 180