Username   Password       Forgot your password?  Forgot your username? 

Research on Techniques and Methods of Developing Cryptography Virtual Laboratory

Volume 13, Number 8, December 2017, pp. 1371-1380
DOI: 10.23940/ijpe.17.08.p18.13711380

Guihua Duan, Yan Wang, Min Li, Yu Sheng, Jianxin Wang, Shigeng Zhang

School of Information Science and Engineering, Central South University, Changsha, Hunan, China

(Submitted on October 1, 2017; Revised on November 2, 2017; Accepted on November 23, 2017)



Abstract:

To address the deficiencies of cryptography education, we design and implement a virtual experiment system named VESC (Virtual Experiment System for Cryptography), which is composed of a front end developed with HTML5 and a back end developed with Node.js and Docker. Based on the parameters input by the users, VESC uses the cross-browser vector graphics library Raphael to dynamically demonstrate the workflow of various cryptography algorithms to users in a step-by-step manner. VESC is easy to operate while having a friendly interface. After users submit their codes, VESC compiles the codes, executes them, and sends the results back to the users. Our experimental results show that VESC achieves high performance in a highly concurrent accessing environment. VESC is not only a virtual experimental platform for students, but also offers an assistant system for teachers to help students better understand the principles of complicated cryptographic algorithms and protocols as well as their applications.

 

References: 21

      1. S. Adamović, I. Branović, D. Živković, V. Tomašević, and M. Milosavljević, “Teaching Interactive Cryptography: the Case for CrypTool,” In IEEE Conference, International conference on environmental science and technology(ICEST), vol. 1, March, 2011.
      2. M. S. Asseisah, H. M. Bahig, and S. S. Daoud, “Interactive Visualization System for DES,” Active Media Technology, pp. 18-25, August 2010.
      3. W. L. Du, “SEED: Hands-On Lab Exercises for Computer Security Education,” IEEE Security & Privacy, vol. 9, no. 5, pp. 70-73, 2011.
      4. S. M. Gaffer and D. M. Alghazzawi, “Using Virtual Security Lab in Teaching Cryptography,” International journal of modern education and computer science (IJMECS), vol. 4, no. 1, pp. 26, 2012.
      5. Y. Hu and R. Willis, “A Framework for Developing Visualization Tools for Learning Cryptography Algorithms,” from Hampton University:<http://science.hamptonu.edu/compsci/docs/hu_p7.pdf>, Retrieved September 23, 2016.
      6. X. Q. Li and F. Wang, “The Design and Implementation of Encryption Algorithm Authentication System Based on Modern Cryptography,” Computer CD software and applications, no. 3, pp. 210-211, 2013.
      7. N. Luburić, M. Stojkov, G. Savić, G. Sladić, and B. Milosavljević, “Crypto-tutor: an Educational Tool for Learning Modern Cryptography,” IEEE 14th international symposium on intelligent systems and informatics (SISY), pp. 205-210, October, 2016.
      8. J. Ma, J. Tao, J. Mayo, C. K. Shene, M. Keranen, and C. Wang, “AESvisual: a Visualization Tool for the AES Cipher,” In Proceedings of the 2016 ACM conference on innovation and technology in computer science education, pp. 230-235, July, 2016.
      9. R. Richards, A. Konak, M. R. Bartolacci, and M. Nasereddin, “Collaborative Learning in Virtual Computer Laboratory Exercises,” Spring 2015 Mid-Atlantic ASEE Conference, vol. 155, pp. 9, April, 2015.
      10. J. X. Wang and Q. J. MO, “Design and Implementation of Communication System,” Journal of Central South University (Science and Technology), vol. 37, no. 2, pp. 330-335, 2006.
      11. J. L. Zhang and L. L. Liu, “Design of Component-Based Demonstrative Experiments in Cryptography,” Proceedings of 2011 national teaching seminar on cryptography and information security (NTS-CIS), vol. 1, no. 3, 2011.
      12. “Ab- Apache HTTP Server Benchmarking Tool,” Available at http://httpd.apache.org/docs/2.2/programs/ab.html, Last accessed on August 1,2017.
      13. “Bootstrap,” Available at http://getbootstrap.com/, Last accessed on August 1,2017.
      14. “CodeMirror,” Available at http://codemirror.net, Last accessed on August 1,2017.
      15. “Cryptool portal,” Available at http://www.cryptool.org/en, Last accessed on August 1,2017.
      16. “Docker,” Available at https://www.docker.com, Last accessed on August 1,2017.
      17. “Express - Node.js Web Application Framework,” Available at http://expressjs.com, Last accessed on August 1,2017.
      18. “JQuery,” Available at http://jquery.com/, Last accessed on August 1,2017.
      19. “MathJax,” Available at http://www.mathjax.org, Last accessed on August 1,2017.
      20. “Node.js,” Available at https://nodejs.org/en, Last accessed on August 1,2017.
      21. “Raphaël - JavaScript Library,” Available at http://www.raphaeljs.com, Last accessed on August 1,2017.

           

          Click here to download the paper.

          Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

           
          This site uses encryption for transmitting your passwords. ratmilwebsolutions.com