Using animation in active learning tool to detect possible attacks in cryptographic protocols

Mabroka Ali Mayouf, Zarina Shukur

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Interactive Visualization tools for active learning of generic cryptographic protocols are very few. Although these tools provide the possibility to engage the learner by asking him to describe a cryptographic protocol using a simple visual metaphor to represent the abstraction of the concepts being visualized, the problem is that some cryptographic operations are not visualized or animated and hidden from the learner's perspective such as encryption/decryption actions. Other operations are not supported by these tools such as timestamp and freshness. So, it's difficult to cover all possible attack that the intruder might employ with such operations are missing. The purpose of this research is to provide an interactive visualization tool for teaching undergraduate students security protocols concepts especially key distribution, multiple operations such as encryption/decryption and signed/unsigned operations, and possible protocol attacks. By designing a high quality graphical user interface and simple visual metaphor, learners will be able to specify the protocols and consider the possible attack at each step of protocol demonstration.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages510-520
Number of pages11
Volume5857 LNCS
DOIs
Publication statusPublished - 2009
Event1st International Visual Informatics Conference, IVIC 2009 - Kuala Lumpur
Duration: 11 Nov 200913 Nov 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5857 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other1st International Visual Informatics Conference, IVIC 2009
CityKuala Lumpur
Period11/11/0913/11/09

Fingerprint

Cryptographic Protocols
Active Learning
Animation
Attack
Network protocols
Encryption
Visualization
Cryptography
Key Distribution
Security Protocols
Timestamp
Graphical User Interface
Signed
Graphical user interfaces
Problem-Based Learning
Cover
Teaching
Demonstrations
Students

Keywords

  • Active learning
  • Animation
  • Cryptographic protocols
  • Possible attacks
  • Visual metaphor

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Ali Mayouf, M., & Shukur, Z. (2009). Using animation in active learning tool to detect possible attacks in cryptographic protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5857 LNCS, pp. 510-520). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5857 LNCS). https://doi.org/10.1007/978-3-642-05036-7_48

Using animation in active learning tool to detect possible attacks in cryptographic protocols. / Ali Mayouf, Mabroka; Shukur, Zarina.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5857 LNCS 2009. p. 510-520 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5857 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ali Mayouf, M & Shukur, Z 2009, Using animation in active learning tool to detect possible attacks in cryptographic protocols. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 5857 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5857 LNCS, pp. 510-520, 1st International Visual Informatics Conference, IVIC 2009, Kuala Lumpur, 11/11/09. https://doi.org/10.1007/978-3-642-05036-7_48
Ali Mayouf M, Shukur Z. Using animation in active learning tool to detect possible attacks in cryptographic protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5857 LNCS. 2009. p. 510-520. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-05036-7_48
Ali Mayouf, Mabroka ; Shukur, Zarina. / Using animation in active learning tool to detect possible attacks in cryptographic protocols. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5857 LNCS 2009. pp. 510-520 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{d850fbd836d84640965b3212a34782c4,
title = "Using animation in active learning tool to detect possible attacks in cryptographic protocols",
abstract = "Interactive Visualization tools for active learning of generic cryptographic protocols are very few. Although these tools provide the possibility to engage the learner by asking him to describe a cryptographic protocol using a simple visual metaphor to represent the abstraction of the concepts being visualized, the problem is that some cryptographic operations are not visualized or animated and hidden from the learner's perspective such as encryption/decryption actions. Other operations are not supported by these tools such as timestamp and freshness. So, it's difficult to cover all possible attack that the intruder might employ with such operations are missing. The purpose of this research is to provide an interactive visualization tool for teaching undergraduate students security protocols concepts especially key distribution, multiple operations such as encryption/decryption and signed/unsigned operations, and possible protocol attacks. By designing a high quality graphical user interface and simple visual metaphor, learners will be able to specify the protocols and consider the possible attack at each step of protocol demonstration.",
keywords = "Active learning, Animation, Cryptographic protocols, Possible attacks, Visual metaphor",
author = "{Ali Mayouf}, Mabroka and Zarina Shukur",
year = "2009",
doi = "10.1007/978-3-642-05036-7_48",
language = "English",
isbn = "3642050352",
volume = "5857 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "510--520",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Using animation in active learning tool to detect possible attacks in cryptographic protocols

AU - Ali Mayouf, Mabroka

AU - Shukur, Zarina

PY - 2009

Y1 - 2009

N2 - Interactive Visualization tools for active learning of generic cryptographic protocols are very few. Although these tools provide the possibility to engage the learner by asking him to describe a cryptographic protocol using a simple visual metaphor to represent the abstraction of the concepts being visualized, the problem is that some cryptographic operations are not visualized or animated and hidden from the learner's perspective such as encryption/decryption actions. Other operations are not supported by these tools such as timestamp and freshness. So, it's difficult to cover all possible attack that the intruder might employ with such operations are missing. The purpose of this research is to provide an interactive visualization tool for teaching undergraduate students security protocols concepts especially key distribution, multiple operations such as encryption/decryption and signed/unsigned operations, and possible protocol attacks. By designing a high quality graphical user interface and simple visual metaphor, learners will be able to specify the protocols and consider the possible attack at each step of protocol demonstration.

AB - Interactive Visualization tools for active learning of generic cryptographic protocols are very few. Although these tools provide the possibility to engage the learner by asking him to describe a cryptographic protocol using a simple visual metaphor to represent the abstraction of the concepts being visualized, the problem is that some cryptographic operations are not visualized or animated and hidden from the learner's perspective such as encryption/decryption actions. Other operations are not supported by these tools such as timestamp and freshness. So, it's difficult to cover all possible attack that the intruder might employ with such operations are missing. The purpose of this research is to provide an interactive visualization tool for teaching undergraduate students security protocols concepts especially key distribution, multiple operations such as encryption/decryption and signed/unsigned operations, and possible protocol attacks. By designing a high quality graphical user interface and simple visual metaphor, learners will be able to specify the protocols and consider the possible attack at each step of protocol demonstration.

KW - Active learning

KW - Animation

KW - Cryptographic protocols

KW - Possible attacks

KW - Visual metaphor

UR - http://www.scopus.com/inward/record.url?scp=76549123720&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=76549123720&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-05036-7_48

DO - 10.1007/978-3-642-05036-7_48

M3 - Conference contribution

SN - 3642050352

SN - 9783642050350

VL - 5857 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 510

EP - 520

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -