2006 IEEE Information Assurance Workshop
DOI: 10.1109/iaw.2006.1652079
|View full text |Cite
|
Sign up to set email alerts
|

The Design and Use of Interactive Visualization Applets for Teaching Ciphers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(27 citation statements)
references
References 4 publications
0
27
0
Order By: Relevance
“…Using an ICV with complex interactions and many options can dilute the students' focus. As an example, Figure 2 shows one design of several ICV's that were created for teaching ciphers [23]. Each individual ICV focuses on a single cipher algorithm (a Vigenere cipher in this example).…”
Section: Simple Is Bettermentioning
confidence: 99%
See 1 more Smart Citation
“…Using an ICV with complex interactions and many options can dilute the students' focus. As an example, Figure 2 shows one design of several ICV's that were created for teaching ciphers [23]. Each individual ICV focuses on a single cipher algorithm (a Vigenere cipher in this example).…”
Section: Simple Is Bettermentioning
confidence: 99%
“…At the U.S. Air Force Academy, we have developed and used ICV's in several of our computer science courses including algorithms, data structures, computer graphics, security, cryptography, and introductory computer science [21,22,23]. The tools were developed over the years by different instructors.…”
Section: Designing Icv'smentioning
confidence: 99%
“…In [28] a set of communicating picturing applets for instruction cryptography procedures is available. Algorithms enclosed by this tool are: Shift Cipher, easy Substitution Cipher, Affine Cipher, RSA Cipher, Vigenere Cipher, RC4 Stream Cipher, and DES Cipher.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…In [8] interactive visualization applets are presented for cryptography.These algorithms used some tools for: Simple Substitution Cipher, Affine Cipher, Shift Cipher , Vigenere Cipher, RSA Cipher, RC4 Stream Cipher, and DES Cipher. This interface allows users to input the text which is to be encrypted and key.…”
Section: Literature Surveymentioning
confidence: 99%