Call for Paper - April 2023 Edition
IJCA solicits original research papers for the April 2023 Edition. Last date of manuscript submission is March 20, 2023. Read More

An Interactive Visualization Tool for the Interpretation of Mathematical Concepts behind Public Key Cryptography

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 90 - Number 5
Year of Publication: 2014
Authors:
Sikha O K
Suchithra M
Pinchu Prabha
10.5120/15572-4199

Sikha O K, Suchithra M and Pinchu Prabha. Article: An Interactive Visualization Tool for the Interpretation of Mathematical Concepts behind Public Key Cryptography. International Journal of Computer Applications 90(5):36-39, March 2014. Full text available. BibTeX

@article{key:article,
	author = {Sikha O K and Suchithra M and Pinchu Prabha},
	title = {Article: An Interactive Visualization Tool for the Interpretation of Mathematical Concepts behind Public Key Cryptography},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {90},
	number = {5},
	pages = {36-39},
	month = {March},
	note = {Full text available}
}

Abstract

Most of the engineering programs especially computer science have two or more security related subjects, but lack of active learning and practical experience in the classroom. Cryptographic algorithms which solve Security problems relay on specific mathematical areas such as modular arithmetic, probability and number theory. Unfortunately students feel difficulty to follow the concepts due to the underlying sophisticated mathematics; it is necessitating a fundamental change in our curriculum. Interactive pedagogical tools need to be introduced incrementally along with standard content in a way that makes the standard content easier to learn and vice versa. This work describes an interactive visualization tool which helps the student community to understand the mathematical concepts behind public cryptography algorithms using Microsoft Excel Spreadsheet. It is shown how the sophisticated maths can be visualized and implemented and also discussed some of the famous public key algorithms that the students at various level can do with the help of Microsoft Excel Spreadsheet.

References

  • Information Security Course Based on Applications of Management Techniques in Digital Systems for Business Colleges, Herath et al, The 2002 International Conference on Security and Management, (SAM02), Las Vegas, USA, 23-25, June 2002
  • Integration of computer security laboratories into computer architecture courses to enhance undergraduate curriculum, Herath et al. , Proceedings of Workshop on Computer Architecture Education, June 9-11, 2003, San Diego, CA
  • DESvisual: A Visualization Tool for the DES Cipher,Jun Tao, Jun Ma, Melissa Keranen,Jean Mayo, Ching- Kuang Shene, march 26,2011
  • Learning the Related Mathematics to Cryptography by Interactive Way, Mohamed Salim Trigui , Daniyal M. Alghazzawi, MECS , March 2012
  • Alasdair McAndrew. Teaching Cryptography with Open-Source Software. In ACM 39th SIGCSE Technical Symposium, pages 325329, 2008.
  • Oi-Shong Chok and Susantha Herath. Computer SecurityLearning Laboratory: Implementation of DES and AES Algorithms using Spreadsheets. In MICS 2004 Proceedings,April 2004.
  • C. E. Iglesias, et al. , "Calculus b-learning with java tools,"WSEAS Transactions on ADVANCES in ENGINEERING EDUCATION, pp. 295-305
  • G. H. Hardy, Prime numbers, British Association Report,Britist Association, Manchester, 1915, (In Collected Papers",vol. 2), pp. 350-354.
  • Computation Of Continuous Wavelet Transform Using Microsoft Excel SpreadSheet Pinchu Prabha, Sikha O K, Suchithra M, Sukanya P, Sowmya V, K P Soman
  • Visualization of OFDM using Microsoft Excel Spreadsheet in Linear Algebra Perspective,Anand R, Pinchu Prabha, Sikha O. K, Suchithra M, Sukanya P, Sowmya V, Soman K. P