Teaching Secure Data Communications Using a Game Representation

نویسنده

  • Leonard G. C. Hamey
چکیده

The Security Protocol Game is a highly visual and interactive game for teaching secure data communication protocols. Students use the game to simulate protocols and explore possible attacks against them. The power of the game lies in the representation of secret and public key cryptography. Specifically, the game provides representations for plain text and encrypted messages, message digests, digital signatures and cryptographic keys. Using these representations, students can construct public key certificates and perform multiple encryption, tunnelling and encrypted key transmission. They can simulate a wide range of protocols including authentication, key exchange and blind signature protocols. Application protocols such as Transport Layer Security and Pretty Good Privacy can be simulated in detail. The game clearly reveals the key issues of confidentiality, integrity, authentication and non-repudiation in secure data communications. Used as a small group learning activity, students gain a deep understanding of protocol design and operation issues. The game is suitable for use in tertiary and professional education courses for managers and information technology students at all levels.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

China’s Maritime Interest and the Great Game at Seas

Linking China’s interest in the maritime waters arises from the geo-strategic importance of Sea Lines of Communications (SLOCs) vital to the oil supply of the country. China is building strategic relationships and developing a naval capability to establish a forward presence along the SLOCs that connect China to the Middle East and to Africa. The entire stretch includes South China Sea, Indian ...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

Representation of Gender Roles in Child and Young Characters in Game of Thrones Series

he purpose of this study is to demonstrate how we, especially children and adolescents, are influenced by the media; this issue had investigated by analyzing the representation of gender roles in the Game of Thrones Series. There were based on three social learning, socialization and cultivation theories. This research had done a quantitative content analysis. The variables included 20 gender a...

متن کامل

Dynamics of Naming Games in Random Geometric Networks

We investigate a simple agent-based model, the Naming Game, on random geometric networks. The Naming Game is a minimal model, employing local communications, capturing the emergence of shared communication schemes (languages) in a population of autonomous semiotic agents. Implementing it on random geometric graphs, local communications being local broadcasts, we can model the corresponding agre...

متن کامل

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003