Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols

  • Authors:
  • Mabroka Ali Mayouf;Zarina Shukur

  • Affiliations:
  • Faculty of Technology and Information Science, University Kebangsaan Malaysia, Malaysia;Faculty of Technology and Information Science, University Kebangsaan Malaysia, Malaysia

  • Venue:
  • IVIC '09 Proceedings of the 1st International Visual Informatics Conference on Visual Informatics: Bridging Research and Practice
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Interactive Visualization tools for active learning of generic cryptographic protocols are very few. Although these tools provide the possibility to engage the learner by asking him to describe a cryptographic protocol using a simple visual metaphor to represent the abstraction of the concepts being visualized, the problem is that some cryptographic operations are not visualized or animated and hidden from the learner's perspective such as encryption/decryption actions. Other operations are not supported by these tools such as timestamp and freshness. So, it's difficult to cover all possible attack that the intruder might employ with such operations are missing. The purpose of this research is to provide an interactive visualization tool for teaching undergraduate students security protocols concepts especially key distribution, multiple operations such as encryption/decryption and signed/unsigned operations, and possible protocol attacks. By designing a high quality graphical user interface and simple visual metaphor, learners will be able to specify the protocols and consider the possible attack at each step of protocol demonstration.