Cryptography: Theory and Practice,Second Edition
Cryptography: Theory and Practice,Second Edition
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Introduction to Cryptography with Java Applets
Introduction to Cryptography with Java Applets
Cryptography & Network Security
Cryptography & Network Security
Software Visualization: Visualizing the Structure, Behaviour, and Evolution of Software
Software Visualization: Visualizing the Structure, Behaviour, and Evolution of Software
Visualization of cryptographic protocols with GRACE
Journal of Visual Languages and Computing
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Interactive visualization system for DES
AMT'10 Proceedings of the 6th international conference on Active media technology
Hi-index | 0.00 |
Cryptographic hash functions play an important role in modern cryptography. In this paper, we present web-based interactive visualization applets for teaching secure hash algorithm (SHA-1). The visualization applets lead to more efficient learning outcomes. The visualization applets of SHA-1 contain description of SHA-1, animation, and controls for activation with SHA- 1. The primary goal of this visualization is to understand the essence of SHA-1 and to be able to find out the strength and weakness of SHA-1. The applets have been used in our department for the course "cryptography" for master students. Most of the students agreed that the applets are helpful to understand SHA-1 and some of its vulnerabilities. The applets can be generalized to SHA-2 and other hash functions.