Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
Some variations on RSA signatures and their security
Proceedings on Advances in cryptology---CRYPTO '86
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
E-mail security: how to keep your electronic messages private
E-mail security: how to keep your electronic messages private
Loop invariants and mathematical games
SIGCSE '95 Proceedings of the twenty-sixth SIGCSE technical symposium on Computer science education
Computer networks (3rd ed.)
Chance-It: an object-oriented capstone project for CS-1
SIGCSE '98 Proceedings of the twenty-ninth SIGCSE technical symposium on Computer science education
Encryption and Secure Computer Networks
ACM Computing Surveys (CSUR)
Digital signatures with RSA and other public-key cryptosystems
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Using multiplayer games to teach interprocess communication mechanisms
ACM SIGCSE Bulletin
What makes things fun to learn? heuristics for designing instructional computer games
SIGSMALL '80 Proceedings of the 3rd ACM SIGSMALL symposium and the first SIGPC symposium on Small systems
Using digital logic circuit simulation to build demonstrations of IT concepts
ACM SIGITE Newsletter
Engagement: gaming throughout the curriculum
Proceedings of the 40th ACM technical symposium on Computer science education
Teaching Cryptography Activity in Taiwan's High Schools
Proceedings of the 2007 conference on Supporting Learning Flow through Integrative Technologies
Using serious games in computer science education
Proceedings of the 11th Koli Calling International Conference on Computing Education Research
Card games for teaching data structures and algorithms
Proceedings of the 11th Koli Calling International Conference on Computing Education Research
DSAsketch: data structures and algorithms drawing game
Proceedings of the 12th Koli Calling International Conference on Computing Education Research
Alternate reality games for computer science education
Proceedings of the 13th Koli Calling International Conference on Computing Education Research
Hi-index | 0.00 |
The Security Protocol Game is a highly visual and interactive game for teaching secure data communication protocols. Students use the game to simulate protocols and explore possible attacks against them. The power of the game lies in the representation of secret and public key cryptography. Specifically, the game provides representations for plain text and encrypted messages, message digests, digital signatures and cryptographic keys. Using these representations, students can construct public key certificates and perform multiple encryption, tunnelling and encrypted key transmission. They can simulate a wide range of protocols including authentication, key exchange and blind signature protocols. Application protocols such as Transport Layer Security and Pretty Good Privacy can be simulated in detail. The game clearly reveals the key issues of confidentiality, integrity, authentication and non-repudiation in secure data communications. Used as a small group learning activity, students gain a deep understanding of protocol design and operation issues. The game is suitable for use in tertiary and professional education courses for managers and information technology students at all levels.