SHAvisual: A Visualization Tool for the Secure Hash Algorithm
ثبت نشده
چکیده
Data security is vital to the world we live in, and the foundation that secure communication is built upon is cryptography. Cryptography is a course that is regularly offered at colleges and universities. In our experience, computer science students find that understanding the sophisticated mathematics behind the crypto-systems is a daunting task, while math majors often get lost in the details of the complicated algorithms. Educators need to find a way to help students understand both what the algorithm does and why the algorithm does it. Visualization tools can be an effective way for educators to battle this challenge. This paper describes a tool, SHAvisual, which addresses this issue for the secure hash algorithm (SHA). SHA is a family of cryptographic hash functions that the National Institute of Standards and Technology began publishing in the early 1960’s. SHAvisual is designed to help students learn and instructors teach the SHA-512 algorithm. It consists of three major components: Demo Mode, Practice Mode and Full Mode. A separate global view window helps highlight the current procedure in the algorithm pipeline. The Demo Mode provides a simplified SHA-512 visualization and is useful for the instructor to demonstrate important operations in the classroom. The Practice Mode is designed for students to learn the detailed computations step by step and perform selfstudy. A test report system also helps the instructor verify the learning effectiveness. The Full Mode is a full version of the SHA-512 cipher. SHAvisual was classroom tested in a Computer Security course. Major findings of this survey include the following: (1) students indicated SHAvisual helped them understand SHA better; (2) both the Demo Mode and Practice Mode had positive impact on student learning; and (3) a MANOVA analysis suggested that the student reactions were generally independent of the time spent on using the software. Write-in comments also verified that SHAvisual did help students learn and the instructor teach the SHA algorithm effectively.
منابع مشابه
An Improved Hash Function Based on the Tillich-Zémor Hash Function
Using the idea behind the Tillich-Zémor hash function, we propose a new hash function. Our hash function is parallelizable and its collision resistance is implied by a hardness assumption on a mathematical problem. Also, it is secure against the known attacks. It is the most secure variant of the Tillich-Zémor hash function until now.
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملChanges in Federal Information Processing Standard (FIPS) 180-4, Secure Hash Standard
This paper describes the changes between FIPS 180-3 and FIPS 180-4. FIPS 180-4 specifies two new secure cryptographic hash algorithms: SHA-512/224 and SHA512/256; it also includes a method for determining initial value(s) for any future SHA512-based hash algorithm(s). FIPS 180-4 also removes a requirement for the execution of the message length encoding operation.
متن کاملA Fast Portable Implementation of the Secure Hash Algorithm
In 1992, NIST announced a proposed standard for a collision-free hash function. The algorithm for producing the hash value is known as the Secure Hash Algorithm (SHA), and the standard using the algorithm in known as the Secure Hash Standard (SHS). Later, an announcement was made that a scientist at NSA had discovered a weakness in the original algorithm. A revision to this standard was then an...
متن کامل