GR Semicolon EN

Show simple item record

dc.contributor.author
Paraschos, Panagiotis
en
dc.date.accessioned
2015-06-25T07:54:48Z
dc.date.available
2015-09-27T05:57:50Z
dc.date.issued
2015-06-25
dc.identifier.uri
https://repository.ihu.edu.gr//xmlui/handle/11544/518
dc.rights
Default License
dc.title
E-learning tool for education in cryptography
en
heal.type
masterThesis
heal.keyword
Computer security
en
heal.keyword
Cryptography
en
heal.keyword
Dissertations, Academic
en
heal.language
en
heal.access
free
el
heal.license
http://creativecommons.org/licenses/by-nc/4.0
heal.recordProvider
School of Science and Technology, MSc in Information & Communication Technology Systems
heal.publicationDate
2011-09
heal.bibliographicCitation
Paraschos Panagiotis, 2011, E-learning tool for education in cryptography,Master's Dissertation, International Hellenic University
en
heal.abstract
This dissertation was written as a part of the MSc in ICT Systems at the International Hellenic University. Electronic communication is a vast piece of modern technology which is constantly evolving and creating more and more, problems. For instance, in e-commerce and more generally to electronic communications, one of the biggest issues is the security of transactions. The information security issues are contemporary problems faced by all systems and directly affect the IT infrastructure. The issues of information security in virtually all areas of applications such as: corporations - organizations, the government and individual privacy, can only be ensured with information security sys-tems and cryptography. The goal of this current dissertation is to develop in an existing application an e-learning tool for education in cryptography. In Chapter 1, security, cryptography and e-learning are introduced and defined. In Chapter 2, a presentation of the history of cryp-tography is made from the ancient times until today. In Chapter 3, the problems and dif-ficulties that appeared over the years in the sector of cryptography are discussed. In Chapter 4, a detailed description of the development of the e-learning tool upon an ex-isting instant messaging application is presented. Lastly, in Chapter 5, the results of the application are concluded, how helpful the application is in the education sector in un-derstanding the different methods of cryptography and if it can be extended to other sec-tors e.g. enterprise (employee training against security threats). Initially, I would like to thank my supervisor, Assistant Professor Vasilis Katos, for giving me the opportunity to work with the specific and interesting subject. His support, guidance and patience played a significant role to the development and completion of this thesis. Special thanks to Assistant Professor and PhD candidate, Konstantinos Mo-kos, for his valuable assistance and counseling on the development of the e-learning tool for education in cryptography. Finally, I am deeply grateful for the support of my family during the research and writing of this dissertation.
en
heal.tableOfContents
ABSTRACT .................................................................................................................. IV CONTENTS ................................................................................................................... V 1 INTRODUCTION .................................................................................................... 1 1.1 SECURITY ........................................................................................................... 1 1.2 CRYPTOGRAPHY ................................................................................................. 2 1.3 CRYPTANALYSIS ................................................................................................. 5 1.4 E-LEARNING ....................................................................................................... 8 2 HISTORY OF CRYPTOGRAPHY ...................................................................... 11 2.1 ANCIENT TIMES ................................................................................................. 11 2.1.1 Origins ................................................................................................. 11 2.1.2 The Bible .............................................................................................. 12 2.1.3 The Greeks ........................................................................................... 12 2.1.4 The Romans .......................................................................................... 14 2.2 MIDDLE AGES – 20TH CENTURY ........................................................................ 15 2.2.1 The Persian World ............................................................................... 15 2.2.2 The Europeans ..................................................................................... 16 2.3 20TH CENTURY – WORLD WAR I & II .............................................................. 18 2.3.1 The Zimmermann Telegram ................................................................. 18 2.3.2 The Jefferson Disk ............................................................................... 20 2.3.3 The Hebern Cipher Machines .............................................................. 21 2.3.4 The Enigma Machine ........................................................................... 22 2.3.5 The Kryha Device ................................................................................ 24 2.3.6 M-94/CSP-488 Cylindrical Device ...................................................... 25 2.3.7 TYPEX and SIGABA ............................................................................ 26 2.3.8 Urkryptografen - The Clock Cryptograph ........................................... 26 2.3.9 NEMA ................................................................................................... 28 2.3.10 Operation VENONA ............................................................................ 30 -vi- 2.4 ERA OF MODERN CRYPTOGRAPHY ................................................................... 31 2.4.1 DES – Data Encryption Standard ....................................................... 31 2.4.2 Diffie – Hellman Key Exchange .......................................................... 32 2.4.3 IDEA – International Data Encryption Algorithm .............................. 34 2.4.4 PGP – Pretty Good Privacy ................................................................ 34 2.4.5 RSA ...................................................................................................... 34 2.4.6 RC5 ...................................................................................................... 36 2.4.7 RC6 ...................................................................................................... 37 2.4.8 SSL ....................................................................................................... 38 2.4.9 S/MIME ............................................................................................... 38 2.4.10 AES – Advanced Encryption Standard ................................................ 38 2.4.11 Blowfish ............................................................................................... 39 2.4.12 Quantum cryptography ....................................................................... 41 2.4.13 Elliptical curve cryptography (ECC) .................................................. 45 3 PROBLEMS IN CRYPTOGRAPHY ................................................................... 49 3.1 METHODS OF ENCRYPTION ............................................................................... 50 3.2 SYMMETRIC CRYPTOGRAPHY ........................................................................... 52 3.3 ASYMMETRIC CRYPTOGRAPHY ........................................................................ 54 3.3.1 El Gamal ............................................................................................. 57 3.3.2 Diffie–Hellman key exchange algorithm ............................................. 60 4 TURTLE CHAT V1.0 WITH VIGENERE ......................................................... 63 5 CONCLUSIONS..................................................................................................... 71 BIBLIOGRAPHY ........................................................................................................ 75 APPENDIX ................................................................................................................... 77
en
heal.advisorName
Katos, Assist. Prof. Vasilis
en
heal.committeeMemberName
Katos, V.
en
heal.committeeMemberName
Mitianoudis, N.
en
heal.committeeMemberName
Tsadiras, A.
en
heal.academicPublisher
School of Science &Technology, Master of Science (MSc) in Information and Communication Systems
en
heal.academicPublisherID
ihu
heal.numberOfPages
108
heal.fullTextAvailability
true


This item appears in the following Collection(s)

Show simple item record

Related Items