Questions tagged [education]

Questions related to the teaching and learning of cryptography.

13 questions
10
votes
1 answer

How would you encrypt-then-MAC when using pen-and-paper and a Caesar cipher?

I'll probably get shot for asking this, but I've got some kids (aged 8-10) in my neighbourhood that I've been showing/teaching the simple pen-and-paper Caesar cipher and they're successfully playing with it for more than a week now. Silly me thought…
Mike Edward Moras
  • 18,161
  • 12
  • 87
  • 240
7
votes
1 answer

Time Based encryption

Looking for the language to describe a solution I am looking for... As a systems admin for an educational institution, I would like to: a) post our tests in an encrypted form b) at a certain time, make the contents available to the user (online or…
6
votes
1 answer

Simple compression functions an sponge functions for educational purposes

For block ciphers, there are the very well designed schemes of Simple-DES and Simple-AES, which have been created not for security but for teaching the design principles of the real algorithms while maintaining the possibility to calculate them by…
mat
  • 2,558
  • 1
  • 14
  • 28
6
votes
1 answer

What cryptography is suitable to motivate High School students to learn math?

A High School math teacher in the Bronx asked me if I knew of any way to use cryptography in a way that motivates students (15 to 18 years old) to learn math. I do know that many of them want to protect (encrypt) Snapchat pictures, and understand…
makerofthings7
  • 2,631
  • 1
  • 22
  • 37
6
votes
3 answers

Good challenges for a crypto competition for teenagers

I'm holding a cryptography workshop for teenagers (around 16 years old) at our university. As part of the workshop, I'm planning to run a crypto competition with prizes: there will be different tasks, each one will yield points, and the winners will…
Angela
  • 353
  • 2
  • 10
3
votes
2 answers

Cryptography survey as an undergrad

Is cryptography so specialized that taking a survey class is a waste of time? I'm not the type of person who can do logs in my head or has a deep mathematical aptitude, but cryptography is certainly very interesting. But I wonder if I'll scratch the…
inbinder
  • 133
  • 4
2
votes
1 answer

Is Mathematics or Computer Science more important for a career in cryptography

I'm a Mathematics Major, and I currently enjoy the mathematical aspects of cryptography. I intend to pursue a career in cryptography research. https://www.csit.gov.sg/join-us/job-opportunities/job-detail/cryptologist However, although I'm…
Yan Ying
  • 25
  • 1
  • 4
2
votes
0 answers

Simplicity and precision in cryptography papers

I know a PhD student who recently had his paper on applied cryptography rejected because one the reviewers claimed that it was "the solution was too simple and the notation used was more than necessary". It was accepted by the second reviewer.…
petro444
  • 125
  • 6
2
votes
2 answers

What is a good way to demonstrate elliptic curve cryptography?

For school (high school) I am writing an essay on elliptic curve cryptography. The assignment needs to include a practical part, so I decided to write a Python class for elliptic curves. This class is capable of performing elliptic curve arithmetic…
Dasherman
  • 129
  • 3
1
vote
0 answers

What weak symmetric cryptographic algorithms shall I use to educate myself about cryptoanalysis methods?

Are there any simple to understand and implement, but nontrivial cyphers and hash functions which are easily broken by modern cryptoanalysis methods (for example, ones listed in Wikipedia)? Ideally it should be encryptable/decryptable/hashable using…
Vi.
  • 213
  • 1
  • 5
0
votes
1 answer

Symmetric Encryption, meet in the middle attack, effective key length

What is the effective key length of a deterministic encryption scheme, given a meet-in-the-middle attack scenario when you encrypt five times (64 bit keys for each)? . Say the encryption scheme has |key space K| = |plaintext space M| = |ciphertext…
0
votes
0 answers

PQC schemes & theory on academic courses

This question doesn't cover any technical aspects of PQC but I would want to know if undergraduate computer scientists study at a good level any of the available PQC schemes in literature during their stance at university in whatever country you…
kub0x
  • 898
  • 11
  • 21
0
votes
0 answers

For JCrypt LFSR Stream Cipher Utilization, is it Possible to Have Registers of n>15?

I'm performing theory and technical research on reversing the logic output of an old, decaying and fragile arcade board IC that utilizes LFSRs in order to generate multiple randomized star-field effect patterns on the game screen, dependent largely…