Sometimes students or magazines write publications about CrypTool. Here's a selection:
Â
Ernst Leierzopf, master thesis about CTO in German: Systematische Evaluierung von Architekturen und Features für die Bestimmung von klassischen Chiffren-Typen mit neuronalen Netzen
Jan Neumann, bachelor thesis about CTO in German: Benutzerfreundliche Web-Applikation zur Verwendung von OpenSSL auf Basis von WebAssembly
Niklas Weimann, bachelor thesis about CT2 in German: Implementierung und Visualisierung verschiedener kryptografischer Handverfahren und Codes in CrypTool 2
Thorben Groos, master thesis about CTO in German: Analyse des neuen Webstandards WebAssembly
Â
Ramdip Gill, bachelor thesis about CT2 in English: Implementation and Didactical Visualization of the ChaCha Cipher Family in CrypTool 2
Sally Addad, bachelor thesis about CT2 in English: Implementation and Visualization of Steganography Procedures in CrypTool2
Â
Christian Bender, master thesis about CT2 in German: Analyse symmetrischer Blockchiffren mittels differenzieller Kryptoanalyse in CrypTool 2
Alex Wehage, master thesis about CT2 in German: Varianten von blinden Signaturen und ihre Implementierung in CrypTool 2
Â
Michael Altenhuber, bachelor thesis about CT2 in German: Analyse und Implementierung der DDR-Chiffriermaschinen T-310/50 und T-316
Alexander Hirsch, bachelor thesis about CT2 in German: Implementierung und Visualisierung von Format-erhaltenden Verschlüsselungsverfahren in CrypTool 2
George Lasry, doctoral thesis about CT2 in English: A Methodology for the Cryptanalysis of Classical Ciphers with Search Metaheuristics (different cryptanalysis methods in CrypTool 2 are based on this PhD thesis)
Nils Kopal, doctoral thesis about CT2 in English: A Methodology for the Cryptanalysis of Classical Ciphers with Search Metaheuristics (the P2P network used in CT2 for cryptanalysis is based on this PhD thesis)
Olaf Versteeg, bachelor thesis about CT2 in German: Visualisierung und Implementierung von Betriebsmodi von Blockchiffren für CrypTool 2
Dominik Vogt, bachelor thesis about CT2 in German: Kryptoanalyse der ADFGVX-Chiffre in CrypTool 2
International Journal of Engineering Education, The Importance of the Using Software Tools for Learning Modern Cryptography by Sasa Adamovic, Marko Sarac, Dusan Stamenkovic, and Dalibor Radovanovic (Vol. 34, No. 1, pp. 256–262)
Because of the wide application of cryptographic mechanisms in private and business environments, a cryptography course at many universities has the great importance today. An undergraduate cryptography course is mathematically demanding, and it is quite difficult for students with poor background to follow the course syllabus. This paper presents the use of interactive software in demonstrating basic cryptology principles in modern cryptography.
Â
Bastian Heuser, master thesis about CT2 in English: Development of an Evaluation Method for Cryptanalysis of Classical Ciphers in CrypTool 2
Nils Rehwald, master thesis about CT2 in German: Kryptoanalyse homophoner Chiffren
Olaf Harland, master thesis about CT2 in German: Implementierung und Kryptoanalyse der Typex
Proceedings of 4th International Conference on Electrical, Electronics and Computing Engineering, An intelligent PBL-based tutoring system for cryptology domain by Aleksandar Jevremovic, Sasa Adamovic, Goran Shimic, Marko Sarac, Mladen Veinovic, and Milan Milosavljevic
Teaching cryptology represents one of the most challenging tasks in contemporary engineering education. Apart from setting high requirement for students (i.e. required mathematical knowledge and skills), teachers are also required to invest a lot in each individual student. In the previous paper on this subject matter we presented a CrypTool extension that enables the interconnection of different simulation environments. In this paper, we present an intelligent, problem based learning based tutoring system that is built upon that extension. The system is capable of generating different (level) problems from cryptology domain, developing adequate solutions, evaluating students' solutions and reffering them to appropriate studying materials.
Â
Camilo Echeverri, bachelor thesis about CT2 in English: Visualization of the Avalanche Effect in CT2
Matthias Becher, bachelor thesis about CT2 in English: Visualization of AES as a CrypTool 2 Plugin
Querejeta Azurmendi, master thesis about CT2 in English: A study of the general number field sieve and a development of a CT2 plug-in using YAFU
Â
Nils Rehwald, bachelor thesis about CT2 in German: Implementierung und Kryptoanalyse der M-138 in CrypTool 2.0
Mittler Report Verlag, Skalierbare Kryptografie – Verschlüsselung einfach nutzen (page 49-52)
Â
Julian Weyers, master thesis about CT2 in German: Kryptoanalyse der SIGABA
Christopher Konze, bachelor thesis about CT2 in German: Implementierung eines unstrukturierten Peer-to-peer-Netzwerkes für verteilte Berechnungen
Datenschutz und Datensicherheit (DuD), magazine article about CT2 in German, CrypTool 2.0 – Open-Source Kryptologie für Jedermann (page 701-708) October 2014
The article describes the e-learning software CrypTool 2.0 which was released in August 2014 after 7 years of development and many stable beta versions. CT2 is – like JCT – successor of CT1. CT2 offers a lot of encryption and analysis methods using visual programming as a new GUI. The article also explain the architecture of the software and some sample components.
Datenschutz und Datensicherheit (DuD), magazine article about CT1 in German, Sichere E-Mail mit S/MIME Eine Anleitung aus Anwenderperspektive (page 305-313) May 2014
The article exhaustively describes how to install and use secure email with Thunderbird in 4 steps. There is a link to the visualization of S/MIME in CT1. Existing weaknesses concerning the usability are examined. Additionally, the article contains an appeal to foster the existing open-source software in order to get rid off the referred weaknesses to make life of citizens and economy more secure.
<kes>, magazine article in German, Krypto + NSA = ? -- Kryptografische Folgerungen aus der NSA-Affäre (page 70-77) March 2014
The article investigates: Which crypto systems can -- despite the reveal of the NSA/GCHQ attacks -- still be considered as secure? Where have systems been intentionally weakened? How can we create a secure cryptographic future? Where is the difference between maths and implementation?
Â
Benedict Beuscher, bachelor thesis about CT2 in German: Visualisierung des BB84 Protokolls in CrypTool 2.0
Journal of Electrical Engineering, Security Evaluation and Encryption Efficiency Analysis of RC4 Stream Cipher for Converged Network Applications by Alaa Riad, Hamdy Elminir, Alaa Shehata, and Taha R. Ibrahim (Vol. 64, No. 3, page 196–200)
The trend toward converged networks where voice, IP, video, and wireless are combined over the same network infrastructure offers significant - and highly attractive - benefits. But this union introduces new vulnerabilities and new opportunities to break into the network and so we need converged security.In this paper we investigate the possibility of using RC4 as a stream key generator for converged network applications.
Remark: CT1 is used in Chap. 3.5 Random number visualization analysis.
Journal of Educational Technology & Society, An Interactive and Collaborative Approach to Teaching Cryptology by Sasa Adamovic, Marko Sarac, Mladen Veinovic, Milan Milosavljevic, and Aleksandar Jevremovic (Vol. 17, Issue 1)
This paper describes the implementation of a novel module for the CT2 educational software that provides the ability to communicate over the local computer network and the Internet from within CT2. The solution is used to let students interactively and collaboratively work on solving cryptologic problems. The approach tested in the classroom setting was evaluated and leads to better final grades and an increase in students' interest for this area.
Infosecurity magazine, magazine article, The Dark Side of Cryptography: Kleptography in Black-Box Implementations
The English version is an updated and slightly shorted version of the German article in <kes>, August 2010. It contains a screenshot with the according kleptography plugin in JCrypTool (JCT).
Â
Alexander Juettner, bachelor thesis about CT2 in English: Analysis of the Functionality, Risks and Counter-Measures of Current Padding Attacks and the Implementation of an Attack in the Open-Source Program CrypTool 2
7th International Conference on Education and Information Systems, Technologies and Applications (EISTA 2012), Reducing the complexity of understanding cryptology using CrypTool July 2012
Cryptography and cryptanalysis are characterized by a great number of algorithms, parameters, and protocols where at least some of them can be considered as complex mathematical structures. In this paper, electronic learning such as self-regulated learning, computer-based trainings, and learning by doing are presented with the help of a modern e-learning program – CrypTool (CT) – which supports these approaches for developers and users. Additionally, this paper fortifies these claims with an evaluation using the feedback from classes where CT was used to teach cryptographic algorithms. EISTA 2012 was part of the 6th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2012).
<kes>, magazine article in German, RSA-Sicherheit in der Praxis (page 22-27) May 2012
Investigation, why shared prime factors exist in RSA moduli and how this can be prevented. The program described in the article can be downloaded here.
digma -- Journal for Data Law and Information Security, magazine article in German, E-Learning: Kryptografie und Kryptoanalyse (page 32-35)
Â
Martin Franz, doctoral thesis about CT2 in English: Secure Computations on Non-Integer Values (after his PhD thesis the author implemented Paillier and DGK into CT2)
Simone Sauer, bachelor thesis about CT2 in German: Entwicklung einer benutzerorientierten Startumgebung für CrypTool 2.0
Nils Kopal, bachelor thesis about CT2 in German: Design und Entwicklung einer schnellen Laufzeitumgebung für CrypTool 2.0
15th Colloquium for infomation Systems Security Education Fairborn, Teaching Cryptology At All Levels Using CrypTool by Rong Yang, Layne Wallace, and Ian Burchett. June 2011
This paper introduces cryptology in the framework of general cybersecurity and advocates that it is an appropriate mechanism for introducing security issues into the classroom at all level of the curriculum. A practical free software package called CrypTool which can be a major asset in any attempt to teach cryptology to a range of student audiences is presented. Applications and classroom experiences using CrypTool are discussed along with some student feedback.
Hackin9, IT security magazine article, The CrypTool project -- The best way, to learn and apply cryptography
This article explains the CrypTool project, and introduces the three software versions CrypTool 1.4.30 (CT1), CT2 and JavaCrypTool (JCT).
Â
CrypTool 2 auf der CeBIT 2010. The University of Duisburg-Essen presented CrypTool 2 as e-learning platform, peers@play and the combination of both for distributed modern cryptanalysis.
<kes>, magazine article in German, Die dunkle Seite der Kryptografie: Kleptografie bei Black-Box-Implementierungen (page 6-11)
The article contains a 1-page box which introduces JavaCrypTool (JCT), and it contains a screenshot with the according kleptography plugin in JCT.
PC Plus 297, magazine article, Breaking the toughest codes (page 65-67)
The last column describes how to encrypt a message with DES using CrypTool v1
Â
Â
Cristina Onete, master thesis about CT2 in English: Visualisation of Modern Key Exchange Schemes for more than two Parties in CrypTool and their Security Analysis
<kes>, magazine article in German, VerSchlüsselergebnisse NG (page 62-65) July 2008
DFN News, magazine article, An e-learning programme for cryptology (page 28-31) April 2008
Telepolis, Werkzeugkasten für Codeknacker, August 2008 (German)
This project educates students in the basics of the field of classic and modern cryptography and the according cryptanalysis. The project explores the software CrypTool 1 extensively and comprises of a set of three one hour lab sheets as well as an accompanying report with the solutions.
Â
Â
Â
Â
Â
Â
Â
For further informationen, you can see our Links and Books