Publications about CrypTool

Sometimes students or magazines write publications about CrypTool. Here's a selection:

 

2021

 

2020

 

2019

 

2018

 

2017

  • Bastian Heuser, master thesis about CT2 in English: Development of an Evaluation Method for Cryptanalysis of Classical Ciphers in CrypTool 2

  • Nils Rehwald, master thesis about CT2 in German: Kryptoanalyse homophoner Chiffren

  • Olaf Harland, master thesis about CT2 in German: Implementierung und Kryptoanalyse der Typex

  • Proceedings of 4th International Conference on Electrical, Electronics and Computing Engineering, An intelligent PBL-based tutoring system for cryptology domain by Aleksandar Jevremovic, Sasa Adamovic, Goran Shimic, Marko Sarac, Mladen Veinovic, and Milan Milosavljevic

    More details

    Teaching cryptology represents one of the most challenging tasks in contemporary engineering education. Apart from setting high requirement for students (i.e. required mathematical knowledge and skills), teachers are also required to invest a lot in each individual student. In the previous paper on this subject matter we presented a CrypTool extension that enables the interconnection of different simulation environments. In this paper, we present an intelligent, problem based learning based tutoring system that is built upon that extension. The system is capable of generating different (level) problems from cryptology domain, developing adequate solutions, evaluating students' solutions and reffering them to appropriate studying materials.

 

2016

 

2015

 

2014

 

2013

  • Benedict Beuscher, bachelor thesis about CT2 in German: Visualisierung des BB84 Protokolls in CrypTool 2.0

  • Journal of Electrical Engineering, Security Evaluation and Encryption Efficiency Analysis of RC4 Stream Cipher for Converged Network Applications by Alaa Riad, Hamdy Elminir, Alaa Shehata, and Taha R. Ibrahim (Vol. 64, No. 3, page 196–200)

    More details

    The trend toward converged networks where voice, IP, video, and wireless are combined over the same network infrastructure offers significant - and highly attractive - benefits. But this union introduces new vulnerabilities and new opportunities to break into the network and so we need converged security.In this paper we investigate the possibility of using RC4 as a stream key generator for converged network applications.

    Remark: CT1 is used in Chap. 3.5 Random number visualization analysis.

  • Journal of Educational Technology & Society, An Interactive and Collaborative Approach to Teaching Cryptology by Sasa Adamovic, Marko Sarac, Mladen Veinovic, Milan Milosavljevic, and Aleksandar Jevremovic (Vol. 17, Issue 1)

    More details

    This paper describes the implementation of a novel module for the CT2 educational software that provides the ability to communicate over the local computer network and the Internet from within CT2. The solution is used to let students interactively and collaboratively work on solving cryptologic problems. The approach tested in the classroom setting was evaluated and leads to better final grades and an increase in students' interest for this area.

  • Infosecurity magazine, magazine article, The Dark Side of Cryptography: Kleptography in Black-Box Implementations

    Mehr anzeigen

    The English version is an updated and slightly shorted version of the German article in <kes>, August 2010. It contains a screenshot with the according kleptography plugin in JCrypTool (JCT).

 

2012

 

2011

 

2010

 

2009

 

2008

 

2007

 

2006

 

2004

 

2003

 

2002

 

2001

 

For further informationen, you can see our Links and Books