{"title":"An Implementation of Web Based Application which Aims at Deepening Understanding of Key Cryptosystem","authors":"Hiroto Maeda, Y. Oie, Kazunari Ito","doi":"10.1109/IMCOM56909.2023.10035571","DOIUrl":null,"url":null,"abstract":"Understanding key cryptosystem is not easy to understand because it involves mathematical elements. Therefore, we proposed and implemented an application that enables students to learn key cryptosystem through actual experience of the sentence exchanges. The application was experienced in a class and the evaluation taken after the experience suggests that the application has the potential to promote student's understanding of key cryptosystem. In the future, we would like to evaluate more rigorously how effective this application is using various methods and to establish a method of operation.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMCOM56909.2023.10035571","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Understanding key cryptosystem is not easy to understand because it involves mathematical elements. Therefore, we proposed and implemented an application that enables students to learn key cryptosystem through actual experience of the sentence exchanges. The application was experienced in a class and the evaluation taken after the experience suggests that the application has the potential to promote student's understanding of key cryptosystem. In the future, we would like to evaluate more rigorously how effective this application is using various methods and to establish a method of operation.